- Community Home
- >
- HPE Networking
- >
- Networking
- >
- The end of tunnel vision: Why companies are ditchi...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
The end of tunnel vision: Why companies are ditching VPNs for Zero Trust
Virtual private networks (VPNs) have been the workhorse of secure remote access for decades. They offer a seemingly simple solution: they create a secure tunnel between a user's device and the corporate network, granting them access to internal resources.
However, as our workforces become increasingly mobile and cloud-based, companies are recognizing the limitations of VPNs in this new hybrid world — and are seeking a more secure, user-friendly, and scalable solution.
Enter Zero Trust Network Access (ZTNA), a security model rapidly gaining traction
According to the 2024 VPN Risk report by Cybersecurity Insiders, 98% of businesses currently use a VPN service, and 92% of users use a VPN at least once a week. However, 56% of companies are considering alternatives to traditional VPNs. Security concerns are a significant driver of this shift, along with poor user experience, with 81% of users being dissatisfied with their VPN and 65% of organizations having three or more VPN gateways to support, causing complex management.
The report highlights a growing number of organizations (92%) are concerned that VPNs will jeopardize their ability to secure their environments, reflecting a clear industry-wide trend toward a more robust security posture.
Let's delve deeper into the factors driving this shift away from VPNs and towards ZTNA:
The security minefield of VPNs:
While VPNs offer a basic level of security, their inherent design creates vulnerabilities.
- Wide-open gates: VPNs establish a broad access tunnel into the corporate network. This unrestricted access makes it easier for unauthorized users to exploit compromised credentials or gain access by piggybacking on legitimate connections. Once they gain a valid login, hackers can infiltrate the network, potentially wreaking havoc.
- Target-rich environment: VPNs themselves can become targets for cyberattacks. Phishing campaigns aimed at stealing VPN credentials are on the rise. Additionally, vulnerabilities in VPN software can be exploited to gain unauthorized access to the network.
The management maze of VPNs:
As companies embrace cloud-based applications and services, managing secure access through a single VPN becomes cumbersome and complex.
- Point-to-point purgatory: Traditional VPNs require point-to-point connections between user devices and the corporate network. This becomes a logistical nightmare when managing access to a growing number of cloud applications and resources.
- Security stack sprawl: Adding additional security solutions like multi-factor authentication (MFA) to VPNs creates a complex security stack. This patchwork approach increases the risk of misconfigurations and vulnerabilities, weakening the overall security posture.
- Administrative overload: Managing and maintaining multiple VPN configurations for a distributed workforce can significantly burden IT teams. This complexity slows down onboarding times and hinders overall network agility.
The user friction of VPNs:
The user experience with VPNs can be frustrating and hinder productivity.
- Slow connections and lag: VPN connections can introduce latency and slow down application performance, impacting user experience and productivity.
- Compatibility chaos: VPNs can be incompatible with specific devices and applications, requiring troubleshooting and workarounds.
- Constant login hurdles: Users often repeatedly log in to the VPN client and corporate resources, creating unnecessary friction and disrupting workflows.
The rise of zero trust: a more secure and streamlined approach
Zero Trust Network Access (ZTNA) offers a compelling alternative to VPNs by adopting a "never trust, always verify" approach. Here's how ZTNA addresses the shortcomings of VPNs:
- Granular access control: ZTNA grants access based on a user's unique identity, device, location, and the specific application or resource they need. This minimizes the attack surface and reduces the potential for lateral movement within the network if a breach occurs. Even if a hacker gains access to a user's credentials, they would be limited to the specific resource they were authorized for.
- Seamless cloud integration: ZTNA integrates seamlessly with cloud-based applications, eliminating the need for complex network configurations and point-to-point connections. This simplifies IT management and reduces the overall attack surface. Users can access authorized cloud resources directly without needing to access the corporate network first.
- Simplified user experience: ZTNA eliminates the need for cumbersome VPN connections. Users can access authorized resources directly with minimal friction, improving productivity and overall user experience.
The road to zero trust: challenges and considerations
While ZTNA offers significant benefits, implementing a zero trust architecture requires careful planning and integration with existing security tools. Here are some key considerations:
- Planning and integration: A successful ZTNA deployment requires careful planning and integration with existing identity management and access control systems. This ensures a smooth user experience and minimizes disruption during the transition.
- User training: Educating users on ZTNA and proper security practices is crucial for its success. Users need to understand the importance of strong passwords.
Related topics
Jaye_Tillson
Jaye Tillson is a Field CTO and Distinguished Technologist at HPE Aruba Networking (formerly Axis Security), boasting over 25 years of invaluable expertise in successfully implementing strategic global technology programs. With a strong focus on digital transformation, Jaye has been instrumental in guiding numerous organizations through their zero-trust journey, enabling them to thrive in the ever-evolving digital landscape. Jaye's passion lies in collaborating with enterprises, assisting them in their strategic pursuit of zero trust. He takes pride in leveraging his real-world experience to address critical issues and challenges faced by these businesses. Beyond his professional pursuits, Jaye co-founded the SSE Forum and co-hosts its popular podcast called 'The Edge.' This platform allows him to engage with a broader audience, fostering meaningful discussions on industry trends and innovations. In his leisure time, Jaye indulges in his passions for motor racing, savoring delectable cuisine, and exploring the wonders of the world through his travels.
- Back to Blog
- Newer Article
- Older Article
-
AI-Powered
23 -
AI-Powered Networking
17 -
Analytics and Assurance
4 -
Aruba Unplugged
7 -
Cloud
9 -
Corporate
3 -
customer stories
4 -
Data Center
15 -
data center networks
19 -
digital workplace
2 -
Edge
4 -
Enterprise Campus
9 -
Events
5 -
Government
10 -
Healthcare
2 -
Higher Education
2 -
Hospitality
4 -
Industries
1 -
IoT
8 -
Large Public Venue
1 -
Location Services
3 -
Manufacturing
1 -
midsize business
1 -
mobility
17 -
Network as a Service (NaaS)
12 -
Partner Views
4 -
Primary Education
1 -
Retail
1 -
SASE
21 -
SD-WAN
12 -
Security
94 -
small business
1 -
Solutions
7 -
Technical
5 -
Uncategorized
1 -
Wired Wireless WAN
82 -
women in technology
2
- « Previous
- Next »