You've been tasked with setting up remote work for employees. However, their remote connections could be vulnerable to session hijacking, and you want to prevent this risk. You decide to implement a technology that establishes a secure and encrypted tunnel over a public network to safely transmit sensitive data, preventing hackers from intercepting or decrypting the information. Which technology would you choose?