VPN replacement phases: Learn others’ real-world approaches
Accelerate Zero Trust adoption
As attackers continue to exploit traditional VPNs to launch attacks, embracing a Zero Trust approach for the workforce becomes even more important. However, there remains much discussion in the industry about what exactly that should look like, and what use cases to adopt in what order.
Cloudflare commissioned Enterprise Strategy Group to survey 200 senior IT security decision-makers about their approach to securing user access to corporate apps and resources, spanning traditional, digital-native, and public-sector organizations.
Tune it to hear respondents’ consensus about:
- The biggest workforce risks related to internal system access
- How agentless deployments can accelerate Zero Trust adoption
- Which app types and user groups to prioritize offloading from VPNs first
- Project focus and time spent across initial rollout, expansion, and advancement phases
Watch now
Provided by Cloudflare
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
How AI is bringing autonomous IT to realitySponsored In addition to providing a helping hand to IT groups, AI is now taking over some tasks altogether. It’s a shift that enables IT to fulfill the longstanding quest to “do more with less”
-
Cyber attacks are getting quicker and businesses need to plan accordinglyIn-depth Without proactive patch management, businesses are vulnerable to attacks on overlooked weaknesses
-
Maximizing Microsoft 365 Security: How Cloudflare enhances protection and adds valueWebinar Strengthen your defenses, proactively block attacks, and reduce risks
-
How businesses can ensure cloud uptime over the holidaysIn-depth Preparation is a critical consideration and could be the difference between success and disaster
-
Understanding NIS2 directives: The role of SASE and Zero TrustWebinar Enhance cybersecurity measures to comply with new regulations
-
From legacy to leading edge: Transforming app delivery for better user experiencesWebinar Meet end-user demands for high-performing applications
-
Navigating evolving regional data compliance and localization regulations with Porsche InformatikWebinar A data localization guide for enterprises
-
Strategies for improving security team efficiencyWebinar Get more value from your digital investments
-
Understanding NIS2 directives: The role of SASE and Zero TrustWebinar Enhance cybersecurity measures to comply with new regulations
-
Navigating evolving regional data compliance and localization regulations with Porsche InformatikWebinar A data localization guide for enterprises
