استمتع بـUnlimited مع Magzter GOLD

استمتع بـUnlimited مع Magzter GOLD

احصل على وصول غير محدود إلى أكثر من 9000 مجلة وصحيفة وقصة مميزة مقابل

$149.99
 
$74.99/سنة

يحاول ذهب - حر

Beyond VPN: Building trust into network access

October 2025

|

Voice and Data

As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.

- BY NAHIM FAZAL

Beyond VPN: Building trust into network access

In today's rapidly evolving digital landscape, securing an organisation's network has become more critical than ever.

While traditional methods such as Virtual Private Networks (VPNs) have been the go-to solutions for remote access to corporate resources, security architects have been facing scalability challenges with these solutions.

With cyberthreats becoming increasingly sophisticated and the demand for seamless, secure connectivity growing, it is time to consider a more robust alternative: Zero Trust Network Access (ZTNA). Implementing ZTNA over traditional VPNs offers significant security, usability, and operational advantages, especially in today's cloud-centric, remote work environments.

By replacing traditional VPNs with ZTNA, security leaders can enhance their organisation's security, improve the user experience, and support the dynamic needs of an enterprise workforce.

However, there is a popular misconception among organisations that implementing ZTNA means they are deploying zero trust and do not need to take any further action. ZTNA is not zero trust; it is one component of a zero-trust architecture. According to Gartner, ZTNA refers to products and services that create an identity- and context-based logical access boundary that encompasses an enterprise user and an internally hosted application or set of applications.

ZTNA creates a logical access boundary around the applications, hiding them from discovery and restricting access to a set of named entities. The policy enforcement point verifies the identity, context, and policy adherence of the specified participants before granting access, thereby minimising lateral movement across the network.

IMPROVED SCALABILITY, DISTRIBUTED CONTROL

المزيد من القصص من Voice and Data

Voice and Data

Voice and Data

Digital infrastructure shifts from scale to trust

AI-scale compute, multi-agent automation, domain LLMs, and sovereign cloud shifts are redefining digital infrastructure—with trust and risk at the core.

time to read

4 mins

January 2026

Voice and Data

Voice and Data

5G FWA growth drives a modest wireless subscriber uptick

TRAI's November 2025 data shows wireless growth led by Jio and Airtel, as 5G FWA expands and Vi and MTNL continue to lose users.

time to read

3 mins

January 2026

Voice and Data

Voice and Data

Security goes autonomous: Al agents, twins, AR wearables

Agentic Al, digital twins, and AR wearables are moving from pilots to operations, reshaping how Indian security teams detect, decide, and act.

time to read

6 mins

January 2026

Voice and Data

Voice and Data

The thinking network: Making every node count

AI agents and cloud-led orchestration will transform enterprise networks into intelligent systems that act, predict, and optimise before issues arise.

time to read

3 mins

January 2026

Voice and Data

Voice and Data

From dumb pipes to intelligent telecom platforms

As consumer monetisation plateaus, telcos are shifting from pipes to programmable networks–selling APIs, trust, and outcomes as software platforms.

time to read

9 mins

January 2026

Voice and Data

Voice and Data

Can the techco pivot drive Reliance Jio's USD 170 B bid?

Reliance Jio IPO will test whether telecom can be valued as a platform, with Al and scale of media reshaping industry multiples and investor appetite.

time to read

6 mins

January 2026

Voice and Data

Voice and Data

Semicon PLI could de-risk India's digital infrastructure build

As India scales 5G, fibre, edge, and data centres, Semicon India aims to improve component supply, lead times, and cost stability for equipment.

time to read

4 mins

January 2026

Voice and Data

Voice and Data

Cloud-native workflows are shrinking enterprise latency

Event-driven cloud, microservices, and iPaaS orchestration are moving context with the asset-enabling real-time approvals, compliance, and execution.

time to read

4 mins

January 2026

Voice and Data

Voice and Data

From threats to trust: How Al secures digital growth

As cyber threats evolve, Al is helping Indian D2C and B2C businesses turn digital vulnerabilities into resilience, trust, and sustained growth.

time to read

2 mins

January 2026

Voice and Data

Voice and Data

Laser nanowire films promise EMI shielding for 6G devices

Glasgow researchers create transparent, flexible silver nanowire films that cut EMI across 2.2-6 GHz, enabling denser radios in future devices.

time to read

3 mins

January 2026

Listen

Translate

Share

-
+

Change font size