Ransomware is now using popular remote access VPNs as a Trojan horse to gain access to enterprise networks. This is a serious problem for IT teams being asked to enable mobility while keeping infrastructure secure. The technology they invested in to protect the business has become a liability.

1. No network, no lateral movement

ZTNA never puts users on the network. Instead, users are connected directly to specific applications — never to the underlying network segment. Ransomware that gains a foothold through a user device has nowhere to go. It cannot scan the network, cannot reach other systems, cannot spread.

2. Least-privilege application access

ZTNA grants access based on identity, device posture, and application policy — not IP ranges. Even if a user is compromised, the blast radius is contained to the applications that user was authorised to access.

3. The VPN attack surface disappears

VPN concentrators are internet-facing infrastructure with known vulnerabilities. They are a primary target for ransomware operators. ZTNA eliminates this attack surface entirely: there is no VPN endpoint to attack, no open port to probe, no gateway to compromise.

Watch the full webinar recording →

← All writing