Designed as a true drop-in replacement for traditional VPN while fully leveraging the benefits of ZTNA, CrossLink addresses the challenges of today's mobile workforce and rise of the "work from home" paradigm.
The network perimeter is disappearing.
The rise of new types of devices and the push to cloud environments long ago dissolved the strong network perimeter. Viewing the corporate network as a strongly-protected island accessible via a VPN is simply not valid anymore. Modern environments need a modern solution like CrossLink ZTNA.
VPN grants users more access than they should.
VPNs come from a time when everything "inside" the network perimeter was blindly trusted. Once in, the user had open access. In contrast, the ZTNA "least privilege" model grants users only the access they were explicitly given, which is especially critical with the rise of working from home on user-owned devices today.
VPN does not scale easily.
Scalability in a VPN means having to replace a piece of hardware on the network. With the COVID-19 pandemic and explosion of working from home, many enterprises found themselves waiting months for a new VPN concentrator to meet the increased demand. In contrast, a ZTNA cloud service like CrossLink is designed for agility and flexibility, scaling with the click of a button.
Source: Gartner — Market Guide for Zero Trust Network Access (2019)
ZTNA products that fail to address the following criteria can simply never be drop-in replacements for VPN:
CrossLink |
Other Vendors |
|
Support for all applications and protocols, including IP-based protocols, out-of-the-box,
avoiding the need for running a costly parallel VPN infrastructure.
|
|
?
|
Support for legacy applications out-of-the-box, avoiding the need for expensive migrations of these applications.
|
|
?
|
Support for all types of users—from managed employees to unmanaged third-party to IoT—under a single
deployment, avoiding the need for multiple point solutions.
|
|
?
|
Fine-grained device health attestation both before and during the entire access lifecycle, ensuring dangerous
devices never have access to the enterprise network.
|
|
?
|
Tools to simplify the transition process from an "open-access" model of VPN to the "zero-trust" model of ZTNA,
greatly reducing the cost and risk of adoption.
|
|
?
|