Is the VPN obsolete?

VPN on laptop screen
(Image credit: Shutterstock)

Remote access VPNs have boomed in the past 18 months as enterprises of all sizes rushed to reconfigure their workforce and equip staff for remote working. As we’ve come to depend on them more heavily, the weaknesses of VPN have become more apparent.

There’s nothing wrong with VPN per se; it’s still a useful technology, but as CIOs reflect on the lessons of the recent past and as they struggle to defend their organizations against the rising tide of security threats, they should be asking what place VPN has in their long-term networking strategy.

VPN, which first appeared in the 1990s, was designed for an age where remote workers were the exception rather than the rule. It’s a centralized architecture, rooted in the data centre; it’s a bolt-on, not easily integrated with the rest of the enterprise network; and one of its main functions, which is to provide secure access to applications is rapidly being superseded by zero-trust network access (ZTNA) technology.

There are five factors enterprises need to consider for remote access networks. 

Agility – Where are your users? They could be anywhere and their locations are not always going to be fixed. On top of this, your user population will be subject to change – as well as your staff, you may want to connect partners and suppliers to your network. Traditional VPNs are slow to deploy and adapt to change. 

Scalability – Capacity is harder than ever to plan for as remote users are added to or removed from the network. And it’s not just about users. Turning on new applications or responding to fluctuations in business will impact capacity requirements. Unless you are happy to pay for more capacity than you need, you need a network that can autoscale, increasing or reducing capacity according to demand. In most VPN set-ups, upgrading or reconfiguring the network means provisioning additional concentrators and buying more licences.

Flexibility – VPN infrastructure typically resides in data centres or colocation facilities. This has implications for throughput and latency when users are working remotely.

Security – Although VPNs make the best of unencrypted but readily available Internet connections, there are numerous security concerns. The VPN provides a broad attack surface and a tempting point of entry to the enterprise network for hackers. User credentials that are shared, lost or fraudulently obtained are a major source of security breaches. Even when access is well managed, the moat and castle nature of VPNs mean that once a miscreant is past the perimeter they may have access to the entire network. There are some segmentation options for VPNs, but they’re relatively crude.

Management and troubleshooting – Although VPN infrastructure is centralized most VPNs lack adequate central management capabilities. Troubleshooting, problem resolution and support are time-consuming and laborious. 

As the world of work has shifted away from headquarters and branch office operations, networks have been slower to change. As your users and applications become ever more distributed, a centralized architecture no longer makes sense. 

In the past it may have been logical to have one network for the data centre and branches and another for remote users but not anymore. Enterprises want a single solution for all their networking needs, regardless of network fabrics and underlying transports. 

Services are vacating data centres, users are vacating headquarters and branch offices, the network edge is no longer fixed. Business requirements demand dynamic, perpetually reconfigurable networks. If everything else is vacating the data centre, why would you continue to keep an essential service that connects your users to your applications locked up there? 

Your infrastructure needs to support an environment where everything is distributed, where location is no longer a given and where capacity is variable. VPN was not designed for such a dynamic environment. 

VPN is the landline of the cloud era. You can still make calls, but you’re dragging a long cable and a lot of infrastructure behind you.

What you really need to be able to do is connect everything on-premises and in the cloud – data centre, branches, remote users and cloud workloads – as a single, consistent network with end-to-end visibility and management, no performance trade-offs and near-infinite scalability. 

In contrast to the static DIY architecture of traditional VPN, enterprises need zero-trust network access solutions that leverage the ubiquity and underlying power of public cloud services. 

Instead of connecting to VPN concentrators, a cloud network would provision virtual points of presence wherever the users are. 

Such a network would only make sense delivered as a service, giving the customer the agility to instantiate connections whenever and wherever they are required and obviating the need to deal with the technical differences in the ways networking concepts are implemented from one cloud vendor to the next. 

A distributed architecture with the ability to put virtual POPs wherever they are required would also minimize dependency on potentially unreliable internet connections, enabling much higher performance than traditional VPN. 

Autoscaling is the other must-have: the ability to flex the service with demand – to respond, for example, to seasonal fluctuations in the retail sector – where conventional VPN requires the network to be provisioned for peak demand all year round. That would remove the twin headaches of provisioning infrastructure and managing changing licensing requirements. 

The as-a-service delivery model eliminates the capital cost of physical infrastructure, while pay-as-you charging means that the organization pays only for the resources it consumes. 

Last but not least on the wish list of better VPNs for the cloud era is zero-trust architecture with strong encryption, end-to-end segmentation (and micro-segmentation), firewall service insertion and multi-factor authentication. 

VPNs were built for a world where there was a clear distinction between the office and remote working, but those lines have blurred. It no longer makes sense to have enterprise networks with different operational and management requirements depending on where the user happens to be. 

It’s rash to predict the demise of anything in the networking industry, and we could see remote access VPNs like the ones we use today still in use in five to ten years’ time. But the VPN is architecturally out of step with the world we find ourselves in, and to paraphrase the old Irish joke, if you’re setting out to build secure networks to support a growing remote workforce in 2021, you wouldn’t start from here. 

Atif Khan is founder and CTO of Alkira.

Read more
A padlock icon next to a person working on a laptop.
Best business VPN of 2025
VPN
7 VPN predictions to look out for in 2025
Outlook Calendar on a Tablet
What we learned from VPNs in 2024
VPN encryption explained in infographic
Secure Web Gateway vs VPN vs Proxy vs CASB: What's the difference?
Käyttäjä yhdistää VPN-palvelimeen
Want to make your own VPN? It's trickier than you think
Security padlock in circuit board, digital encryption concept
Best Zero Trust Network Access Solution of 2025
Latest in VPN
A hand holds a smartphone displaying the NordVPN logo
NordVPN Prime hits lowest-ever price in VPN Spring sale
Digital hand set location on map with two pins. AI technology in GPs, innovation delivery, map location, future transport logistic, route path concept. GPs point. New office location, change address
What does your IP address reveal about you?
ExpressVPN mobile app and Aircove
ExpressVPN ‘reduces workforce’ for the second time in two years
A stethoscope next to a laptop on a pink background
How to check if your VPN is working
Teenager playing on a gaming PC with two monitors
Is using a VPN while gaming cheating? 5 myths you shouldn't believe about gaming with a VPN
Neon blue email symbols on a black background
Why am I suddenly getting so many spam emails?
Latest in News
Samsung HW-Q990D soundbar with Halloween theme over the top
Samsung promises to repair soundbars bricked by its disastrous software update for free – but it'll probably involve shipping
Google Gemini AI
Gmail is adding a new Gemini AI tool to help smarten up your work emails
DJI Mavic 3 Pro
More DJI Mavic 4 Pro leaks seemingly reveal launch date, price and key features of the triple camera drone – here's what to expect
Android 16 logo on a phone
Here's how Android 16 will upgrade the screen unlocking process on your Pixel
Man sitting on sofa, drinking coffee, looking at phone in surprise
Thousands of coffee lovers warned to stop using their espresso machines immediately after reports of burns and lacerations
Visual Intelligence identifying a dog
AirPods with cameras for Visual Intelligence could be one of the best personal safety features Apple has ever planned – here's why