The use of virtual private networks (VPNs) to give remote workers access to internal applications and assets has been around for decades, when the majority of apps and users were housed in the enterprise network and the most prevalent use case was for "road warriors." After the changes caused by the pandemic when hybrid work became the norm, and digital transformation moved applications to the cloud many of the original drivers for VPNs are gone.
It's time for enterprises to take another look. VPNs by their nature present the access equivalent of welcoming the user into the enterprise and giving them the keys to some of the most important assets in your organization. And if an attacker can enter via the VPN, they can quickly turn that into an all-access pass, enabling them to move laterally through your network.
VPNs, by their nature, must be accessible via the internet, which effectively puts your applications and assets there as well. Menlo Secure Application Access, enabled by the Menlo Secure Cloud Browser, hides your apps, and provides protection from any malware or compromise that might be on the user's endpoint at the same time..
Network-based access is an "all-or-nothing" proposition, which is why it a favorite with attackers. With Menlo Secure Application Access, it takes only a few clicks to ensure fine-grained access control by users and groups, granting only the privileges that users require to do their jobs. Provisioning, changing, or deprovisioning access requires just a few clicks from the central Menlo dashboard.
Because VPN traffic is encrypted, there is chance that you may not be able to see an incursion until it's too late. With Secure Application Access (SAA) and Browsing Forensics, you can choose to record user sessions, so you can see anomalous behavior and stop it early.
Several breaches in 2024 were directly attributed to VPNs, including the exploitation of zero-day vulnerabilities in products from Ivanti, Palo Alto Networks, and Check Point. The Ivanti attack, in particular, affected government agencies, including CISA and MITRE.
While such attacks are becoming more frequent, they are far from the only type of attack to which VPNs are susceptible. Others include man-in-the-middle attacks, malware infections, misconfigurations that create vulnerabilities, DDoS threats, and more. Because of the type of access that an enterprise VPN can create, access credentials have long been a high-value target for phishing campaigns, which can then be used to launch ransomware or extortion attacks.
Today’s attackers have become every bit as technically sophisticated as their enterprise security counterparts. While all security professionals do their best to stay current with vulnerabilities as they are exposed, so do bad actors, as notifications give them a window of opportunity to exploit the vulnerabilities before they are patched. If you’ve received notice of a vulnerability that needs to be patched, you can bet that your adversaries have too.
It's Time For a Change
A recap of VPN issues makes it clear that application and data access must evolve. VPNs provide enterprise access, but the applications and data are no longer there. The network access that VPNs deliver have long made credentials a valuable phishing target, and such attacks are only growing. Meanwhile, attackers are scouring vulnerabilities lists, looking for an opportunity for the next zero-day exploit. Their livelihoods depend on it. So, in an inherently untrustworthy world, what do you do?
With Menlo Secure Application Access, it’s easy to enable custom-tailored application access to any user with any browser. Menlo requires no change to DNS records, no need to import certificates, and no agent. You can easily create user and group-specific controls from the Menlo dashboard, giving each user type the precise access levels you decide they need.
Browsing Forensics completes the Menlo solution, delivering visibility as never before into browsing sessions on any endpoint. Enterprises can select the content that should be captured in the session, including screen grabs, user keystrokes, and the page resources themselves. These captures are immediately ported to the customer’s choice of cloud storage; Menlo does not retain the packages or even view them.
Protect the enterprise and your users from zero-hour phishing and evasive ransomware, without impacting performance.
Make zero trust access available to all your applications—browser based or legacy—without requiring network rebuilds or a firewall refresh.
Learn More
Make zero trust access easy with a cost-effective solution for accessing enterprise applications while reducing the cost and complexity of VDI deployments.
Learn More
Most apps are accessed via the browser, so security must evolve from networks and devices to browser-based controls. Enable secure access to applications and data, even from unmanaged devices.
Learn More
Gain unprecedented visibility into browser sessions—capture screens and keystrokes, with user, browser, and destination details—for fast incident resolution and threat hunting.
Learn More
Protect against unknown or zero-hour phishing attacks targeting the browser with real-time, AI-powered threat prevention.
Learn More
Prevent the most prevalent and dangerous cyberthreats from reaching their targets: the browser and the endpoint.
Learn More
Enable users to access ChatGPT and other generative AI platforms while protecting enterprise data and intellectual property.
Learn More
Achieve the goals of SSE with far less complexity—and close the browser security gap.
Learn More
Use zero trust security to isolate your people and data from all potential threats while providing fast, secure access to apps.
Learn More
Menlo focuses on securing the browser, because that's where most enterprise work takes place
Discover why organizations around the world rely on Menlo Security to protect the enterprise and enable secure access to applications, preventing attacks that legacy security tools cannot stop.