Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise Services

The evolution of the corporate VPN: How COVID-19 has redefined VPN security

By Ankit Badani
VPN for remote workers
March 16, 2021

The COVID-19 pandemic has forced network administrators back to the drawing board in 2020-21. Pre-pandemic, corporate VPN was a luxury provided to remote workers, travelling employees and C-suite management, which only formed a small percentage of the workforce.

Now, it has become the essential service upon which a whole organization relies. There are different ways that organizations are scaling their VPN capabilities. From integrating native user VPN solutions to deploying application VPN solutions, companies are looking to deploy physical device or cloud devices. Some organizations have utilized a hybrid approach, where cloud devices are added on top of existing infrastructure. This model works well with the option of scaling down virtual devices after more users start coming back to the office.

Corporate VPN solutions can be broadly divided into user VPN solutions or application VPN solutions. Both solutions have distinctive advantage. User VPN solutions focus on delivering secured remote access to users which require access to multiple resources. User VPN solutions are limited by the specifications of the firewalls. However, firewalls have a great control over the data that passes through them. Security policies and different threat protection policies ensure that devices connecting to the corporate VPN are regulated and meet the defined requirements. To reduce non-corporate traffic, split-tunneling can be enabled, which send only corporate traffic over the VPN tunnel. Exposure of different users and groups can be minimized by creating policies that allow them access to select resources.

Application VPN solution in contrast allows access to only an application or a resource. Application VPN solutions are deployed in the internal network, where they act as the gateway for users’ connections. Remote users authenticate themselves to the VPN’s cloud platform which redirects requests to the VPN gateway. Application VPN gateway communicates with internal resources and creates sessions for remote users. Hence, a single application can be made available for many users without compromising any other resource on the network. The solution is perfect for organizations with many users requesting access to fewer applications.

Regardless of the solution, the challenges for any Chief Information Security Officer (CISO) for building a secure and robust architecture for VPN service are greater then ever. User VPN solutions provide administrators control over more aspects of the remote device then application VPN solutions. Administrators can build security policies which can scan and identify different threats that remote devices can possess.

When firewalls are subscribed to threat updates, it ensures organizations are protected against newer threats. Though subscriptions come at a very steep price in some cases, to reduce operating cost of firewalls while providing same security capabilities, organizations tend to deploy the desired vendor’s firewalls on a cloud platform. Organizations can deploy virtual firewalls in different locations and utilize cloud platform’s network to deliver traffic back to the corporate network.

Organizations can scale up or down the virtual firewalls as needed, with greater ROIs compared with physical firewalls. In some cases, user VPN solutions have successfully identified an infected system. With the help of automation tools and features, firewalls can quarantine such systems until a complete analysis of the device isn’t completed. Such features along with regular security updates can strengthen any organization’s infrastructure.

Enterprise security teams deploy application VPN solutions when the costs of virtual or physical firewall seem too high. Application VPN solutions do not offer the same security capabilities as a traditional firewall. Such solutions have visibility into only the browsers, system OS and a few other systems. Hence, administrators must also rely on the firewall to inspect the traffic from the solution’s cloud platform to VPN gateway.

Organizations do not have to scale virtual infrastructure as they can utilize their solution provider’s global presence to deliver services to different geographical users. Application VPN solutions are independent of the native system and only rely on a browser. A vulnerability in a browser can cause a security concern in some cases. Application VPN solutions are drastically different from destination NAT policies or port forwarding, which may be less secure remote access solutions.

Keeping many different considerations in mind, enterprise security leaders must build their security infrastructure around users and applications. With many larger organizations opting for letting most of their users work remotely indefinitely, VPN services have risen in priority for any CISO. As health experts have pointed out that COVID-19 may stay longer then expected, the same can be said about the VPN.

KEYWORDS: CISO coronavirus COVID-19 enterprise cyber security enterprise security solutions virtual private network

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ankit Badani is CEO of SK Networks. He owns a small Managed Service Provider business which specializes in IT Security and Networking. When he is not working, he likes to watch movies, read and travel with family. His favorite sports organizations include F.C. Barcelona, Mumbai Indians and Cloud9.     

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • employee support during pandemic can really help mental health, burnout

    The impact of COVID-19 has devastated workers’ mental wellbeing; which types of jobs are most affected and what can employers do?

    See More
  • sustainability-security-fp1170x658.jpg

    The hidden environmental costs of VPN gateways

    See More
  • GSOC

    How existing physical security systems can help campuses mitigate the spread of COVID-19

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing