Prøve GULL - Gratis

“VPNs often end up creating new security problems”

Voice and Data

|

November 2020

Virtual private networks (VPN), which were originally developed to enable remote workers to connect into the corporate network back when only a fraction of the workforce was working, created new network security headaches when used at a previously unheard of scale with organizations switched to Remote Work overnight during this pandemic. Although VPNs are considered as a quick way for the remote users to get to internal applications, they are slow for users, offer poor security, and are difficult to manage and scale as well. In an interview with Soma Tah, Forcepoint Chief Product Officer Nico Popp elaborates on how zero trust network access (ZTNA) solutions rethink network security functions and are designed to solve the challenges posed by the legacy VPNs.

- Soma Tah

“VPNs often end up creating new security problems”

Nico popp Chief Product Officer, Forcepoint

Why should organizations with existing investments in VPN spend again on ZTNA? Does it offer any tangible benefits over traditional VPN?

VPNs often end up creating new security problems by making remote users part of the internal network. VPNs are also notorious for slowing down cloud apps access, especially for the highly interactive ones and most organizations today are using interactive business cloud applications such as the Google Workspace (formerly Gsuite), O365, and the like.

Users sometimes go to great lengths to avoid using VPNs, leaving themselves unprotected by internal gateways. Then, when they do connect to the VPN, often they are given the same full range of access on internal networks that they would have in the office. They can get to any application, any server, any database, and so on. But it also means that anybody who is pretending to be an authorized user, or who has compromised the user’s laptop or the public Wi-Fi network where they’re connecting from, also can get to anything. Limiting what remote users can access can be done with network security technologies such as firewalls. But setting up intricate rules for controlling which users can get to which parts of the network – called micro-segmentation – requires expertise and can lead to errors as resources move around.

FLERE HISTORIER FRA Voice and Data

Voice and Data

Voice and Data

Rebuilding enterprise DNA with AI-ready platforms

SAP is rebuilding enterprise foundations with AI-ready data fabrics and secure automation frameworks to create a scalable, intelligent infrastructure.

time to read

5 mins

November 2025

Voice and Data

Voice and Data

SECURING THE 5G ENGINE FOR A SAFER DIGITAL WORLD

India's 5G revolution demands a defence-first mindset as cyber threats escalate, making trust, resilience and Zero Trust security essential for a digital economy.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Get smarter SOCs in the age of intelligent threats

Al-powered SOCs are transforming security, combining automation and intelligence to enhance detection, response, and cyber resilience across the industry.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Building the nation's long-term digital spine

India needs a future-proof fibre backbone to deliver reliable, scalable, and mission-critical connectivity for a Viksit Bharat through 2047 and beyond.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

Are telcos ready to let AI take the wheel?

AI is reshaping how networks run, decisions are made, and customer experiences evolve-pushing telcos to prepare for an era where intelligence drives the core.

time to read

4 mins

November 2025

Voice and Data

Voice and Data

IGNITING A NEW ORBIT FOR SPACE RESEARCH

From mission design to Earth observation, HPC is now the hidden engine accelerating simulations, autonomy, and discovery across global space science.

time to read

10 mins

November 2025

Voice and Data

Glasgow scientists develop AI model to decode protein talk

PLM-interact decodes how proteins communicate, predicting interactions and mutations to speed up disease and virus research.

time to read

1 mins

November 2025

Voice and Data

GPS spoofing at IGIA: A wake-up call for national security

The disruption at Indira Gandhi International Airport (IGIA), where more than 800 flights were delayed or diverted following an alleged GPS-spoofing incident, is a wake-up call for India's aviation and communication systems.

time to read

2 mins

November 2025

Voice and Data

Voice and Data

The wireless foundation of neo-industrial growth

India's next phase of growth will be shaped by secure, scalable wireless platforms that unify connectivity, strengthen security, and accelerate innovation.

time to read

2 mins

November 2025

Voice and Data

Voice and Data

Scalable, secure, fast: The Cloud CDN advantage

Cloud-based CDNs are redefining digital performance, delivering speed, security, and scalability at the edge for a seamless user experience.

time to read

4 mins

November 2025

Translate

Share

-
+

Change font size