While one situation can be catastrophic for a group, it can also be a blessing for another. Before the COVID-19 pandemic, a lot of people believed that VPNs were doomed but, the reverse has happened. VPNs have become a must-have for remote workers to do their jobs during the pandemic, and what’s more, we expect that this will become the norm in the post-COVID-19 world.
Though COVID-19 was reported to have started in 2019, early 2020 was when it gained ground, and that was also when the turn around for VPNs began. Without mincing words, the COVID-19 pandemic caused massive digital transformation for many businesses and office workers.
The traditional VPN connectivity
Before the pandemic, relatively few numbers of people worked from home, but now the case has changed. It has become imperative that organizations must seek ways to support workers who will have to use computers and mobile devices from home to access corporate resources.
The traditional VPN makes use of a thick client model to build a secure tunnel from the client device to the corporate network. This is the tunnel that all network communications use.
There is, however, this cost implication you must think about because of hair pinning. The model works on the basis that access to public cloud resources must go through the VPN tunnel to the corporate site, which then forwards access back out to the internet-based cloud provider.
Expected innovations in VPN technology
Advancements in technology transcend all fields, and VPN technology is not left out. While what we have seems to suffice, we must bear in mind that there is the possibility for end systems' to increase power, and that will facilitate the migration of more software-based VPN technology into endpoints.
This scenario calls for innovation in VPN technologies to take advantage of local process capabilities, hence, making VPNs easier for both users and network administrators. There will then be central systems through which network admins can control VPN administration.
Indeed, we don’t need hardware in a software world but, we will still need the physical connections and that means we can’t do without some form of hardware. One way out, however, is to deploy x86 compute systems to replace some dedicated devices and carry out functions we were using hardware for.
This may have to be at the network edge, where we have distributed computational resources. For now, we don’t have anything in sight to replace hardware yet, as the speeds the network core requires can only be possible with dedicated hardware.
Another possible transformation is for VPNs to function like software-defined WAN products. This will ensure that connectivity does not depend on the underlying physical network that can be wired, wireless, or cellular, as well as its addressing.
The workings of the evolving VPN systems must focus on the ability to use the advantages of multiple paths and transparently switch between them.
Expected innovations in VPN security
While we must commend efforts put into VPNs to thwart cyberattacks, it’s obvious that they have not been outrightly efficient, as cyber-attacks have increased tremendously. It’s pertinent, therefore to expect more instances of AI and machine learning being applied to these security functions to increase their effectiveness without corresponding increases in-network or security administrator support.
There must be concerted efforts by IT professionals to ensure that VPN paths are not rendered inefficient when an endpoint communicates with internet-based resources such as SaaS systems. The workings of a VPN deem it necessary that the endpoint must first send data to the VPN concentrator, which then forwards the data to the cloud-based SaaS application. This leads to an increase in network latency. Apart from that, the network overhead also increases within the VPN since the SaaS application also uses encryption.
You can, however, use split-tunneling to correct this anomaly but, it’s essential for IT teams to carefully select the VPN termination point to avoid creating a security hole. This can be achieved by integrating with smart DNS servers that enable split-tunneling to specific sites under the control of network or security administrators.
To ensure that your VPN system is highly secure, you need to employ the zero-trust model. Since you will have to assume that endpoints are compromised regardless of their location, you won’t leave any detail to chance.
Since the introduction of the zero trust model with security components that include allow listing and micro-segmentation by Forrester Research in 2010, it has become the yardstick to measure quality performance by networks. For sound cybersecurity practices, VPNs must deploy automated methods to create and maintain these security functions.
Expectations are rife that the VPN technology will have to upgrade in the nearest future to provide a better cybersecurity environment while reducing the effort needed to implement and maintain that security.
John Ejiofor is the founder and editor of Nature Torch, a blog that discusses the impact of humans on our mother nature. He’s a freelance writer and has been featured on some of the top blogs around the world.