“VPNs often end up creating new security problems”
Voice and Data|November 2020
Virtual private networks (VPN), which were originally developed to enable remote workers to connect into the corporate network back when only a fraction of the workforce was working, created new network security headaches when used at a previously unheard of scale with organizations switched to Remote Work overnight during this pandemic. Although VPNs are considered as a quick way for the remote users to get to internal applications, they are slow for users, offer poor security, and are difficult to manage and scale as well. In an interview with Soma Tah, Forcepoint Chief Product Officer Nico Popp elaborates on how zero trust network access (ZTNA) solutions rethink network security functions and are designed to solve the challenges posed by the legacy VPNs.
Soma Tah
“VPNs often end up creating new security problems”

Nico popp Chief Product Officer, Forcepoint

Why should organizations with existing investments in VPN spend again on ZTNA? Does it offer any tangible benefits over traditional VPN?

VPNs often end up creating new security problems by making remote users part of the internal network. VPNs are also notorious for slowing down cloud apps access, especially for the highly interactive ones and most organizations today are using interactive business cloud applications such as the Google Workspace (formerly Gsuite), O365, and the like.

Users sometimes go to great lengths to avoid using VPNs, leaving themselves unprotected by internal gateways. Then, when they do connect to the VPN, often they are given the same full range of access on internal networks that they would have in the office. They can get to any application, any server, any database, and so on. But it also means that anybody who is pretending to be an authorized user, or who has compromised the user’s laptop or the public Wi-Fi network where they’re connecting from, also can get to anything. Limiting what remote users can access can be done with network security technologies such as firewalls. But setting up intricate rules for controlling which users can get to which parts of the network – called micro-segmentation – requires expertise and can lead to errors as resources move around.

This story is from the November 2020 edition of Voice and Data.

Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 8,500+ magazines and newspapers.

This story is from the November 2020 edition of Voice and Data.

Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 8,500+ magazines and newspapers.

MORE STORIES FROM VOICE AND DATAView All
Navigating Social Media Risks With AI
Voice and Data

Navigating Social Media Risks With AI

Amidst the complexities of social media, harness the power of Al to protect privacy, enhance mental health, and combat misinformation effectively

time-read
3 mins  |
April 2024
V&D leadership forum explores the future of a connected world
Voice and Data

V&D leadership forum explores the future of a connected world

The TLF was attended by 250+ technology and business decision-makers and policymakers across the communication and broadcasting sector

time-read
5 mins  |
April 2024
Data, chips, and India's AI mission
Voice and Data

Data, chips, and India's AI mission

The Rs-10,372-crore initiative seeks to position the country as a global Al powerhouse, enhancing its capacity for research and innovation

time-read
5 mins  |
April 2024
Where jellyfishes work better than whales
Voice and Data

Where jellyfishes work better than whales

Edge Distributed Computing is revolutionising Supercomputing, offering agility, cost-effectiveness, and real-time decision-making

time-read
5 mins  |
April 2024
The unexpected shift
Voice and Data

The unexpected shift

Disillusioned from the Cloud, more organisations are now looking at cost-effective, secure prefab containerised Edge Data Centres for business agility

time-read
2 mins  |
April 2024
The Silicon game: Reaping 5G gold
Voice and Data

The Silicon game: Reaping 5G gold

In-built hardware can be a big amplifier for 5G adoption, reshaping connectivity paradigms and fuelling innovations in telecom, IoT, and beyond

time-read
9 mins  |
April 2024
New video streaming to shake up the data market
Voice and Data

New video streaming to shake up the data market

D2M technology paves the way for data-free video streaming, offering broader content access while potentially unsettling the telecom sector

time-read
4 mins  |
April 2024
Pathbreakers of the Year (2023)
Voice and Data

Pathbreakers of the Year (2023)

The vision, determination, and groundbreaking initiatives of three discerning telecom industry leaders have been pivotal in laying the foundation for the seamless deployment of the world's largest 5G networks within record time.

time-read
1 min  |
April 2024
Lifetime Achievement (2023)
Voice and Data

Lifetime Achievement (2023)

Aluminary in India's telecommunications landscape, Mukesh D Ambani stands as a beacon of transformative leadership.

time-read
1 min  |
April 2024
Telecom Person of the Year (2023)
Voice and Data

Telecom Person of the Year (2023)

A bureaucrat par excellence, K Rajaraman's visionary leadership has been instrumental in driving domestic telecom equipment manufacturing and streamlining decision-making processes within the DoT.

time-read
9 mins  |
April 2024