DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Document

Beyond VPN: Zero Trust Access in Hybrid Work Environment

Zscaler

Reading Time: 2 mins read
in Document, Report

The virtual private network (VPN) has been a powerful tool in the network security administrator’s toolbox for decades, because it has provided a means for remote computers to communicate securely across an untrusted network such as the internet.

Whether for branch offices communicating with headquarters (site-to-site), or an employee working from home (remote access), the VPN provided a secure point-to-point tunnel back to resources on protected networks.

VPNs were an effective tool for Public Sector network security when the majority of network traffic was on premises. When VPNs were introduced in the late ‘90s, proprietary applications were in the data center. Cloud hosting of apps didn’t exist. Users going off-premises was the exception rather than the rule.

But times—and the ways we work—have changed.

According to a recent survey, the majority of public sector employees expect to continue teleworking post. Respondents said that before COVID-19, they telecommuted an average of two days per week.

During the lockdown, that jumped to nearly the entire work week. It’s clear that for these employees, remote and hybrid work is the new normal, with those survey respondents not expecting to go back to the office full time, citing that they are likely to work remotely at least three and a half days per week.

One challenge with VPN in these new circumstances is that VPN connectivity comes with a performance tradeoff: Routing traffic through narrow, dedicated, persistent point-to-point tunnels via indirect security gateways—secure as it may be—adds considerable latency as compared to direct on-the-network data travel.

And the full-tunnel VPN approach to protecting outbound traffic—carrying it inbound first, for inspection by an on-premises security stack—only exacerbates the problem.

When those inconveniences affected only that small minority of remote-work network traffic, the pros may have outweighed the cons. While the federal government had been slowly expanding remote work, the pandemic response radically sped the process, bringing the drawbacks of VPN into the spotlight: the more remote users, the more constrained the bandwidth. Not to mention, the worse the user experience

 

GET DOCUMENT

Tags: CybersecurityDocumentsGovernmentReportsVPNVPN DocumentsVPN ReportsZScaler
ADVERTISEMENT

Related Posts

National cyber threat assessment 2023–2024

National cyber threat assessment 2023–2024

March 21, 2023
2023 SonicWall Cyber Threat Report

2023 SonicWall Cyber Threat Report

March 21, 2023
Sophos 2023 Threat Report

Sophos 2023 Threat Report

March 21, 2023
CrowdStrike 2023 Global Threat Report

CrowdStrike 2023 Global Threat Report

March 21, 2023

More Articles

Personal data of nearly 750,000 Hoosiers accessed improperly

August 18, 2021
Alerts

Ransomware Risk in Unpatched, EOL SonicWall SRA and SMA 8.x Products

July 15, 2021

Arrested DevOps – Podcast

January 27, 2022
Incidents

Colombian energy supplier EPM hit by BlackCat ransomware attack

December 16, 2022

APT19

August 11, 2021
Quotes

“There are more people in the U.S. protecting…”

May 6, 2022

Connecting & Merging the World with IOT

September 5, 2020
Quotes

“Ransomware is unique among cyber-crime…”

March 23, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.