https://www.engineeringnews.co.za
Business|Components|Design|Environment|SECURITY|Service|Systems|Technology|Solutions
Business|Components|Design|Environment|SECURITY|Service|Systems|Technology|Solutions
business|components|design|environment|security|service|systems|technology|solutions

Has VPN reached end of life?

5th July 2022

     

Font size: - +

This article has been supplied as a media statement and is not written by Creamer Media. It may be available only for a limited time on this website.

By Simeon Tassev, MD and QSA at Galix

As organisations have moved increasingly into the cloud and remote working has become both a requirement and the norm, the traditional borders of the enterprise have shifted and become more amorphous. This means that securing networks and connections can become challenging given the limitations of certain technologies. As a result, there has been a lot of hype around Zero-Trust Network Access (ZTNA) replacing the traditional Virtual Private Network (VPN) solutions. While ZTNA is definitely a more effective solution for a remote or cloud-based environment, VPN technology is by no means dead. Completely cloud-native enterprises are few and far between, with the vast majority looking to run in hybrid scenarios for the foreseeable future, which means VPN still has many practical uses and will for years to come. 

The case for VPN

The original Internet Protocol Security (IPsec VPN) protocol was developed and designed for a very specific purpose – to connect sites and individuals to an internal network. Another variation of this, known as Secure Sockets Layer (SSL VPN), was evolved to enable users to connect remotely to a client site using their browser as a client. These narrow use cases meant that there are inherent limitations built into the design of the VPN. It was built specifically to allow policies to be designed and enforced before connecting, to limit and control access per user and per network. This works hand in hand with firewalling rules and segmentation on the network. 

These inherent limitations are the most common reason given as to why VPN technology is outdated and has reached end of life. However, the reality is that for the purposes of a large number of businesses, it remains a practical solution in many scenarios. Most businesses are not entirely invested into the cloud, and legacy solutions remain in place, so VPN is still useful. Simply replacing this protocol with the latest and greatest for the sake of having new technology is expensive, disruptive and unnecessary. 

Where zero trust becomes a must

Where ZTNA becomes essential is as more and more cloud solutions are adopted, as the perimeter becomes less defined and therefore requires different controls. The zero-trust model provides access based on identity, irrespective of the location of the user, and permissions can be dynamically granted based on the specific characteristics of the network a user is connecting from. For example, if the user is on a trusted network, they can be given a greater level of access than if they were connecting from a public network in an airport or coffee shop. This is not something that can easily be achieved using VPN.

ZTNA gives organisations the ability to control access and assign policies on a far more granular level, which makes it a more flexible solution better suited to borderless networking. However, organisations need to remember that ZTNA is not a solution on its own, it is simply a concept and a model that needs to form part of a greater architecture. ZTNA forms part of the Secure Access Service Edge (SASE) framework, and works in tandem with other components like Secure Web Gateway (SWG), Cloud Access Security Brokers (CASB)and Software-Defined Wide Area Network (SD-WAN) to provide secure network access. 

Taking the complexities in stride

The more businesses open to the cloud, the more difficult it becomes to control the perimeter, so technologies that are applicable in a borderless world become important. ZTNA is the next evolution of security for borderless networking environments, but it is not a silver bullet. The best solution, or rather mix of solutions, depends on a variety of different factors, including the specifics of the network and the environment, and the budget and risk appetite of the business. 

VPN is not dead, it still has a role to play especially with regard to securing legacy systems on premises, but ZTNA becomes important when making use of cloud or Software as a Service (SaaS) solutions. However, as with any new implementation, a zero-trust approach comes at a cost and has implications on the business. To ensure that a business is leveraging the best (and most cost effective) solution for their needs, it is essential to engage with a technology partner that understands the requirements and dependencies of the environment and can deliver secure access without the risk.

Edited by Creamer Media Reporter

Comments

Showroom

Booyco Electronics
Booyco Electronics

Booyco Electronics, South African pioneer of Proximity Detection Systems, offers safety solutions for underground and surface mining, quarrying,...

VISIT SHOWROOM 
VEGA Controls SA (Pty) Ltd
VEGA Controls SA (Pty) Ltd

For over 60 years, VEGA has provided industry-leading products for the measurement of level, density, weight and pressure. As the inventor of the...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Magazine round up | 19 April 2024
Magazine round up | 19 April 2024
19th April 2024

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.074 0.125s - 162pq - 2rq
Subscribe Now