ComputerWorld Denmark covered how MAN Energy Solutions built one of Europe’s most advanced Zero Trust security architectures — protecting 15,000 employees across 140 countries without a traditional perimeter.
The article explores the architectural decisions behind the transformation: why MAN moved away from VPN, how Zscaler Private Access made private applications invisible to the internet, and what the outcomes were in terms of security posture, user experience, and operational overhead.
Key themes from the interview:
- The perimeter is dead. With users everywhere and applications in the cloud, there is no perimeter left to defend.
- Identity is the new perimeter. Access decisions must be based on who you are, what device you’re on, and what you’re trying to reach — not where you are on the network.
- Invisible infrastructure. Private applications should have no internet presence. No open ports, no attack surface, no way for adversaries to reach them without valid authorisation.
- Zero Trust is not a product. It is an architecture philosophy that requires commitment across networking, security, identity, and application teams.
Read the full article in ComputerWorld (Danish) →
← All writing