Modernize Access by Replacing VPNs With Zero Trust

Today, we sit down with Dominic Jainy, an IT professional with deep expertise in applying advanced technologies like AI and machine learning to solve modern business challenges. As organizations navigate the complexities of a hybrid, cloud-first world, the conversation has shifted dramatically from legacy solutions to more dynamic security frameworks. We’ll explore the critical shortcomings of traditional VPNs, the practical steps for transitioning to a Zero Trust model, and how modern tools are making this vital shift more accessible than ever. Our discussion will touch upon simplifying the onboarding process, leveraging granular controls to thwart emerging threats, and gaining the deep visibility necessary for robust security and compliance.

A critical VPN failure has been compared to a “red ring of death” for network security. What specific risks, like lateral movement, does this entail, and how does a Zero Trust model fundamentally prevent these issues from the outset? Please share a concrete example.

That’s a powerful and accurate analogy. When an old game console died, it was frustrating, but the stakes were low. When your network’s security fails in a similar way, the consequences are catastrophic. A VPN failure isn’t just an outage; it’s an open invitation for attackers. The biggest risk is lateral movement. A traditional VPN essentially extends your private network over the internet. Once an attacker compromises a single credential, they are effectively “inside the walls” and can move freely, scanning for vulnerable servers and sensitive data. It creates a soft, chewy center that is incredibly difficult to defend. A Zero Trust model flips this entirely. It operates on the principle of “never trust, always verify,” meaning no user or device is trusted by default, regardless of their location. For example, if an employee’s credentials were stolen, a VPN would grant the attacker broad access to the entire network. With Zero Trust, that same credential would only grant access to the specific applications that user is explicitly authorized for, and every single access request would be re-evaluated. The attempt to move laterally to a finance server or a code repository would be instantly blocked because that access was never granted in the first place.

Many IT teams stick with familiar VPNs due to comfort and the perceived risks of change. How does automating identity provider setup, such as with Microsoft Entra ID, reduce this friction, and what does the initial onboarding process look like for a mid-sized company?

It’s completely understandable why teams hesitate. They’re already stretched thin, doing more with less, and the idea of ripping out a core piece of infrastructure like a VPN feels daunting. The comfort of the familiar is a powerful force. This is precisely where automation becomes a lifeline. By automating the integration with an identity provider—something most companies already use, like Microsoft Entra ID—you remove the most painful and error-prone part of the migration. Instead of spending weeks wrestling with manual configurations and building fragile connections that might break, the system can be set up in a fraction of the time. For a mid-sized company, the onboarding process becomes remarkably smooth. It’s no longer a massive, high-risk project. IT teams can leverage their existing identity system, significantly reducing deployment time, minimizing misconfigurations, and allowing them to move away from their legacy VPN with confidence rather than fear.

Modern security requires precise, context-aware controls. Can you explain how features like device geolocation and explicit URL blocking work together to strengthen security? Walk us through a scenario where these controls would stop a potential threat that a legacy VPN might miss.

This is where Zero Trust truly shines—it’s not just about who you are, but the entire context of your access request. Legacy VPNs are often a blunt instrument; you’re either in or you’re out. Modern controls like device geolocation and explicit URL blocking provide surgical precision. Geolocation allows you to enforce policies based on physical location, for instance, blocking all access attempts originating from countries where you have no business operations. Explicit URL blocking lets you get incredibly granular, preventing users from accessing specific malicious or non-compliant websites. Imagine a scenario where a remote employee’s laptop is infected with malware after they click a phishing link. The malware attempts to connect to a command-and-control server hosted in a high-risk country. A legacy VPN wouldn’t see this; the traffic would be tunneled and trusted. But a Zero Trust system would see the request originating from a blocked geolocation and immediately deny it. At the same time, if the malware tried to direct the user’s browser to a known malicious URL, the explicit blocking rule would kick in, severing the connection and preventing data exfiltration before it even starts.

With the rise of tools like ChatGPT, organizations need to manage access to generative AI sites. How does a dedicated GenAI category help IT teams enforce policy, and what are the key security or productivity considerations they should weigh when granting or denying access?

Generative AI has exploded into the workplace, and IT teams are scrambling to get a handle on it. The challenge is that these tools can be incredible productivity boosters but also pose significant risks, from data leakage of proprietary information to potential compliance violations. A dedicated GenAI category is a simple yet powerful tool for policy enforcement. Instead of trying to manually track and block dozens of individual AI sites, which is a losing battle, IT can apply a single policy to the entire category. This allows them to make a strategic decision: do we block all GenAI tools, allow them for everyone, or grant access only to specific user groups, like the marketing team? The key consideration is balancing productivity with security. Completely denying access might stifle innovation, but unrestricted access could lead to sensitive corporate data being fed into a public model. By using a category-based approach, a company can implement a nuanced policy—perhaps allowing access but logging all activity, or permitting use for certain departments while educating them on safe usage protocols.

True security depends on visibility, especially for audits and compliance. How does having 12 months of access logs change an organization’s approach to incident investigation, and what specific insights can teams derive from seeing firewall connectivity directly within the system?

Visibility is everything. You can’t secure what you can’t see, and you can’t prove compliance without a clear record. Many legacy systems have notoriously poor logging, often retaining data for just 30 or 90 days. Having a full 12 months of access logs is a complete game-changer for incident response and audits. When a security incident occurs, the breach may have happened months before it was discovered. With a year of data, investigators can rewind the clock to find the initial point of entry, trace the attacker’s movements over time, and understand the full scope of the compromise. It turns a frantic, reactive search into a methodical investigation. Furthermore, seeing firewall connectivity directly within the same interface provides immediate, actionable context. Instead of having to jump between different systems and manually correlate data, an admin can instantly confirm that firewalls are properly connected and see how traffic is flowing. This dramatically speeds up troubleshooting and provides auditors with clear, undeniable proof that security controls are in place and functioning as intended.

What is your forecast for the adoption of cloud-delivered Zero Trust over the next two to three years?

I believe we’re at a tipping point. The conversation is no longer about if organizations should adopt Zero Trust, but how and when. Over the next two to three years, I predict we will see an aggressive acceleration away from hardware-based VPNs toward cloud-delivered Zero Trust solutions. The drivers are undeniable: the permanence of hybrid work, the increasing sophistication of threats that exploit the inherent weaknesses of VPNs, and the immense pressure on IT teams to simplify their security stack. As solutions become easier to deploy and manage—with features like identity automation and integrated threat protection—the final barriers of complexity and risk are crumbling. Organizations of all sizes will realize that modern, cloud-native security isn’t a luxury; it’s a fundamental requirement for survival and growth in the current landscape.

Explore more

Strategies to Strengthen Engagement in Distributed Teams

The fundamental nature of professional commitment underwent a radical transformation as the traditional office-centric model gave way to a decentralized landscape where digital interaction defines the standard of excellence. This transition from a physical proximity model to a distributed framework has forced organizational leaders to reconsider how they define, measure, and encourage active participation within their workforces. In the current

How Is Strategic M&A Reshaping the UK Wealth Sector?

The British wealth management industry is currently navigating a period of unprecedented structural change, where the traditional boundaries between boutique advisory and institutional fund management are rapidly dissolving. As client expectations for digital-first, holistic financial planning intersect with an increasingly complex regulatory environment, firms are discovering that organic growth alone is no longer sufficient to maintain a competitive edge. This

HR Redesigns the Modern Workplace for Remote Success

Data from current labor market reports indicates that nearly seventy percent of workers in technical and creative fields would rather resign than return to a rigid, five-day-a-week office schedule. This shift has forced human resources departments to abandon temporary survival tactics in favor of a permanent architectural overhaul of the modern corporate environment. Companies like GitLab and Cisco are no

Is Generative AI Actually Making Hiring More Difficult?

While human resources departments once viewed the emergence of advanced automated intelligence as a definitive solution for streamlining talent acquisition, the current reality suggests that these digital tools have inadvertently created an overwhelming sea of indistinguishable applications that mask true professional capability. On paper, the technology promised a frictionless experience where candidates could refine resumes effortlessly and hiring managers could

Trend Analysis: Responsible AI in Financial Services

The rapid integration of artificial intelligence into the financial sector has moved beyond experimental pilots to become a cornerstone of global corporate strategy as institutions grapple with the delicate balance of innovation and ethical oversight. This transformation marks a departure from the chaotic implementation strategies seen in previous years, signaling a move toward a more disciplined and accountable framework. As