VPNs are dead. Long Live Identity-Aware Proxies

Sat G
Version 1
Published in
6 min readJun 1, 2020

--

Virtual Private Networks (VPNs) have been around for decades, providing security for remote access to organisational resources. The technology is mature, common and reliable. However, there is a new kid on the block: Identity-Aware Proxies (IAPs) which form part of the Zero Trust Security Model. IAPs are vying to replace the use of VPNs.

Virtual Private Networks (VPNs)

VPNs provide secure access to resources. They are a safe way for users to connect to organisational networks over the internet from remote locations. Once a user is connected to a VPN, they are able to access services, applications and resources that reside within the network.

VPNs operate by having client software installed on a device such as a laptop or mobile phone. This software connects to a VPN gateway which is a server that sits on the perimeter of the organisation network. It receives connections, authorises them and allows them into the network.

It sounds like there is nothing wrong with VPNs

VPNs are the sledgehammers of providing secure access to an organisation’s resources. They are binary. Once you have authenticated with the VPN, you are inside the perimeter. This gives a user connected to a VPN, the potential to access to all of…

--

--