Governance & Risk Management , Zero Trust

How Zero Trust Can Simplify Your Security Infrastructure

Forcepoint's Dubey Explains Why VPNs Are Not Relevant Anymore
Ajay Kumar Dubey, channel director, Forcepoint

How does a zero trust architecture help reduce the risk of remote access to corporate networks? Ajay Kumar Dubey, channel director at Forcepoint, shares his views on why VPNS are no longer relevant.

See Also: The Essential Guide to Zero Trust

"Zero trust began as a concept of zero trust network access, which was initially meant to replace VPNs. One of the biggest aspects of VPNs is that it gives access to your entire network," Dubey says.

"Thankfully, the zero trust network access has successfully replaced VPNs today. Now the technology is such that even unmanaged devices can access your office network securely."

In a video interview with Information Security Media Group at ISMG's Cybersecurity Summit in Bengaluru, Dubey also discusses:

  • The five pillars for easy implementation of a SASE framework;
  • How zero trust can play a vital role in reducing security complexities;
  • How to control access to cloud and private apps.

Dubey is responsible for managing the midmarket business in India and the channels for India and SAARC. He is a cybersecurity expert with over 24 years of experience in the IT industry and has worked at Blue Coat Systems, Sun Microsystems and Aventail.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.