No Comments

How Secure Are VPNs For Enterprise Remote Access?

Hackers continue to exploit vulnerabilities in VPNs offered by well-known vendors

Security requirements today far exceed the configuration capabilities of VPNs

– Total Access Control enables a more secure approach to business continuity

MARLBOROUGH, Mass., April 2, 2020/PRNewswire/ — The latest post on the PortSys® blog explores serious security gaps in VPNs that many organizations around the world now use for business continuity due to the Coronavirus pandemic.

In the blog,Michael Oldham, CEO of PortSys, examines six key areas where VPNs fall short in securing the enterprise infrastructure:

  • Bandwidth – Architecture and security needs of the modern hybrid enterprise stretch far beyond the configuration capabilities of today’s VPNs.
  • Segmentation – VPNs don’t offer the deep level of granular controls necessary to prevent unauthorized access to critical resources.
  • Context – If organizations need to scale quickly, as with the Coronavirus pandemic, the one-size-fits-all approach to VPN access doesn’t take into account each end user’s full context of access.
  • Complexity – Clients often must be installed on remote machines for VPNs, adding yet another layer of complexity to the infrastructure.
  • Visibility – Since VPNs use SSL-encrypted tunnels, the outside world can’t see traffic going back and forth…but neither can internal enterprise security teams.
  • Reporting – Organizations can’t audit and report on access with VPNs, so they don’t know who had access to what resources, and how they used those resources.

Oldham explains why Total Access Control (TAC), the Zero Trust Access solution from PortSys, offers a better approach to remote access during these trying times. He discusses how organizations can use TAC as the primary access solution for all resources, local and cloud, while working equally well for internal employees and improving everyone’s productivity. And finally, he shows how TAC provides a simpler, stronger and more unified approach to managing security for remote users.

You can read the blog post in its entirety here:


source: (

You might also like

More Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.