Facebook Pixel Beyond VPN: Building trust into network access | Voice and Data – business – Lesen Sie diese Geschichte auf Magzter.com

Versuchen GOLD - Frei

Beyond VPN: Building trust into network access

Voice and Data

|

October 2025

As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.

- BY NAHIM FAZAL

Beyond VPN: Building trust into network access

In today's rapidly evolving digital landscape, securing an organisation's network has become more critical than ever.

While traditional methods such as Virtual Private Networks (VPNs) have been the go-to solutions for remote access to corporate resources, security architects have been facing scalability challenges with these solutions.

With cyberthreats becoming increasingly sophisticated and the demand for seamless, secure connectivity growing, it is time to consider a more robust alternative: Zero Trust Network Access (ZTNA). Implementing ZTNA over traditional VPNs offers significant security, usability, and operational advantages, especially in today's cloud-centric, remote work environments.

By replacing traditional VPNs with ZTNA, security leaders can enhance their organisation's security, improve the user experience, and support the dynamic needs of an enterprise workforce.

However, there is a popular misconception among organisations that implementing ZTNA means they are deploying zero trust and do not need to take any further action. ZTNA is not zero trust; it is one component of a zero-trust architecture. According to Gartner, ZTNA refers to products and services that create an identity- and context-based logical access boundary that encompasses an enterprise user and an internally hosted application or set of applications.

ZTNA creates a logical access boundary around the applications, hiding them from discovery and restricting access to a set of named entities. The policy enforcement point verifies the identity, context, and policy adherence of the specified participants before granting access, thereby minimising lateral movement across the network.

IMPROVED SCALABILITY, DISTRIBUTED CONTROL

WEITERE GESCHICHTEN VON Voice and Data

Voice and Data

Voice and Data

The flight deck layer for autonomous AI networks

As AI networks act autonomously, embedded observability is evolving into a governing layer that orchestrates telemetry, policy and real-time corrective action.

time to read

3 mins

February 2026

Voice and Data

Voice and Data

"Shopfloor change is now driven by data and intelligent networks"

India's factory floors are no longer defined only by machines, throughput, and shift rosters.

time to read

7 mins

February 2026

Voice and Data

Voice and Data

DIGITAL TRANSFORMATION HITS BUDGET REALITY

As spending tightens, CIOs are cutting sprawl and proving value fast—turning cloud, networks, and platforms into disciplined systems built to perform.

time to read

10 mins

February 2026

Voice and Data

Voice and Data

Securing the digital stack at the silicon core

As Al and hyperscale infrastructure expand, trust must be engineered into semiconductors-the foundational layer powering networks and cloud.

time to read

3 mins

February 2026

Voice and Data

Voice and Data

China builds Meteor 1 parallel optical Al chip

A new photonic processor signals a shift in high-performance computing for Al and data centres amid rising power demands.

time to read

1 mins

February 2026

Voice and Data

Voice and Data

Intelligent fibre for distributed Al ecosystems

As Al workloads stretch across hyperscale, edge, and GPU clusters, ultra-low- loss fibre and automation now define network performance and resilience.

time to read

4 mins

February 2026

Voice and Data

Voice and Data

APP-LAYER FRAUD: IT IS TIME FOR A STRONGER TRUST ARCHITECTURE

With scams increasingly originating on messaging platforms, India must correct regulatory asymmetry and strengthen verification to protect digital trust.

time to read

5 mins

February 2026

Voice and Data

Voice and Data

Beyond the 5G rollout, the age of execution

Industry leaders at the V&D 5G+ Conference debate how India can turn network scale into resilient, intelligent systems that deliver economic value.

time to read

12 mins

February 2026

Voice and Data

Voice and Data

Building real-time risk engines on telco networks

BFSI firms are redesigning risk systems using AI, blockchain, and low-latency networks to enable real-time fraud prevention and compliance.

time to read

4 mins

February 2026

Voice and Data

Voice and Data

Five signals for India's digital infrastructure shift

Nirmala Sitharaman outlines India's Al- and data-centre-led roadmap, signalling structural shifts in networks, compute and digital sovereignty.

time to read

6 mins

February 2026

Listen

Translate

Share

-
+

Change font size