Prøve GULL - Gratis
“VPNs often end up creating new security problems”
Voice and Data
|November 2020
Virtual private networks (VPN), which were originally developed to enable remote workers to connect into the corporate network back when only a fraction of the workforce was working, created new network security headaches when used at a previously unheard of scale with organizations switched to Remote Work overnight during this pandemic. Although VPNs are considered as a quick way for the remote users to get to internal applications, they are slow for users, offer poor security, and are difficult to manage and scale as well. In an interview with Soma Tah, Forcepoint Chief Product Officer Nico Popp elaborates on how zero trust network access (ZTNA) solutions rethink network security functions and are designed to solve the challenges posed by the legacy VPNs.

Nico popp Chief Product Officer, Forcepoint
Why should organizations with existing investments in VPN spend again on ZTNA? Does it offer any tangible benefits over traditional VPN?
VPNs often end up creating new security problems by making remote users part of the internal network. VPNs are also notorious for slowing down cloud apps access, especially for the highly interactive ones and most organizations today are using interactive business cloud applications such as the Google Workspace (formerly Gsuite), O365, and the like.
Users sometimes go to great lengths to avoid using VPNs, leaving themselves unprotected by internal gateways. Then, when they do connect to the VPN, often they are given the same full range of access on internal networks that they would have in the office. They can get to any application, any server, any database, and so on. But it also means that anybody who is pretending to be an authorized user, or who has compromised the user’s laptop or the public Wi-Fi network where they’re connecting from, also can get to anything. Limiting what remote users can access can be done with network security technologies such as firewalls. But setting up intricate rules for controlling which users can get to which parts of the network – called micro-segmentation – requires expertise and can lead to errors as resources move around.
Denne historien er fra November 2020-utgaven av Voice and Data.
Abonner på Magzter GOLD for å få tilgang til tusenvis av kuraterte premiumhistorier og over 9000 magasiner og aviser.
Allerede abonnent? Logg på
FLERE HISTORIER FRA Voice and Data

Voice and Data
India's silent AI revolution: Infra fuels the new digital core
As India's digital ambition meets reality, enterprises are quietly turning to robust AI infrastructure as the backbone of strategic transformation.
8 mins
August 2025

Voice and Data
NISAR soars: Indo-US ‘golden mesh’ to track Earth’s pulse from orbit
The NASA-ISRO radar satellite will map Earth's dynamic changes with centimetre-level accuracy for climate, agriculture, and disaster resilience.
4 mins
August 2025

Voice and Data
The dark side of AI: ChatGPT's dreaded twin
WormGPT exposes how Al's powerful capabilities are being weaponised, making cybercrime more scalable, persuasive, and dangerously accessible.
4 mins
August 2025

Voice and Data
India’s mobile export rise marks global manufacturing shift
India mobile phone export growth signals a broader transformation, as domestic value chains expand and jobs rise in a maturing manufacturing ecosystem.
2 mins
August 2025

Voice and Data
"The government is backing risk-now industry must lead"
As Secretary of the Department of Science & Technology, Dr Abhay Karandikar is shaping India's innovation agenda at a defining moment.
6 mins
August 2025

Voice and Data
"The future of home Wi-Fi is about smarter, Al-driven networks"
From jitter and latency to interference, spoofed devices, and jamming, WiFi is venturing far beyond its traditional bounds.
4 mins
August 2025

Voice and Data
When machine learns from books: What Indian law must fix
India's first AI copyright case tests how far the law can stretch to keep up with machine learning, global precedents, and the idea of transformative use.
5 mins
August 2025

Voice and Data
Quantum-proofing telecom networks before the storm hits
As quantum threats edge closer, telecom networks must act now to defend sensitive data with hybrid cryptography and quantum-safe strategies.
4 mins
August 2025

Voice and Data
India Q2 tech investment dips; digital infra, communication hold fort
India’s tech sector recorded 60 deals worth USD 460 M in AMJ 2025, marking a steep fall in value, while communication, infra, quantum, and space held firm.
4 mins
August 2025
Voice and Data
Akash Prime hits high-altitude mark with indigenous RF seeker
India successfully tests upgraded Akash Prime system with indigenously developed RF seeker, bolstering high-altitude air defence capabilities.
1 mins
August 2025
Translate
Change font size