DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Document

ZTNA vs On-Premises Firewall VPN for the Remote Workspace

Perimeter 81

Reading Time: 2 mins read
in Document, Report

The virtual private network (VPN) has been a powerful tool in the network security administrator’s toolbox for decades, because it has provided a means for remote computers to communicate securely across an untrusted network such as the internet.

Whether for branch offices communicating with headquarters (site-to-site), or an employee working from home (remote access), the VPN provided a secure point-to-point tunnel back to resources on protected networks.

VPNs were an effective tool for Public Sector network security when the majority of network traffic was on premises. When VPNs were introduced in the late ‘90s, proprietary applications were in the data center. Cloud hosting of apps didn’t exist. Users going off-premises was the exception rather than the rule.

But times—and the ways we work—have changed.

According to a recent survey, the majority of public sector employees expect to continue teleworking post. Respondents said that before COVID-19, they telecommuted an average of two days per week.

During the lockdown, that jumped to nearly the entire work week. It’s clear that for these employees, remote and hybrid work is the new normal, with those survey respondents not expecting to go back to the office full time, citing that they are likely to work remotely at least three and a half days per week.

One challenge with VPN in these new circumstances is that VPN connectivity comes with a performance tradeoff: Routing traffic through narrow, dedicated, persistent point-to-point tunnels via indirect security gateways—secure as it may be—adds considerable latency as compared to direct on-the-network data travel.

And the full-tunnel VPN approach to protecting outbound traffic—carrying it inbound first, for inspection by an on-premises security stack—only exacerbates the problem.

When those inconveniences affected only that small minority of remote-work network traffic, the pros may have outweighed the cons. While the federal government had been slowly expanding remote work, the pandemic response radically sped the process, bringing the drawbacks of VPN into the spotlight: the more remote users, the more constrained the bandwidth. Not to mention, the worse the user experience

 

GET DOCUMENT

Tags: CybersecurityDocumentsGovernmentPerimeter 81ReportsVPNVPN DocumentsVPN ReportsZero Trust
ADVERTISEMENT

Related Posts

National cyber threat assessment 2023–2024

National cyber threat assessment 2023–2024

March 21, 2023
2023 SonicWall Cyber Threat Report

2023 SonicWall Cyber Threat Report

March 21, 2023
Sophos 2023 Threat Report

Sophos 2023 Threat Report

March 21, 2023
CrowdStrike 2023 Global Threat Report

CrowdStrike 2023 Global Threat Report

March 21, 2023

More Articles

Jobs

ISSO – Accenture Federal Services

September 27, 2022
CyberStory

CyberStory: A 79-year-old victim of fraud

February 3, 2022
Course

SDLC Overview (1 Hour) – Course

March 10, 2022
Incidents

HPE says hackers breached Aruba Central using stolen access key

November 11, 2021
Alerts

Malware Dropper Found in 9 Apps on Google’s Play Store

March 23, 2021
Certification

Certified Penetration Testing Professional | CPENT

October 4, 2020

Leakware or doxware

March 24, 2021
Quotes

“The certification of 5G networks emerges as…”

April 2, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.