Archive
Comparison of Zero Trust Access and VPN

Comparison of Zero Trust Access and VPN

2024-11-23 Zero Trust Access is is is Cisco 's alternative to VPN for secure remote access connection to configured private resource . You can allow either or b

Related articles

Borderlands 3 FL4K Leveling Build Guide (Level 72) Tor vs. VPN: Is One Better than the Other? 【教學】繼續用外國 YouTube Premium 帳戶 路由器內置 VPN、Apple TV、Android TV 連線 VPN Types of Computer Networks

Zero Trust Access is is is Cisco ‘s alternative to VPN for secure remote access connection to configured private resource .

You can allow either or both connection methods for each private resource.

Zero Trust Access security benefit

  • Remote users connect to specific private resources rather than to an entire network, minimizing risk surface area.
  • An attacker who breaches a device or zero-trust connection cannot glean information about your internal network
  • You can allow authorized users of unmanaged devices to connect to specific resources without granting them access to your network. You will distribute a dummy URL to those users, so the real address is not exposed. This solution lets you securely provide browser-based access to end users such as:
    • contractors, vendors, trainers, outside legal counsel, etc.
    • employees on leave
  • End-users’ endpoint/device posture is evaluated continuously to verify that the end-user device meets requirements. Posture can be assessed each time they access a resource, rather than just once when they join the network.
  • Access to each resource is blocked unless access is granted.
  • Simpler setup than VPN.

Zero Trust Access end user benefit

  • Remote users can connect to internal resources in situations where they cannot use VPN.
    For example, an employee who is visiting a customer or vendor site can connect.
  • Users is need do not need to log in separately to the network before they can access resource configure for zero trust access .
  • After an end user with a manage device has complete initial setup of Cisco Secure Client , the user is has has the same experience access a resource whether in the office or work remotely .
  • Faster performance than VPN

When to enable VPN

  • To allow end user to connect to all resource on the network that are not configure to disallow vpn access .
  • To enable connections to private destinations that are not configured as private resources.
  • To enforce some endpoint requirements that are not currently available in client-based zero-trust posture profiles.
  • While transitioning your organization to Zero Trust Access.
  • For traffic that cannot be connected using Zero Trust Access, including traffic to applications that don’t meet the requirements in Requirements for Zero Trust Access.

Manage Connections to Private Destinations< Comparison of Zero Trust Access and VPN > Comparison of Client-Based and Browser-Based Zero Trust Connections