“VPNs often end up creating new security problems”
Voice and Data|November 2020
Virtual private networks (VPN), which were originally developed to enable remote workers to connect into the corporate network back when only a fraction of the workforce was working, created new network security headaches when used at a previously unheard of scale with organizations switched to Remote Work overnight during this pandemic. Although VPNs are considered as a quick way for the remote users to get to internal applications, they are slow for users, offer poor security, and are difficult to manage and scale as well. In an interview with Soma Tah, Forcepoint Chief Product Officer Nico Popp elaborates on how zero trust network access (ZTNA) solutions rethink network security functions and are designed to solve the challenges posed by the legacy VPNs.
Soma Tah

Nico popp Chief Product Officer, Forcepoint

Why should organizations with existing investments in VPN spend again on ZTNA? Does it offer any tangible benefits over traditional VPN?

VPNs often end up creating new security problems by making remote users part of the internal network. VPNs are also notorious for slowing down cloud apps access, especially for the highly interactive ones and most organizations today are using interactive business cloud applications such as the Google Workspace (formerly Gsuite), O365, and the like.

Users sometimes go to great lengths to avoid using VPNs, leaving themselves unprotected by internal gateways. Then, when they do connect to the VPN, often they are given the same full range of access on internal networks that they would have in the office. They can get to any application, any server, any database, and so on. But it also means that anybody who is pretending to be an authorized user, or who has compromised the user’s laptop or the public Wi-Fi network where they’re connecting from, also can get to anything. Limiting what remote users can access can be done with network security technologies such as firewalls. But setting up intricate rules for controlling which users can get to which parts of the network – called micro-segmentation – requires expertise and can lead to errors as resources move around.

Continue reading your story on the app

Continue reading your story in the magazine

MORE STORIES FROM VOICE AND DATAView All

The five musketeers of 2021

Investments in cloud-telephony, SD-WAN, data security, data center infrastructure, and 5G will drive the new normal and recovery in post-pandemic India

4 mins read
Voice and Data
December 2020

Strengthen your network security chain

A poorly-protected WFH device can be the weakest link exposing your organization’s network to cybercriminals. Here are eight simple steps to handle it

5 mins read
Voice and Data
December 2020

Speed verses quality is a classic balancing act

As the world of content bursts with never-before spread of choice and convenience, developers have a lot to catch up. Can they sacrifice speed for reliability, security, scalability and experience? Or should they use low-code as a tool or as a quick-fix that can raise its head later with other issues? Here’s why OTT applications need a different mix of automation and flexibility. OutSystems Asia Pacific Vice President mark weaser in an email interview with Shubhendu Parth shares how the industry is using AI to move apps across development, test and production environments at a single click. He also touches upon why PWAs, native environments and multi-device worlds have a serious connotation for the developers busy binge-coding for OTT.

10+ mins read
Voice and Data
December 2020

Seamless and secure

Network security infrastructure should have features that can enable enhanced data security along with unhindered access to data. Here is how to achieve it

5 mins read
Voice and Data
December 2020

SD-WAN is now on the investment priority list

Nokia claims that its Data Center Fabric solution enhances design and operations for all cloud builders. Made for webscale companies, service providers and enterprises, it offers cloud builder networking teams an open network operating system (NOS) and a declarative, intent-based automation and operations toolkit. In an interview with Pradeep Chakraborty, the company’s Emerging Business and Enterprise Head for India Vinish Bawa talks about the post-COVID-19 data center trends, the growing demand for SD-WAN and how it is evolving, the Data center Interconnect (DCI) Network, and the new offering. Excerpts:

6 mins read
Voice and Data
December 2020

KYC- and OTP-related scams up, unwanted calls down

Despite a 34% decrease in the volume of spam calls during lockdown, India continues to find place in the top 10 list of most spammed countries

4 mins read
Voice and Data
December 2020

Building a better, secure payments future

Mobile, cashless payments and e-commerce market competencies are the decisive factors driving the move toward a cashless society model

3 mins read
Voice and Data
December 2020

GET READY FOR MORE CLOUD IN FINANCIAL SECTOR

Decision makers are seeking to balance agility and scalability of the cloud with requirements for cyber security, compliance, and operational consistency

4 mins read
Voice and Data
December 2020

Pandemic Drives The Change

Economic and societal impact of COVID-19 will drive faster adoption of cloud, intelligent edge, digital reality and telemedicine

4 mins read
Voice and Data
December 2020

“VPNs often end up creating new security problems”

Virtual private networks (VPN), which were originally developed to enable remote workers to connect into the corporate network back when only a fraction of the workforce was working, created new network security headaches when used at a previously unheard of scale with organizations switched to Remote Work overnight during this pandemic. Although VPNs are considered as a quick way for the remote users to get to internal applications, they are slow for users, offer poor security, and are difficult to manage and scale as well. In an interview with Soma Tah, Forcepoint Chief Product Officer Nico Popp elaborates on how zero trust network access (ZTNA) solutions rethink network security functions and are designed to solve the challenges posed by the legacy VPNs.

4 mins read
Voice and Data
November 2020