It’s time to replace legacy VPNs with Zero Trust Network Access. Here’s why – YourStory

Founded in 2002, Jamf is a recognised tech leader that creates IT software that manages Apple devices. More than 50,000 organisations rely on Jamf to manage over 20 million devices, including 24 of the 25 most valuable brands across industries all over the world. In addition to Apple, the company has also expanded its offerings to support Windows and Android.

In July 2021, the company acquired Wandera, a leader in Zero Trust Cloud Security and Access. With the acquisition, Jamf is uniquely positioned to help IT and security teams confidently protect devices, data, and applications while extending the intended Apple experience through the most robust and scalable Apple Enterprise Management platform in the market.

At YourStory’s TechSparks 2021, India’s most influential startup-tech conference, Adam Boynton, Regional Sales Manager, Wandera, a Jamf company, highlighted why there is a need for a Zero Trust Network Access model and how it can deliver value for companies. 

More than half of all internet traffic is associated with a mobile device. And with so many organisations taking to hybrid work, mobile is now part of a normal workday for most employees.

Business applications are following a similar path, transitioning out of the data centre into the cloud. Today, more than 85 percent of business applications are being hosted in cloud platforms, which increases business agility and makes employees more productive than ever. 

The fundamental challenges with VPNs 

“The way IT services are delivered and consumed has fundamentally changed enterprise security. With significant advances in cloud computing and mobile technologies, data is no longer constrained to corporate data centres, which obviously means the enterprise perimeter has fallen,” Adam explained.

He shared that while traditionally, virtual private network (VPN) has been the way in which businesses have enabled access to their employees, it is now becoming a legacy solution.

A critical design flaw of the VPN is that it is insecure by design.

“VPN tools typically connect users to remote network segments that house multiple applications. This means any user or an attacker that can get onto the network to access a single application can also access everything else within the network.”

Large VPN deployments are also complex to manage, in some cases needing large dedicated teams. The other most often overlooked challenge with VPNs is its impact on productivity. In addition to slow connection speeds, VPN significantly impacts the device’s battery.

“VPNs were not designed with end-users in mind,” Adam shared, going on to explain why a Zero Trust Network Access becomes the most sought-after technology to replace a legacy VPN. 

Understanding Zero Trust Network Access

Zero Trust Network Access is fundamentally an IT security model that requires strict verification of every individual device that attempts to access sensitive resources on the network, no matter where they are located.

“The first principle of Zero Trust Network Access is trust no one,” Adam said. 

Adam also explained how the identity and authentication of an end-user is a cornerstone of the model.

“So, one way to think of Zero Trust Network Access is that it creates and manages individualised perimeters containing two entities – the user and the application with which they are interacting. So before connecting to an application, the user and the device …….

Source: https://yourstory.com/2021/11/zero-trust-network-access-replace-legacy-vpns/amp

Leave a Reply

Your email address will not be published. Required fields are marked *