Close Menu
JustwebworldJustwebworld
  • Business
  • Food
  • Health
  • Lifestyle
  • Tech
  • Home
  • Travel
  • Culture
  • Money
  • People
  • Sports
  • Auto
  • Digital
  • Mind
  • Fashion
  • Gaming
  • Learn
Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn WhatsApp Telegram
Wednesday, April 29
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Terms & Conditions
  • Privacy Policy
JustwebworldJustwebworld
  • Business
  • Food
  • Health
  • Lifestyle
  • Tech
  • Home
  • Travel
  • Culture
  • Money
  • People
  • Sports
  • Auto
  • Digital
  • Mind
  • Fashion
  • Gaming
  • Learn
JustwebworldJustwebworld
Home » Tech » Telework Moves the Perimeter to the Endpoint…Security Should Follow

Telework Moves the Perimeter to the Endpoint…Security Should Follow

By Michael Austin Tech
Facebook Twitter LinkedIn Telegram Pinterest Reddit WhatsApp
Follow Us
WhatsApp Telegram

In the wake of the COVID-19 pandemic, many organizations are considering extended or permanent support for telework. The security challenges associated with the recent surge in support for telework have highlighted the fact that traditional approaches to network security no longer meet the needs of the modern enterprise.

Telecommuting

With the growth in telework, virtual private networks (VPNs) have been shown to be an unscalable solution for secure network connectivity.

As organizations evolve and support increasingly remote workforces, transitioning from legacy VPN infrastructure to modern solutions, such as secure access service edge (SASE) is necessary to ensure both worker productivity and security.

Table of Contents

Toggle
  • Telework Dissolves the Network Perimeter
  • VPNs Degrade Network Performance
  • Scalability Solutions Compromise Security
  • Cloud-Based Security Meets the Needs of Telework

Telework Dissolves the Network Perimeter

In the past, many organizations security relied upon a perimeter-based security model. At the time, an organization’s employees primarily used devices connected directly to the enterprise network.

The main advantage of the perimeter-based security model is that it is simple to understand and implement security under this model. Most organizations have a single point of connection between their internal network and the public Internet through which all traffic entering and leaving the network flows.

By deploying a security stack at this location, an organization maintains visibility into this traffic and is able to identify and respond to a high percentage of malware and other threats attempting to gain access to the enterprise network.

The perimeter-based security model has several issues. A major issue is the fact that a perimeter-based security model assumes that all of an organization’s “trusted” infrastructure lies within the network perimeter.

Also Read: Best Ways to Get More Facebook Likes In 2023 Best Ways to Get More Facebook Likes In 2023

With the rise of cloud computing and remote work, the traditional network perimeter is dissolving. A growing percentage of an organization’s business traffic originates and terminates outside of the network perimeter.

As a result, traditional, perimeter-based security solutions have a significant negative impact on network performance.

VPNs Degrade Network Performance

Most organizations, in an attempt to secure remote workers’ network connections, require remote workers to connect to the enterprise network via a VPN, which encrypts the traffic between the VPN client and a VPN endpoint on the enterprise network.

This approach to teleworker security has a number of negative impacts on network performance. In general, VPNs dramatically increase network latency for cloud-bound traffic since the traffic is routed through the enterprise network before continuing on to its destination.

However, as organizations’ remote workforces grow, VPN infrastructure also experiences scalability issues. Many organizations’ VPN infrastructure is designed to support a fraction of the workforce and is incapable of scaling far beyond the intended maximum capacity.

As the use of enterprise VPNs exceed design parameters, remote workers experience degraded productivity and network performance.

The number of inbound connections exceed the capacity of existing VPN infrastructure, and the need to perform computationally expensive decryption and encryption operations for all inbound and outbound traffic eats up computational resources and slows network throughput.

Scalability Solutions Compromise Security

Organizations are increasingly reliant upon cloud-based infrastructure for core business functionality. Currently, over 93% of organizations have multiple cloud deployments.

This includes everything from cloud-based data storage to web applications hosted on cloud infrastructure to use of Software-as-a-Service (SaaS) applications such as Microsoft 365 or Salesforce.

Also Read: NetNut: In-depth Review (Proxies, Features, Pricing) NetNut: In-depth Review (Proxies, Features, Pricing)

As a result of increased cloud adoption, a high percentage of teleworkers’ network traffic – the same traffic placing strain on enterprise VPN infrastructure – is intended for cloud-based infrastructure outside the organization’s network perimeter.

This traffic intended for external destinations places an especially high load on an organization’s network and security infrastructure. Unlike network traffic bound for servers within the network perimeter, remote workers’ cloud-bound traffic passes through the perimeter twice (inbound and outbound).

As a result, a large contingent of remote workers accessing cloud-based resources has a significant impact on network throughput and performance.

In order to improve the scalability of network and security infrastructure, the use of split-tunnel VPNs have been recommended by Microsoft and other organizations.

Unlike a full-tunnel VPN, which sends all traffic over the encrypted VPN connection, split-tunnel VPNs enable traffic intended for the public Internet (or certain trusted sites on it) to go directly to its destination. This greatly decreases the load on the organization’s perimeter-based security solutions.

However, this increased scalability can come at the cost of security. With direct access to the public Internet, a teleworker’s computer does not benefit from the enterprise’s security scanning for this traffic.

This enables malware to infect the teleworker’s computer and then use it as a stepping stone to infect the enterprise network via its VPN connection.

Cloud-Based Security Meets the Needs of Telework

While VPNs may have been an effective solution in the past, they do not meet the needs of the modern enterprise. With growing numbers of teleworkers and reliance upon cloud-based infrastructure, the network perimeter has moved to these endpoints. Attempting to keep security at the former network perimeter is inefficient and unscalable.

Also Read: 8 Benefits of Netsuite AP Automation 8 Benefits of Netsuite AP Automation

SASE provides security designed for the modern organization. Cloud-based points of presence (PoPs) integrate security functionality, such as a next-generation firewall (NGFW) and secure web gateway (SWG), and the optimized network routing offered by software-defined networking (SD-WAN).

This enables an organization to deploy security at the network edge close to cloud-based resources and teleworkers, which minimizes the latency impacts of routing traffic over the corporate WAN.

SASE enables an organization to maintain network visibility and security scanning while minimizing the associated impacts on network performance and latency for remote workers.

cards
Powered by paypal
Follow on WhatsApp Follow on Telegram
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram WhatsApp Copy Link
Previous ArticleWhat to Do When Computer Keeps Freezing – 6 Proven Solutions
Next Article What are the Qualities That Make a Good Blogger?
Michael Austin
  • Website
  • Facebook
  • X (Twitter)
  • Pinterest
  • Instagram
  • LinkedIn

Michael Austin is an expert writer who loves creating engaging and easy-to-understand content. With years of experience, he specializes in writing well-researched articles that inform, inspire, and entertain readers. His clear and simple writing style makes complex topics easy to grasp. Whether it's trending news, helpful guides, or expert insights, Michael’s content is designed to be valuable and SEO-friendly, ensuring it reaches the right audience. Stay connected for his latest articles!

Related Posts

Google’s Account Activity Features that Record Your All Google Products Activity

Unlock the Web! | Best Ways to Access Blocked Websites (Easy & Safe)

Top 15+ Best Hacking Movies Every Computer Lover Must Watch | Cyber Thrillers, Hackers & Tech Films

What Should You Know About Network Security?

Fast iOS Transfer & Flexible iPhone Files Manager: WinX MediaTrans

Fast Convert (4K) Video, Download Online Video with WinX HD Video Converter Deluxe

Leave A Reply

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 42.3K other subscribers
Categories
Latest Posts

The Challenges of Scientific Writing

Polite Ways to Say No To A Marriage Proposal

At What Age to Buy a Child His First Smartphone?

Latest and Proven Health Solutions Available Under One Roof

What Are the Best Mutual Funds to Invest In 2021?

Top 5 Tips for a More Efficient Power Plant

3 Smart Tips for Brake Pad Replacement

5 Things That Lead To Unnecessary Expenditure And How To Cut On Them

Why Do You Need To Hire A Plumber?

How You Can Make DIY Cosmetics With Essential Oils

The content on this website is provided solely for educational and informational purposes. We do not promote, endorse, or deal in any products, services, or activities mentioned. While we strive to share accurate and up-to-date information, we make no warranties regarding completeness, reliability, or accuracy. Any action you take based on the information found here is strictly at your own risk, and we will not be liable for any losses or damages in connection with the use of our website.

DMCA.com Protection Status
Quick Links
Age Calculator
Angel Number Calculator
Case Converter
Sudoku Online
Word Counter
Love Calculator
Jack Doherty YouTuber
Snake Dream Meaning
Get Rid of Cockroaches
Indian Cricket Team Coaches
Best Volleyball Team Names
Useful Links
Number to Words
Period Calculator
Yes-No Picker Wheel
Demon Name Generator
Kingdom Name Generator
Harry Potter Name Generator
Daddy Yankee Biography
Crocodile Dream Meaning
Goa Budget Trip Guide
Maryse Mizanin WWE Diva
Best Cricket Team Names
Helpful Resources
Colors Name In English
Best Computer Brands
WhatsApp Web
Most Beautiful Beaches
Tesla Cybertruck Review
Richest Actors in the World
India Jarvis Actress
Cat Dream Meaning
Belmar Beach New Jersey
Aryna Sabalenka Tennis Superstar
Best WhatsApp Group Names
Explore More
Good Morning Handsome
Best English Songs of All Time
Cricket World Cup Winners
Ways to Say Rest In Peace
Britain’s Got Talent Winners
American Idol Winners
Dude Perfect Net Worth
Horse Dream Meaning
Ramakrishna Beach Visakhapatnam
Anastasia Potapova Tennis Star
Best Funny Team Names
Facebook X (Twitter) Instagram Pinterest YouTube Tumblr LinkedIn WhatsApp Telegram Threads RSS
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
  • Web Stories
Copyright © 2012-2026. JustWebWorld - All Rights Reserved. | Sitemap

Type above and press Enter to search. Press Esc to cancel.

×

👇 Bonus Reads for You 🎁

gu-icloud-education-management-solutions
GU iCloud Explained: Ultimate Education ERP for Universities & Colleges | Features, Login, Benefits & More!
Best Tech Websites and Blogs 2017
Cool Technology Sites for Latest Tech News and Information
Can Your Boss Look At Your Phone
Can Your Boss Look At Your Phone?
Blood Pressure Monitor
How to Read Blood Pressure Monitor?