Mit Magzter GOLD unbegrenztes Potenzial nutzen

Mit Magzter GOLD unbegrenztes Potenzial nutzen

Erhalten Sie unbegrenzten Zugriff auf über 9.000 Zeitschriften, Zeitungen und Premium-Artikel für nur

$149.99
 
$74.99/Jahr

Versuchen GOLD - Frei

Beyond VPN: Building trust into network access

Voice and Data

|

October 2025

As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.

- BY NAHIM FAZAL

Beyond VPN: Building trust into network access

In today's rapidly evolving digital landscape, securing an organisation's network has become more critical than ever.

While traditional methods such as Virtual Private Networks (VPNs) have been the go-to solutions for remote access to corporate resources, security architects have been facing scalability challenges with these solutions.

With cyberthreats becoming increasingly sophisticated and the demand for seamless, secure connectivity growing, it is time to consider a more robust alternative: Zero Trust Network Access (ZTNA). Implementing ZTNA over traditional VPNs offers significant security, usability, and operational advantages, especially in today's cloud-centric, remote work environments.

By replacing traditional VPNs with ZTNA, security leaders can enhance their organisation's security, improve the user experience, and support the dynamic needs of an enterprise workforce.

However, there is a popular misconception among organisations that implementing ZTNA means they are deploying zero trust and do not need to take any further action. ZTNA is not zero trust; it is one component of a zero-trust architecture. According to Gartner, ZTNA refers to products and services that create an identity- and context-based logical access boundary that encompasses an enterprise user and an internally hosted application or set of applications.

ZTNA creates a logical access boundary around the applications, hiding them from discovery and restricting access to a set of named entities. The policy enforcement point verifies the identity, context, and policy adherence of the specified participants before granting access, thereby minimising lateral movement across the network.

IMPROVED SCALABILITY, DISTRIBUTED CONTROL

WEITERE GESCHICHTEN VON Voice and Data

Voice and Data

Voice and Data

Reimagining Earth through a living digital twin

A new geospatial alliance led by Aechelon seeks to build a real-time digital twin of Earth, merging satellite, radar, and Al for dynamic intelligence.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Telcos find new lifeline in spectrum slicing

As revenues shrink and competition intensifies, spectrum-as-a-service offers telcos a shared model to unlock growth while empowering enterprises.

time to read

7 mins

October 2025

Voice and Data

Voice and Data

Rethinking enterprise connectivity with managed Wi-Fi

As digital transformation accelerates, managed Wi-Fi is emerging as the backbone of agile, secure, and insight-driven enterprise connectivity in India.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Beyond VPN: Building trust into network access

As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Banking on richer, safer digital conversations

RCS redefines banking communication with verified security, two-way interactivity, and measurable engagement that builds digital trust at lower cost.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Powering India's cloud with sustainable data hubs

India's data centre boom is reshaping digital infrastructure, demanding clean energy, local innovation, and policy alignment to sustain its growth.

time to read

5 mins

October 2025

Voice and Data

Voice and Data

Made in India: Building the backbone of loT hardware

From imported modules to home-grown chips, India's loT hardware story is evolving into one of design control, ecosystem depth, and strategic resilience.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Breaking data barriers with light

Li-Fi uses the power of light to deliver ultra-fast, secure, and interference-free connectivity-illuminating a new frontier in digital communication.

time to read

7 mins

October 2025

Voice and Data

Voice and Data

Cyber defence redefined as firewalls give way to foresight

Data security is evolving from reactive protection to predictive foresight— unifying platforms, intelligence, and AI to make organisations breach-ready.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Connecting the currents of digital finance

India's telcos are building the invisible pipes that keep digital payments, inclusion, and innovation flowing across the nation's financial ecosystem.

time to read

5 mins

October 2025

Listen

Translate

Share

-
+

Change font size