Close Menu
JustwebworldJustwebworld
  • Astrology
  • Business & Finance
    • Cryptocurrency
    • Make Money
    • Entrepreneur
    • Brands
    • Companies
    • Personal Finance
      • Banking
      • Insurance
      • Trading and Investing
  • Tech
    • Computing
    • Cybersecurity
    • Electronics
    • Android
    • Apple
    • Gadgets
    • Social Media
    • Mobile Apps
    • Softwares
  • Education
    • Vocabulary
    • Abbreviations
    • General Knowledge
    • Writing & Translation
  • Lifestyle
    • Beauty & Cosmetics
    • Fashion & Style
    • Furniture & Decor
    • Luxury
    • People & Relationships
    • Pets and Animals
    • Shopping
    • Parenting
    • Gardening
    • Birthdays
  • Health
  • Travel
  • Auto
  • Gaming
  • Food
  • Entertainment
  • Sports
Facebook X (Twitter) Instagram
Tuesday, June 17
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Terms & Conditions
  • Privacy Policy
JustwebworldJustwebworld
  • Astrology
  • Business & Finance
    • Cryptocurrency
    • Make Money
    • Entrepreneur
    • Brands
    • Companies
    • Personal Finance
      • Banking
      • Insurance
      • Trading and Investing
  • Tech
    • Computing
    • Cybersecurity
    • Electronics
    • Android
    • Apple
    • Gadgets
    • Social Media
    • Mobile Apps
    • Softwares
  • Education
    • Vocabulary
    • Abbreviations
    • General Knowledge
    • Writing & Translation
  • Lifestyle
    • Beauty & Cosmetics
    • Fashion & Style
    • Furniture & Decor
    • Luxury
    • People & Relationships
    • Pets and Animals
    • Shopping
    • Parenting
    • Gardening
    • Birthdays
  • Health
  • Travel
  • Auto
  • Gaming
  • Food
  • Entertainment
  • Sports
JustwebworldJustwebworld
Home » Technology » Telework Moves the Perimeter to the Endpoint…Security Should Follow

Telework Moves the Perimeter to the Endpoint…Security Should Follow

Michael AustinBy Michael Austin Technology Cybersecurity
Facebook Twitter LinkedIn Telegram Pinterest Reddit Email WhatsApp
Follow Us
WhatsApp Telegram
Share
Facebook Twitter LinkedIn Pinterest Reddit Telegram WhatsApp

In the wake of the COVID-19 pandemic, many organizations are considering extended or permanent support for telework. The security challenges associated with the recent surge in support for telework have highlighted the fact that traditional approaches to network security no longer meet the needs of the modern enterprise.

Telecommuting

With the growth in telework, virtual private networks (VPNs) have been shown to be an unscalable solution for secure network connectivity.

As organizations evolve and support increasingly remote workforces, transitioning from legacy VPN infrastructure to modern solutions, such as secure access service edge (SASE) is necessary to ensure both worker productivity and security.

Table of Contents

Toggle
  • Telework Dissolves the Network Perimeter
  • VPNs Degrade Network Performance
  • Scalability Solutions Compromise Security
  • Cloud-Based Security Meets the Needs of Telework

Telework Dissolves the Network Perimeter

In the past, many organizations security relied upon a perimeter-based security model. At the time, an organization’s employees primarily used devices connected directly to the enterprise network.

The main advantage of the perimeter-based security model is that it is simple to understand and implement security under this model. Most organizations have a single point of connection between their internal network and the public Internet through which all traffic entering and leaving the network flows.

By deploying a security stack at this location, an organization maintains visibility into this traffic and is able to identify and respond to a high percentage of malware and other threats attempting to gain access to the enterprise network.

The perimeter-based security model has several issues. A major issue is the fact that a perimeter-based security model assumes that all of an organization’s “trusted” infrastructure lies within the network perimeter.

Also Read: How To Choose A Payment Gateway In India: A Complete 12-Step Checklist How To Choose A Payment Gateway In India: A Complete 12-Step Checklist

With the rise of cloud computing and remote work, the traditional network perimeter is dissolving. A growing percentage of an organization’s business traffic originates and terminates outside of the network perimeter.

As a result, traditional, perimeter-based security solutions have a significant negative impact on network performance.

VPNs Degrade Network Performance

Most organizations, in an attempt to secure remote workers’ network connections, require remote workers to connect to the enterprise network via a VPN, which encrypts the traffic between the VPN client and a VPN endpoint on the enterprise network.

This approach to teleworker security has a number of negative impacts on network performance. In general, VPNs dramatically increase network latency for cloud-bound traffic since the traffic is routed through the enterprise network before continuing on to its destination.

However, as organizations’ remote workforces grow, VPN infrastructure also experiences scalability issues. Many organizations’ VPN infrastructure is designed to support a fraction of the workforce and is incapable of scaling far beyond the intended maximum capacity.

As the use of enterprise VPNs exceed design parameters, remote workers experience degraded productivity and network performance.

The number of inbound connections exceed the capacity of existing VPN infrastructure, and the need to perform computationally expensive decryption and encryption operations for all inbound and outbound traffic eats up computational resources and slows network throughput.

Scalability Solutions Compromise Security

Organizations are increasingly reliant upon cloud-based infrastructure for core business functionality. Currently, over 93% of organizations have multiple cloud deployments.

This includes everything from cloud-based data storage to web applications hosted on cloud infrastructure to use of Software-as-a-Service (SaaS) applications such as Microsoft 365 or Salesforce.

Also Read: Rumors on Release Date of Sony Xperia Z3, Specification and Its Price Rumors on Release Date of Sony Xperia Z3, Specification and Its Price

As a result of increased cloud adoption, a high percentage of teleworkers’ network traffic – the same traffic placing strain on enterprise VPN infrastructure – is intended for cloud-based infrastructure outside the organization’s network perimeter.

This traffic intended for external destinations places an especially high load on an organization’s network and security infrastructure. Unlike network traffic bound for servers within the network perimeter, remote workers’ cloud-bound traffic passes through the perimeter twice (inbound and outbound).

As a result, a large contingent of remote workers accessing cloud-based resources has a significant impact on network throughput and performance.

In order to improve the scalability of network and security infrastructure, the use of split-tunnel VPNs have been recommended by Microsoft and other organizations.

Unlike a full-tunnel VPN, which sends all traffic over the encrypted VPN connection, split-tunnel VPNs enable traffic intended for the public Internet (or certain trusted sites on it) to go directly to its destination. This greatly decreases the load on the organization’s perimeter-based security solutions.

However, this increased scalability can come at the cost of security. With direct access to the public Internet, a teleworker’s computer does not benefit from the enterprise’s security scanning for this traffic.

This enables malware to infect the teleworker’s computer and then use it as a stepping stone to infect the enterprise network via its VPN connection.

Cloud-Based Security Meets the Needs of Telework

While VPNs may have been an effective solution in the past, they do not meet the needs of the modern enterprise. With growing numbers of teleworkers and reliance upon cloud-based infrastructure, the network perimeter has moved to these endpoints. Attempting to keep security at the former network perimeter is inefficient and unscalable.

Also Read: How To Setup Google Chromecast In Few Simple Steps How To Setup Google Chromecast In Few Simple Steps

SASE provides security designed for the modern organization. Cloud-based points of presence (PoPs) integrate security functionality, such as a next-generation firewall (NGFW) and secure web gateway (SWG), and the optimized network routing offered by software-defined networking (SD-WAN).

This enables an organization to deploy security at the network edge close to cloud-based resources and teleworkers, which minimizes the latency impacts of routing traffic over the corporate WAN.

SASE enables an organization to maintain network visibility and security scanning while minimizing the associated impacts on network performance and latency for remote workers.

Join 25,000+ smart readers—don’t miss out!

Follow on WhatsApp Follow on Telegram
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram WhatsApp Copy Link
Previous ArticleGreat Slots to Try This Summer
Next Article Best Online Gaming Sites | Online Best Games
Michael Austin
  • Website
  • Facebook
  • X (Twitter)
  • Pinterest
  • Instagram
  • LinkedIn

Michael Austin is an expert writer who loves creating engaging and easy-to-understand content. With years of experience, he specializes in writing well-researched articles that inform, inspire, and entertain readers. His clear and simple writing style makes complex topics easy to grasp. Whether it's trending news, helpful guides, or expert insights, Michael’s content is designed to be valuable and SEO-friendly, ensuring it reaches the right audience. Stay connected for his latest articles!

Related Posts

How to Use Virtual Numbers for 24/7 Customer Support | Boost Customer Service & Business Communication

How AI Is Changing Lead Generation for Small Businesses In 2025

AI Tools for Building MVPs: How Founders Skip the Dev Backlog in 2025

China Telecom and ZTE Launched AI-Powered Generative Intelligent Network at Barcelona’s MWC25

The Most Effective Ways To Get Cash For Your Laptop In The City Today

Airtel Broadband: The Best Unlimited Data Plans for Your Home Internet

Leave A Reply

Join 25K+ smart readers!
Categories
Latest Posts

Martin Lawrence: TV Shows, Films, Real Life, Net Worth & Shocking Facts You Didn’t Know!

Who is Kat Timpf? – Full Bio, Husband, Baby, Net Worth & Her Brave Career Journey (2025)

India Vs England Cricket Teams: Full Players List, Squads, Captains & Key Players

Chappell Roan Biography: Age, Height, Real Name, Top Songs, Albums, Net Worth 2025

Why Every Blogger and YouTuber Needs A Trademark In 2025

How to Use Virtual Numbers for 24/7 Customer Support | Boost Customer Service & Business Communication

Rick Ross: Net Worth, Biography, Albums, Lifestyle & Rap Career 2025 | The Untold Story of Hip-Hop’s Biggest Boss

Why Is Term Insurance Still Relevant After Retirement?

How to Choose the Best 4 Burner Gas Stove for Commercial Kitchens

Easy Ways to Boost Toddler Brain Development at Home | Fun, Proven & Pediatrician-Approved Activities!

DMCA.com Protection Status
Quick Links
Age Calculator
Angel Number Calculator
Case Converter
Sudoku Online
Word Counter
Love Calculator
Useful Links
Number to Words
Period Calculator
Yes-No Picker Wheel
Demon Name Generator
Kingdom Name Generator
Harry Potter Name Generator
Helpful Resources
Colors Name In English
Best Computer Brands
WhatsApp Web
Most Beautiful Beaches
Tesla Cybertruck Review
Richest Actors in the World
Explore More
Good Morning Handsome
Best English Songs of All Time
Cricket World Cup Winners
Ways to Say Rest In Peace
Britain’s Got Talent Winners
American Idol Winners
Facebook X (Twitter) Instagram Pinterest YouTube Tumblr LinkedIn WhatsApp Telegram Threads RSS
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
  • Web Stories
Copyright © 2012-2025. JustWebWorld - All Rights Reserved. | Sitemap

Type above and press Enter to search. Press Esc to cancel.

×

👇 Bonus Reads for You 🎁

Most Common Phone Problems
7 Most Common Phone Problems and Their Solutions
Keep Your Kids Entertained on a Long Trip
Top Tech To Keep The Kids Amused On Your Travels
Aircall: VoIP Phone System
Your Complete Guide to Understanding Aircall’s VoIP Phone System
Revenue Cycle Management
How Revenue Cycle Management Can Help Your Healthcare Practice?