Close Menu
JustwebworldJustwebworld
  • Astrology
  • Business & Finance
    • Cryptocurrency
    • Make Money
    • Entrepreneur
    • Brands
    • Companies
    • Personal Finance
      • Banking
      • Insurance
      • Trading and Investing
  • Tech
    • Computing
    • Cybersecurity
    • Electronics
    • Android
    • Apple
    • Gadgets
    • Social Media
    • Mobile Apps
    • Softwares
  • Education
    • Vocabulary
    • Abbreviations
    • General Knowledge
    • Writing & Translation
  • Lifestyle
    • Beauty & Cosmetics
    • Fashion & Style
    • Furniture & Decor
    • Luxury
    • People & Relationships
    • Pets and Animals
    • Shopping
    • Parenting
    • Gardening
    • Birthdays
  • Health
  • Travel
  • Auto
  • Gaming
  • Food
  • Entertainment
  • Sports
Facebook X (Twitter) Instagram
Wednesday, May 21
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Terms & Conditions
  • Privacy Policy
JustwebworldJustwebworld
  • Astrology
  • Business & Finance
    • Cryptocurrency
    • Make Money
    • Entrepreneur
    • Brands
    • Companies
    • Personal Finance
      • Banking
      • Insurance
      • Trading and Investing
  • Tech
    • Computing
    • Cybersecurity
    • Electronics
    • Android
    • Apple
    • Gadgets
    • Social Media
    • Mobile Apps
    • Softwares
  • Education
    • Vocabulary
    • Abbreviations
    • General Knowledge
    • Writing & Translation
  • Lifestyle
    • Beauty & Cosmetics
    • Fashion & Style
    • Furniture & Decor
    • Luxury
    • People & Relationships
    • Pets and Animals
    • Shopping
    • Parenting
    • Gardening
    • Birthdays
  • Health
  • Travel
  • Auto
  • Gaming
  • Food
  • Entertainment
  • Sports
JustwebworldJustwebworld
Home » Technology

Telework Moves the Perimeter to the Endpoint…Security Should Follow

Michael AustinBy Michael Austin Technology Cybersecurity
Facebook Twitter LinkedIn Telegram Pinterest Reddit Email WhatsApp
Follow Us
WhatsApp Telegram
Share
Facebook Twitter LinkedIn Pinterest Reddit Telegram WhatsApp

In the wake of the COVID-19 pandemic, many organizations are considering extended or permanent support for telework. The security challenges associated with the recent surge in support for telework have highlighted the fact that traditional approaches to network security no longer meet the needs of the modern enterprise.

Telecommuting

With the growth in telework, virtual private networks (VPNs) have been shown to be an unscalable solution for secure network connectivity.

As organizations evolve and support increasingly remote workforces, transitioning from legacy VPN infrastructure to modern solutions, such as secure access service edge (SASE) is necessary to ensure both worker productivity and security.

Table of Contents

Toggle
  • Telework Dissolves the Network Perimeter
  • VPNs Degrade Network Performance
  • Scalability Solutions Compromise Security
  • Cloud-Based Security Meets the Needs of Telework

Telework Dissolves the Network Perimeter

In the past, many organizations security relied upon a perimeter-based security model. At the time, an organization’s employees primarily used devices connected directly to the enterprise network.

The main advantage of the perimeter-based security model is that it is simple to understand and implement security under this model. Most organizations have a single point of connection between their internal network and the public Internet through which all traffic entering and leaving the network flows.

By deploying a security stack at this location, an organization maintains visibility into this traffic and is able to identify and respond to a high percentage of malware and other threats attempting to gain access to the enterprise network.

The perimeter-based security model has several issues. A major issue is the fact that a perimeter-based security model assumes that all of an organization’s “trusted” infrastructure lies within the network perimeter.

Also Read: Ordinal Inscriptions: The Newest Innovation In the Web3 Space Ordinal Inscriptions: The Newest Innovation In the Web3 Space

With the rise of cloud computing and remote work, the traditional network perimeter is dissolving. A growing percentage of an organization’s business traffic originates and terminates outside of the network perimeter.

As a result, traditional, perimeter-based security solutions have a significant negative impact on network performance.

VPNs Degrade Network Performance

Most organizations, in an attempt to secure remote workers’ network connections, require remote workers to connect to the enterprise network via a VPN, which encrypts the traffic between the VPN client and a VPN endpoint on the enterprise network.

This approach to teleworker security has a number of negative impacts on network performance. In general, VPNs dramatically increase network latency for cloud-bound traffic since the traffic is routed through the enterprise network before continuing on to its destination.

However, as organizations’ remote workforces grow, VPN infrastructure also experiences scalability issues. Many organizations’ VPN infrastructure is designed to support a fraction of the workforce and is incapable of scaling far beyond the intended maximum capacity.

As the use of enterprise VPNs exceed design parameters, remote workers experience degraded productivity and network performance.

The number of inbound connections exceed the capacity of existing VPN infrastructure, and the need to perform computationally expensive decryption and encryption operations for all inbound and outbound traffic eats up computational resources and slows network throughput.

Scalability Solutions Compromise Security

Organizations are increasingly reliant upon cloud-based infrastructure for core business functionality. Currently, over 93% of organizations have multiple cloud deployments.

This includes everything from cloud-based data storage to web applications hosted on cloud infrastructure to use of Software-as-a-Service (SaaS) applications such as Microsoft 365 or Salesforce.

Also Read: iToolab WatsGo – Easily Transfer WhatsApp From Android to iPhone iToolab WatsGo – Easily Transfer WhatsApp From Android to iPhone

As a result of increased cloud adoption, a high percentage of teleworkers’ network traffic – the same traffic placing strain on enterprise VPN infrastructure – is intended for cloud-based infrastructure outside the organization’s network perimeter.

This traffic intended for external destinations places an especially high load on an organization’s network and security infrastructure. Unlike network traffic bound for servers within the network perimeter, remote workers’ cloud-bound traffic passes through the perimeter twice (inbound and outbound).

As a result, a large contingent of remote workers accessing cloud-based resources has a significant impact on network throughput and performance.

In order to improve the scalability of network and security infrastructure, the use of split-tunnel VPNs have been recommended by Microsoft and other organizations.

Unlike a full-tunnel VPN, which sends all traffic over the encrypted VPN connection, split-tunnel VPNs enable traffic intended for the public Internet (or certain trusted sites on it) to go directly to its destination. This greatly decreases the load on the organization’s perimeter-based security solutions.

However, this increased scalability can come at the cost of security. With direct access to the public Internet, a teleworker’s computer does not benefit from the enterprise’s security scanning for this traffic.

This enables malware to infect the teleworker’s computer and then use it as a stepping stone to infect the enterprise network via its VPN connection.

Cloud-Based Security Meets the Needs of Telework

While VPNs may have been an effective solution in the past, they do not meet the needs of the modern enterprise. With growing numbers of teleworkers and reliance upon cloud-based infrastructure, the network perimeter has moved to these endpoints. Attempting to keep security at the former network perimeter is inefficient and unscalable.

Also Read: SumoSearch: Ultimate Tool for Phone Number Tracking SumoSearch: Ultimate Tool for Phone Number Tracking

SASE provides security designed for the modern organization. Cloud-based points of presence (PoPs) integrate security functionality, such as a next-generation firewall (NGFW) and secure web gateway (SWG), and the optimized network routing offered by software-defined networking (SD-WAN).

This enables an organization to deploy security at the network edge close to cloud-based resources and teleworkers, which minimizes the latency impacts of routing traffic over the corporate WAN.

SASE enables an organization to maintain network visibility and security scanning while minimizing the associated impacts on network performance and latency for remote workers.

Follow on WhatsApp Follow on Telegram
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram WhatsApp Copy Link
Previous ArticleGreat Slots to Try This Summer
Next Article Best Online Gaming Sites | Online Best Games
Michael Austin
  • Website
  • Facebook
  • X (Twitter)
  • Pinterest
  • Instagram
  • LinkedIn

Michael Austin is an expert writer who loves creating engaging and easy-to-understand content. With years of experience, he specializes in writing well-researched articles that inform, inspire, and entertain readers. His clear and simple writing style makes complex topics easy to grasp. Whether it's trending news, helpful guides, or expert insights, Michael’s content is designed to be valuable and SEO-friendly, ensuring it reaches the right audience. Stay connected for his latest articles!

Related Posts

AI Tools for Building MVPs: How Founders Skip the Dev Backlog in 2025

China Telecom and ZTE Launched AI-Powered Generative Intelligent Network at Barcelona’s MWC25

The Most Effective Ways To Get Cash For Your Laptop In The City Today

Airtel Broadband: The Best Unlimited Data Plans for Your Home Internet

DeepSeek: The Future of Intelligent Search | AI-Driven Answers in Seconds

How to Choose the Best Proxy Provider for Your Needs

Leave A Reply

Categories
Archives

The Price of Keeping Financial Secrets in a Marriage

Latest Anime Saga Codes (May 2025) – Redeem Free Rewards | Before They Expire!

Jose Alvarado NBA 2025: Inspiring Journey, Impressive Stats, Big Contract & Puerto Rico Pride

Who is Hazel Brugger? Top Swiss Comedian, Eurovision Host & Comedy Queen of Europe

Luke Kornet Full Player Profile | Age, Height, Net Worth, Career Stats 2025

Who Is Brent Faiyaz? Age, Songs, Albums, Net Worth & Tour 2025

FaZe Rug Net Worth, Age, Girlfriend, House & Career | Must Read

Happy Father’s Day Wishes & Quotes | Heartfelt Messages, Sayings & Captions for Dad 2025

Why Stewart Vickers Is the Best SEO Expert in the World

Diljit Dosanjh : Latest Songs, Movies, Net Worth, Concerts & Full Biography

DMCA.com Protection Status
Quick Links
Age Calculator
Angel Number Calculator
Case Converter
Sudoku Online
Word Counter
Love Calculator
Useful Links
Number to Words
Period Calculator
Yes-No Picker Wheel
Demon Name Generator
Kingdom Name Generator
Harry Potter Name Generator
Helpful Resources
Colors Name In English
Best Computer Brands
WhatsApp Web
Most Beautiful Beaches
Tesla Cybertruck Review
Richest Actors in the World
Explore More
Good Morning Handsome
Best English Songs of All Time
Cricket World Cup Winners
Ways to Say Rest In Peace
Britain’s Got Talent Winners
American Idol Winners
Facebook X (Twitter) Instagram Pinterest YouTube Tumblr LinkedIn WhatsApp Telegram Threads RSS
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
  • Web Stories
Copyright © 2012-2025. JustWebWorld - All Rights Reserved. | Sitemap

Type above and press Enter to search. Press Esc to cancel.

×

👇 Bonus Reads for You 🎁

On Demand Food Delivery Apps
The Future of On Demand Food Delivery Apps
Guide To Safer Logins And Passwords
A Guide to Keeping Your Logins And Passwords Secure In 2021
Managing Your Employees
Managing Your Employees Effectively With Technology
FAX from iPhone
What Can You Do With A Fax App On iPhone?