SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers
Story image

VPNs are falling short: Why it’s time to move to Zero Trust

Today

For years, Virtual Private Networks (VPNs) have been the go-to solution for securing remote access.

But today, they're more of a hindrance than a help. VPNs simply weren't designed for the way we work now: remotely, flexibly, and with a whole range of devices outside the traditional office perimeter.

If your business is still relying on a VPN, it's time to seriously consider making a shift to Zero Trust Network Access (ZTNA). VPNs are outdated, limited, and increasingly a risk to security and productivity. It's clear that moving to Zero Trust is the only path forward.

Why VPNs Are Struggling to Keep Up
The limitations of VPNs are evident. Originally built for employees working in-office on managed devices, VPNs are now stretched thin with 44% of employees working remotely and 50% using their own devices to access internal resources. Access is controlled by context-poor IP addressing and access lists. The growing reliance on third-party access also adds a layer of complexity that VPNs simply weren't built to handle.

VPNs now add risk and inefficiency. They're cumbersome for IT teams to maintain and struggle to provide adequate security and reliable performance for remote work. They impact productivity, as employees often experience frustrating bottlenecks and delays when accessing tools through VPNs. For IT and connectivity teams, VPNs are a time-consuming drain, with constant troubleshooting and a deluge of tickets as end-users grapple with performance issues and leave security teams inept to make concise access policies that limit application and infrastructure exposure to these connections. 

Beyond Perimeter Security: The Need for Zero Trust
Modern security can't rely on perimeter-based models anymore. We're working in cloud environments, using mobile devices, and accessing resources from various locations. The Zero Trust approach assumes that no user or device should automatically be trusted, whether they're inside the corporate network or not. Instead, Zero Trust requires verification of the Identity and the Device that the identity is using, ensuring only the right people access the right resource from secured devices.

This shift to Zero Trust is more in line with the way we operate today, where users and data are distributed across various locations.

Moving to ZTNA can alleviate the many issues VPNs create. ZTNA is designed to provide precise, conditional access to specific resources, without exposing the broader network. This not only strengthens security but enhances user experience by allowing employees to access the applications they need without the lag or instability that often plagues VPNs. Further, IT teams can shift their focus to from establishing and maintaining a trusted internal network in office and branch offices to having a simpler model that provides stable internet connections with no access to internal resources.  

Business Agility Requires More Than VPNs
The complexities VPNs bring aren't limited to security. They're a major roadblock to business agility. VPNs complicate onboarding, delay new employees' access to tools, and require intensive IT management. Moving to Zero Trust, however, streamlines onboarding and offers centralised control, allowing IT teams to manage access with greater flexibility and fewer headaches.

VPNs may even affect talent retention. Frustration with clunky tech is a legitimate reason for employees to leave their jobs. Research shows nearly half of workers say they would consider quitting if their workplace technology is inadequate. With Zero Trust, you can offer a seamless, efficient experience that lets employees focus on their work, not on waiting for systems to catch up.

How to Transition from VPNs to ZTNA
Transitioning away from VPNs doesn't have to be an all-or-nothing shift. In fact, most successful transitions to ZTNA happen in stages.

Start small by identifying high-impact areas where ZTNA can provide immediate value—critical applications, high-risk users, or sensitive data that need stronger security controls. With a successful rollout in place, you can expand ZTNA access to more applications and users, gradually reducing reliance on VPNs.

In many cases, having internal alignment and executive sponsorship is crucial to a smooth transition.

Replacing a VPN system requires cross-functional collaboration, as the project impacts multiple departments and workflows. Engaging stakeholders from both IT and security teams and ensuring buy-in from leadership can set your organisation up for success.

Real-World Success Stories: The Value of ZTNA in Action
We've seen companies of all sizes make the switch to Zero Trust and realise immediate benefits. One major media company, for example, found itself under heavy cyber threat during the Russia-Ukraine conflict, which forced it to rethink its approach to security. Within 48 hours of implementing a ZTNA solution, they restored stable, secure access to their critical applications, protecting thousands of users without the disruption that comes with VPN systems.

This rapid response helped maintain business continuity and minimise potential fallout.

Another company found that moving to ZTNA reduced its dependency on legacy systems, offloading significant traffic from its VPNs and freeing up IT resources. The result was faster, more reliable access for its remote teams and lower costs for the business. These companies prove that moving to Zero Trust can create a more resilient, responsive security posture while reducing operational strain on IT teams.

Don't Delay: The Cost of Waiting is Too High
While some organisations are hesitant to make a change, the reality is that staying with VPNs carries risks. Delaying a transition to Zero Trust means ongoing inefficiency, elevated security risk, and potential liability. As the threat landscape becomes more sophisticated, waiting to update your security model only compounds these risks.

Beyond security, there are real cost implications as well. The inefficiencies VPNs create don't just frustrate users; they cost the company. Every IT ticket, every delayed connection, and every slow onboarding process has a price tag attached. Moving to ZTNA can significantly reduce these costs by streamlining access, improving productivity, reducing the volume of IT support requests, and of course reducing the reliance and need for internal network security appliances.

Choosing the Right ZTNA Provider
Not all ZTNA solutions are equal. Selecting a provider that can offer flexible deployment, agentless support, and seamless integration with your existing infrastructure can make a world of difference. Cloudflare Zero Trust encapsulates the connections from the device and applies policies to the Identity of the user and security posture of the device in near real-time that is evaluated throughout the connection to the destination resource, be it internal backend infrastructure, internal or cloud applications.

The right provider should also be able to deliver security services close to the end user, ensuring a low-latency, high-performance experience that boosts productivity and keeps your teams happy.

By moving to a Zero Trust model, organisations can not only strengthen their security but also simplify IT operations and reduce costs.

ZTNA is a scalable, future-ready approach to secure access that aligns with today's hybrid work environments, giving organisations the resilience and flexibility they need to grow.

Moving Forward
If you're still on the fence about replacing your VPN, consider the long-term impact of staying with outdated technology. A proactive shift to Zero Trust not only future-proofs your security but also positions your organisation for more agile, efficient operations. The risks of relying on VPNs are too high to ignore, especially when the path to Zero Trust is straightforward and achievable in phases.

Embracing Zero Trust isn't just a technology upgrade; it's an essential move to protect your business, support your people, and drive your organisation forward in a secure and efficient way.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X