Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise Services

The evolution of the corporate VPN: How COVID-19 has redefined VPN security

By Ankit Badani
VPN for remote workers
March 16, 2021

The COVID-19 pandemic has forced network administrators back to the drawing board in 2020-21. Pre-pandemic, corporate VPN was a luxury provided to remote workers, travelling employees and C-suite management, which only formed a small percentage of the workforce.

Now, it has become the essential service upon which a whole organization relies. There are different ways that organizations are scaling their VPN capabilities. From integrating native user VPN solutions to deploying application VPN solutions, companies are looking to deploy physical device or cloud devices. Some organizations have utilized a hybrid approach, where cloud devices are added on top of existing infrastructure. This model works well with the option of scaling down virtual devices after more users start coming back to the office.

Corporate VPN solutions can be broadly divided into user VPN solutions or application VPN solutions. Both solutions have distinctive advantage. User VPN solutions focus on delivering secured remote access to users which require access to multiple resources. User VPN solutions are limited by the specifications of the firewalls. However, firewalls have a great control over the data that passes through them. Security policies and different threat protection policies ensure that devices connecting to the corporate VPN are regulated and meet the defined requirements. To reduce non-corporate traffic, split-tunneling can be enabled, which send only corporate traffic over the VPN tunnel. Exposure of different users and groups can be minimized by creating policies that allow them access to select resources.

Application VPN solution in contrast allows access to only an application or a resource. Application VPN solutions are deployed in the internal network, where they act as the gateway for users’ connections. Remote users authenticate themselves to the VPN’s cloud platform which redirects requests to the VPN gateway. Application VPN gateway communicates with internal resources and creates sessions for remote users. Hence, a single application can be made available for many users without compromising any other resource on the network. The solution is perfect for organizations with many users requesting access to fewer applications.

Regardless of the solution, the challenges for any Chief Information Security Officer (CISO) for building a secure and robust architecture for VPN service are greater then ever. User VPN solutions provide administrators control over more aspects of the remote device then application VPN solutions. Administrators can build security policies which can scan and identify different threats that remote devices can possess.

When firewalls are subscribed to threat updates, it ensures organizations are protected against newer threats. Though subscriptions come at a very steep price in some cases, to reduce operating cost of firewalls while providing same security capabilities, organizations tend to deploy the desired vendor’s firewalls on a cloud platform. Organizations can deploy virtual firewalls in different locations and utilize cloud platform’s network to deliver traffic back to the corporate network.

Organizations can scale up or down the virtual firewalls as needed, with greater ROIs compared with physical firewalls. In some cases, user VPN solutions have successfully identified an infected system. With the help of automation tools and features, firewalls can quarantine such systems until a complete analysis of the device isn’t completed. Such features along with regular security updates can strengthen any organization’s infrastructure.

Enterprise security teams deploy application VPN solutions when the costs of virtual or physical firewall seem too high. Application VPN solutions do not offer the same security capabilities as a traditional firewall. Such solutions have visibility into only the browsers, system OS and a few other systems. Hence, administrators must also rely on the firewall to inspect the traffic from the solution’s cloud platform to VPN gateway.

Organizations do not have to scale virtual infrastructure as they can utilize their solution provider’s global presence to deliver services to different geographical users. Application VPN solutions are independent of the native system and only rely on a browser. A vulnerability in a browser can cause a security concern in some cases. Application VPN solutions are drastically different from destination NAT policies or port forwarding, which may be less secure remote access solutions.

Keeping many different considerations in mind, enterprise security leaders must build their security infrastructure around users and applications. With many larger organizations opting for letting most of their users work remotely indefinitely, VPN services have risen in priority for any CISO. As health experts have pointed out that COVID-19 may stay longer then expected, the same can be said about the VPN.

KEYWORDS: CISO coronavirus COVID-19 enterprise cyber security enterprise security solutions virtual private network

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ankit Badani is CEO of SK Networks. He owns a small Managed Service Provider business which specializes in IT Security and Networking. When he is not working, he likes to watch movies, read and travel with family. His favorite sports organizations include F.C. Barcelona, Mumbai Indians and Cloud9.     

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • sustainability-security-fp1170x658.jpg

    The hidden environmental costs of VPN gateways

    See More
  • employee support during pandemic can really help mental health, burnout

    The impact of COVID-19 has devastated workers’ mental wellbeing; which types of jobs are most affected and what can employers do?

    See More
  • cyber_lock

    COVID-19 and the need for a national cyber director: How the response to the pandemic illustrates the importance of a leadership

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing