Even before the pandemic, the lines between office and home life had begun to blur. In 2019, ESG research found that employees spent an average of six hours per week1 doing work-related tasks outside of office hours, with 68% of respondents indicating that this occurred multiple times per week. Most commonly, this involved something simple, such as checking email, though some employees regularly worked outside of the office, necessitating remote access to corporate applications and resources. However, the scale of this dynamic fundamentally changed due to the COVID-19 pandemic. In fact, ESG research has found that an average of 61% of employees now work remotely, more than three times the number prior to the pandemic (see Figure 1).2
Source: Enterprise Strategy Group
Source: Enterprise Strategy Group
• Poor security. VPNs are visible on the public internet. When vulnerabilities in these tools are discovered, this visibility is used by attackers to gain entry into the corporate network. Further, VPNs connect users to the network rather than specific applications, allowing users to have broader visibility and access to corporate resources than they should otherwise have. Compromised credentials provide an attacker with access to an entire swath of resources, enabling reconnaissance and lateral movement. Finally, VPN encryption cloaks malicious insider and outside behavior from most security inspection, allowing an attacker to remain undetected for an extended period of time.
• Lack of scalability. Because VPNs are typically deployed as appliances, increasing capacity can be difficult. This issue was highlighted during the pandemic when organizations with networks architected to support a workforce that was minimally remote had to acquire, provision, and configure additional hardware appliances to support a work-from-home model. Further, the need for VPN agents on endpoints complicates certain remote access use cases, including employee-owned devices, third-party access, and mergers and acquisitions.
• Siloed management. Remote access VPNs are typically deployed as siloed tools, requiring dedicated policy management. Further, they only support broad, network-level visibility rather than application- or user-based reporting. Both these issues have only been highlighted as security tool sprawl continues to increase and granular visibility is increasingly required to understand what is happening on the network.
1 Source: ESG Research Report, 2019 Digital Work Survey, Dec 2019. All ESG research references and charts in this white paper have been taken from this master survey results set, unless otherwise indicated.
2 Source: ESG Master Survey Results, The State of Zero Trust Security Strategies, May 2021.
3 Source: ESG Master Survey Results, Transitioning Network Security Controls to the Cloud, July 2021.
This ESG White Paper was commissioned by Palo Alto Networks and is distributed under license from ESG.
All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.
Enterprise Strategy Group | Getting to the Bigger Truth™
Enterprise Strategy Group is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.