يحاول ذهب - حر

“VPNs often end up creating new security problems”

November 2020

|

Voice and Data

Virtual private networks (VPN), which were originally developed to enable remote workers to connect into the corporate network back when only a fraction of the workforce was working, created new network security headaches when used at a previously unheard of scale with organizations switched to Remote Work overnight during this pandemic. Although VPNs are considered as a quick way for the remote users to get to internal applications, they are slow for users, offer poor security, and are difficult to manage and scale as well. In an interview with Soma Tah, Forcepoint Chief Product Officer Nico Popp elaborates on how zero trust network access (ZTNA) solutions rethink network security functions and are designed to solve the challenges posed by the legacy VPNs.

- Soma Tah

“VPNs often end up creating new security problems”

Nico popp Chief Product Officer, Forcepoint

Why should organizations with existing investments in VPN spend again on ZTNA? Does it offer any tangible benefits over traditional VPN?

VPNs often end up creating new security problems by making remote users part of the internal network. VPNs are also notorious for slowing down cloud apps access, especially for the highly interactive ones and most organizations today are using interactive business cloud applications such as the Google Workspace (formerly Gsuite), O365, and the like.

Users sometimes go to great lengths to avoid using VPNs, leaving themselves unprotected by internal gateways. Then, when they do connect to the VPN, often they are given the same full range of access on internal networks that they would have in the office. They can get to any application, any server, any database, and so on. But it also means that anybody who is pretending to be an authorized user, or who has compromised the user’s laptop or the public Wi-Fi network where they’re connecting from, also can get to anything. Limiting what remote users can access can be done with network security technologies such as firewalls. But setting up intricate rules for controlling which users can get to which parts of the network – called micro-segmentation – requires expertise and can lead to errors as resources move around.

المزيد من القصص من Voice and Data

Voice and Data

Voice and Data

India's silent AI revolution: Infra fuels the new digital core

As India's digital ambition meets reality, enterprises are quietly turning to robust AI infrastructure as the backbone of strategic transformation.

time to read

8 mins

August 2025

Voice and Data

Voice and Data

NISAR soars: Indo-US ‘golden mesh’ to track Earth’s pulse from orbit

The NASA-ISRO radar satellite will map Earth's dynamic changes with centimetre-level accuracy for climate, agriculture, and disaster resilience.

time to read

4 mins

August 2025

Voice and Data

Voice and Data

The dark side of AI: ChatGPT's dreaded twin

WormGPT exposes how Al's powerful capabilities are being weaponised, making cybercrime more scalable, persuasive, and dangerously accessible.

time to read

4 mins

August 2025

Voice and Data

Voice and Data

India’s mobile export rise marks global manufacturing shift

India mobile phone export growth signals a broader transformation, as domestic value chains expand and jobs rise in a maturing manufacturing ecosystem.

time to read

2 mins

August 2025

Voice and Data

Voice and Data

"The government is backing risk-now industry must lead"

As Secretary of the Department of Science & Technology, Dr Abhay Karandikar is shaping India's innovation agenda at a defining moment.

time to read

6 mins

August 2025

Voice and Data

Voice and Data

"The future of home Wi-Fi is about smarter, Al-driven networks"

From jitter and latency to interference, spoofed devices, and jamming, WiFi is venturing far beyond its traditional bounds.

time to read

4 mins

August 2025

Voice and Data

Voice and Data

When machine learns from books: What Indian law must fix

India's first AI copyright case tests how far the law can stretch to keep up with machine learning, global precedents, and the idea of transformative use.

time to read

5 mins

August 2025

Voice and Data

Voice and Data

Quantum-proofing telecom networks before the storm hits

As quantum threats edge closer, telecom networks must act now to defend sensitive data with hybrid cryptography and quantum-safe strategies.

time to read

4 mins

August 2025

Voice and Data

Voice and Data

India Q2 tech investment dips; digital infra, communication hold fort

India’s tech sector recorded 60 deals worth USD 460 M in AMJ 2025, marking a steep fall in value, while communication, infra, quantum, and space held firm.

time to read

4 mins

August 2025

Voice and Data

Akash Prime hits high-altitude mark with indigenous RF seeker

India successfully tests upgraded Akash Prime system with indigenously developed RF seeker, bolstering high-altitude air defence capabilities.

time to read

1 mins

August 2025

Translate

Share

-
+

Change font size