network

Traditional VPN v.s. Zero Trust Architecture

Introduction To gain access to enterprise resources, the traditional solution architecture is use VPN. For today’s cloud services, there is also zero trust architecture. If you have on-premises resources, using a traditional VPN-based remote access architecture is one way of balancing remote usability with the risk of compromise. If you have few or no on-premises services, the VPN may not required, the zero trust architecture can be very effective. If you are designing a new network, consider following the zero trust network approach instead.