Versuchen GOLD - Frei
Beyond VPN: Building trust into network access
Voice and Data
|October 2025
As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.
In today's rapidly evolving digital landscape, securing an organisation's network has become more critical than ever.
While traditional methods such as Virtual Private Networks (VPNs) have been the go-to solutions for remote access to corporate resources, security architects have been facing scalability challenges with these solutions.
With cyberthreats becoming increasingly sophisticated and the demand for seamless, secure connectivity growing, it is time to consider a more robust alternative: Zero Trust Network Access (ZTNA). Implementing ZTNA over traditional VPNs offers significant security, usability, and operational advantages, especially in today's cloud-centric, remote work environments.
By replacing traditional VPNs with ZTNA, security leaders can enhance their organisation's security, improve the user experience, and support the dynamic needs of an enterprise workforce.
However, there is a popular misconception among organisations that implementing ZTNA means they are deploying zero trust and do not need to take any further action. ZTNA is not zero trust; it is one component of a zero-trust architecture. According to Gartner, ZTNA refers to products and services that create an identity- and context-based logical access boundary that encompasses an enterprise user and an internally hosted application or set of applications.
ZTNA creates a logical access boundary around the applications, hiding them from discovery and restricting access to a set of named entities. The policy enforcement point verifies the identity, context, and policy adherence of the specified participants before granting access, thereby minimising lateral movement across the network.
IMPROVED SCALABILITY, DISTRIBUTED CONTROL
Diese Geschichte stammt aus der October 2025-Ausgabe von Voice and Data.
Abonnieren Sie Magzter GOLD, um auf Tausende kuratierter Premium-Geschichten und über 9.000 Zeitschriften und Zeitungen zuzugreifen.
Sie sind bereits Abonnent? Anmelden
WEITERE GESCHICHTEN VON Voice and Data
Voice and Data
The flight deck layer for autonomous AI networks
As AI networks act autonomously, embedded observability is evolving into a governing layer that orchestrates telemetry, policy and real-time corrective action.
3 mins
February 2026
Voice and Data
"Shopfloor change is now driven by data and intelligent networks"
India's factory floors are no longer defined only by machines, throughput, and shift rosters.
7 mins
February 2026
Voice and Data
DIGITAL TRANSFORMATION HITS BUDGET REALITY
As spending tightens, CIOs are cutting sprawl and proving value fast—turning cloud, networks, and platforms into disciplined systems built to perform.
10 mins
February 2026
Voice and Data
Securing the digital stack at the silicon core
As Al and hyperscale infrastructure expand, trust must be engineered into semiconductors-the foundational layer powering networks and cloud.
3 mins
February 2026
Voice and Data
China builds Meteor 1 parallel optical Al chip
A new photonic processor signals a shift in high-performance computing for Al and data centres amid rising power demands.
1 mins
February 2026
Voice and Data
Intelligent fibre for distributed Al ecosystems
As Al workloads stretch across hyperscale, edge, and GPU clusters, ultra-low- loss fibre and automation now define network performance and resilience.
4 mins
February 2026
Voice and Data
APP-LAYER FRAUD: IT IS TIME FOR A STRONGER TRUST ARCHITECTURE
With scams increasingly originating on messaging platforms, India must correct regulatory asymmetry and strengthen verification to protect digital trust.
5 mins
February 2026
Voice and Data
Beyond the 5G rollout, the age of execution
Industry leaders at the V&D 5G+ Conference debate how India can turn network scale into resilient, intelligent systems that deliver economic value.
12 mins
February 2026
Voice and Data
Building real-time risk engines on telco networks
BFSI firms are redesigning risk systems using AI, blockchain, and low-latency networks to enable real-time fraud prevention and compliance.
4 mins
February 2026
Voice and Data
Five signals for India's digital infrastructure shift
Nirmala Sitharaman outlines India's Al- and data-centre-led roadmap, signalling structural shifts in networks, compute and digital sovereignty.
6 mins
February 2026
Listen
Translate
Change font size
