When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Recently, I attended CloudNativeSecurityCon in Seattle.
Most talks centered around Zero Trust, and how to implement these patterns in moderncloudarchitectures.
Notably absent from any talks was the discussion ofVPNs.
VPNs are starting to be viewed as out-of-date in the new world of Zero Trust.
To differentiate the two, Ill use the example of traditional officesecurityvs modern office security.
This security only existed at the perimeter.
Now consider a modern office.
Its both more secure and more fine-grained, allowing you to control who has access to what.
Zero Trust is a lot like the modern office, checking your identity every time you access a resource.
There is overlap in both directions, but this is in line with the general thinking.
However, there is a bit of a misnomer going on here.
Zero Trust isnt a thing that you could purchase, you have to implement it.
Its a methodology, a pattern, with the goal of achieving zero trust.
Meanwhile, an equal and opposite misnomer is being applied to the VPN.
There are now modern VPN products which significantly reshape how we think about these tools.
And similar to DevOps or Agile, its not just a framework, its a culture shift.
So for one, its just taking them time.
In such cases, a VPN gives them the solution they need.
Here, VPNs remain strongly in use.
But more generally, consider the modern office again.
By combining a perimeter VPN with a Zero Trust architecture, you might have the best of both worlds.
These new VPNs come equipped with technology that helps accelerate a strong security posture.
Speed
Modern VPNs are utilizing newencryptionmethodologies like WireGuard, which dramatically increase the speed of connections.
Point to point
Traditional VPNs were often point-to-site or site-to-site.
By comparison, Point-to-Point VPNs connect a specific machine directly to another specific machine.
These VPNs are increasingly adding access controls which take on pieces of a Zero Trust implementation.
In fact, youll see some VPN products today advertise themselves as Zero Trust solutions.
By using both, organizations can secure against attacks from the outside, and from within.
We’ve featured the best business security system.
The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.
If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro