It’s time to replace legacy VPNs with Zero Trust Network Access. Here’s why –


Founded in 2002, Jamf is a recognised tech leader that creates IT software that manages Apple devices. More than 57,000 organisations and managing over 25 million devices, including 24 of the 25 most valuable brands across industries all over the world. In addition to Apple, the company has also expanded its offerings to support Windows and Android.

In July 2021, the company acquired Wandera, a leader in Zero Trust Cloud Security and Access. With the acquisition, Jamf is uniquely positioned to help IT and security teams confidently protect devices, data, and applications while extending the intended Apple experience through the most robust and scalable Apple Enterprise Management platform in the market.

At YourStory’s TechSparks 2021, India’s most influential startup-tech conference, Adam Boynton, Regional Sales Manager, Wandera, a Jamf company, highlighted why there is a need for a Zero Trust Network Access model and how it can deliver value for companies. 

More than half of all internet traffic is associated with a mobile device. And with so many organisations taking to hybrid work, mobile is now part of a normal workday for most employees.

Business applications are following a similar path, transitioning out of the data centre into the cloud. Today, more than 85 percent of business applications are being hosted in cloud platforms, which increases business agility and makes employees more productive than ever. 

The fundamental challenges with VPNs 

“The way IT services are delivered and consumed has fundamentally changed enterprise security. With significant advances in cloud computing and mobile technologies, data is no longer constrained to corporate data centres, which obviously means the enterprise perimeter has fallen,” Adam explained.

He shared that while traditionally, virtual private network (VPN) has been the way in which businesses have enabled access to their employees, it is now becoming a legacy solution.

A critical design flaw of the VPN is that it is insecure by design.

“VPN tools typically connect users to remote network segments that house multiple applications. This means any user or an attacker that can get onto the network to access a single application can also access everything else within the network.”

Large VPN deployments are also complex to manage, in some cases needing large dedicated teams. …….


RSS Feeds

Related Posts