Gå ubegrenset med Magzter GOLD

Gå ubegrenset med Magzter GOLD

Få ubegrenset tilgang til over 9000 magasiner, aviser og premiumhistorier for bare

$149.99
 
$74.99/År

Prøve GULL - Gratis

“VPNs often end up creating new security problems”

Voice and Data

|

November 2020

Virtual private networks (VPN), which were originally developed to enable remote workers to connect into the corporate network back when only a fraction of the workforce was working, created new network security headaches when used at a previously unheard of scale with organizations switched to Remote Work overnight during this pandemic. Although VPNs are considered as a quick way for the remote users to get to internal applications, they are slow for users, offer poor security, and are difficult to manage and scale as well. In an interview with Soma Tah, Forcepoint Chief Product Officer Nico Popp elaborates on how zero trust network access (ZTNA) solutions rethink network security functions and are designed to solve the challenges posed by the legacy VPNs.

- Soma Tah

“VPNs often end up creating new security problems”

Nico popp Chief Product Officer, Forcepoint

Why should organizations with existing investments in VPN spend again on ZTNA? Does it offer any tangible benefits over traditional VPN?

VPNs often end up creating new security problems by making remote users part of the internal network. VPNs are also notorious for slowing down cloud apps access, especially for the highly interactive ones and most organizations today are using interactive business cloud applications such as the Google Workspace (formerly Gsuite), O365, and the like.

Users sometimes go to great lengths to avoid using VPNs, leaving themselves unprotected by internal gateways. Then, when they do connect to the VPN, often they are given the same full range of access on internal networks that they would have in the office. They can get to any application, any server, any database, and so on. But it also means that anybody who is pretending to be an authorized user, or who has compromised the user’s laptop or the public Wi-Fi network where they’re connecting from, also can get to anything. Limiting what remote users can access can be done with network security technologies such as firewalls. But setting up intricate rules for controlling which users can get to which parts of the network – called micro-segmentation – requires expertise and can lead to errors as resources move around.

FLERE HISTORIER FRA Voice and Data

Voice and Data

Voice and Data

Reimagining Earth through a living digital twin

A new geospatial alliance led by Aechelon seeks to build a real-time digital twin of Earth, merging satellite, radar, and Al for dynamic intelligence.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Telcos find new lifeline in spectrum slicing

As revenues shrink and competition intensifies, spectrum-as-a-service offers telcos a shared model to unlock growth while empowering enterprises.

time to read

7 mins

October 2025

Voice and Data

Voice and Data

Rethinking enterprise connectivity with managed Wi-Fi

As digital transformation accelerates, managed Wi-Fi is emerging as the backbone of agile, secure, and insight-driven enterprise connectivity in India.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Beyond VPN: Building trust into network access

As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Banking on richer, safer digital conversations

RCS redefines banking communication with verified security, two-way interactivity, and measurable engagement that builds digital trust at lower cost.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Powering India's cloud with sustainable data hubs

India's data centre boom is reshaping digital infrastructure, demanding clean energy, local innovation, and policy alignment to sustain its growth.

time to read

5 mins

October 2025

Voice and Data

Voice and Data

Made in India: Building the backbone of loT hardware

From imported modules to home-grown chips, India's loT hardware story is evolving into one of design control, ecosystem depth, and strategic resilience.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Breaking data barriers with light

Li-Fi uses the power of light to deliver ultra-fast, secure, and interference-free connectivity-illuminating a new frontier in digital communication.

time to read

7 mins

October 2025

Voice and Data

Voice and Data

Cyber defence redefined as firewalls give way to foresight

Data security is evolving from reactive protection to predictive foresight— unifying platforms, intelligence, and AI to make organisations breach-ready.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Connecting the currents of digital finance

India's telcos are building the invisible pipes that keep digital payments, inclusion, and innovation flowing across the nation's financial ecosystem.

time to read

5 mins

October 2025

Translate

Share

-
+

Change font size