{"id":365,"date":"2019-06-12T06:01:19","date_gmt":"2019-06-12T12:01:19","guid":{"rendered":"http:\/\/access-solutions.com\/?p=365"},"modified":"2019-06-12T06:43:27","modified_gmt":"2019-06-12T12:43:27","slug":"is-it-time-to-replace-the-traditional-vpn","status":"publish","type":"post","link":"http:\/\/access-solutions.com\/index.php\/2019\/06\/12\/is-it-time-to-replace-the-traditional-vpn\/","title":{"rendered":"Is it Time to Replace the Traditional VPN?"},"content":{"rendered":"\n<p>Virtual Private Networks (VPNs) were developed over 20 years\nago to provide users with the ability to access corporate resources located\nwithin the company\u2019s local data center. Since most employees worked on-site and\nusually only a handful worked remote, the traditional VPN approach worked fine.\nHowever, today with the proliferation of laptops and mobile devices, along with\nthe increased use of cloud (SaaS) solutions, the traditional model is in the\nneed of a redesign and refresh. <\/p>\n\n\n\n<p>With the traditional VPN approach, users would create a\nsecure tunnel back to the corporate data center and access system resources\nthat way. Today organizations utilize applications in the \u201ccloud\u201d, such as\nMicrosoft Office 365, Google G Suite, Salesforce and numerous others. Since\nthese solutions are also used by on-site employees, the company has probably\nimplemented a \u201csecure\u201d connection into the various cloud infrastructures and\ncould require remote workers to connect via the corporate data center and\ntraditional VPN. <\/p>\n\n\n\n<p>According to Gartner Research, \u201centerprise access\nrequirements are growing ever more complex due to application dynamics, cloud\nadoption and mergers. To cut through this complexity, technical professionals\nshould explore Software Defined Perimeter (SDP) \u2013 a new technology whose\nstrength lies in facilitating access to enterprise apps.\u201d<\/p>\n\n\n\n<h4><strong>What is a Software-Defined Perimeter (SDP)?<\/strong><\/h4>\n\n\n\n<p>A Software-Defined Perimeter (SDP) is an approach that\nprovides secure access to enterprise applications and systems. <\/p>\n\n\n\n<p>In today\u2019s environment the network \u201cperimeter\u201d is gradually\ndisappearing as more organizations expand their use of cloud services and allow\nmore and more employees to work remotely. SDP creates network connections\nbetween the user and the resources\/systems that they have permission to access.\nSDP uses client software on the end-user device, along with servers, gateways and\nan orchestration engine, that is used to define the end-user privileges. &nbsp;<\/p>\n\n\n\n<p>SDP can be implemented in a variety of ways, either offered\nas a cloud service, on-premise or both, but the underlying principle is that a\nuser must first connect to the gateway or server before access is granted to\nany resource or application. Services are hidden from all users and once\nauthenticated a user will only see the services that they have been granted\naccess to. The level of trust can be context-based with levels defined based on\nthe type of device (corporate device, personal\/home computer, phone) along with\nother criteria such as location, time-of-day, etc., which helps reduce that attack\nsurface. <\/p>\n\n\n\n<p>Rethinking the approach to providing remote access to\nenterprise resources and systems with a Software-Defined Perimeter (SDP) architecture\nbrings zero trust to remote access and allows more granular security controls\nto be deployed, protecting those resources and systems. <\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><a href=\"https:\/\/access-solutions.com\/index.php\/blog\/feed\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" src=\"http:\/\/access-solutions.com\/wp-content\/uploads\/2019\/06\/rss-logo.png\" alt=\"\" class=\"wp-image-352\" width=\"105\" height=\"57\"\/><\/a><figcaption><a href=\"https:\/\/access-solutions.com\/index.php\/blog\/feed\/\">Subscribe to Our Blog<\/a><\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Virtual Private Networks (VPNs) were developed over 20 years ago to provide users with the ability to access corporate resources located within the company\u2019s local data center. Since most employees worked on-site and usually only a handful worked remote, the traditional VPN approach worked fine. However, today with the proliferation of laptops and mobile devices, along with the increased use of cloud (SaaS) solutions, the traditional model is in the&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[14,15,7],"_links":{"self":[{"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/posts\/365"}],"collection":[{"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":2,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/posts\/365\/revisions"}],"predecessor-version":[{"id":367,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/posts\/365\/revisions\/367"}],"wp:attachment":[{"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=365"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/access-solutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}