Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2325,"date":"2024-02-05T22:52:10","date_gmt":"2024-02-05T22:52:10","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/"},"modified":"2024-02-05T22:52:10","modified_gmt":"2024-02-05T22:52:10","slug":"why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/","title":{"rendered":"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia"},"content":{"rendered":"

Firewalls and VPNs were once hailed as the ultimate solutions for robust enterprise security, but in today\u2019s evolving threat landscape, organizations face a growing number of breaches and vulnerabilities that are outpacing these solutions. Today, the world we work in looks very different from the on-premises era as industries transform how and where work gets done. Firewalls and VPNs are crumbling pillars of a bygone era. They provide a false sense of security because they come with significant weaknesses that put companies at risk\u2014weaknesses that are only realized when embracing digital transformation.<\/p>\n

Innovation in generative AI, automation, and IoT\/OT technologies across industries is set to continue breaking barriers in 2024. This innovation also opens the door for attackers to automate phishing campaigns, craft evasive malware, reduce the development time of threats using AI, and even sell Ransomware-as-a-Service (RaaS).<\/p>\n

With the growing severity and number of breaches, there\u2019s a heightened concern that VPN vulnerabilities will leave the door open for attackers. According to a Cybersecurity Insider survey, nearly 50% of organizations experienced VPN-related attacks from July 2022 to July 2023, and 90% of organizations are concerned about attackers exploiting third-party vendors to gain backdoor access into their networks through VPNs. <\/p>\n

It\u2019s becoming clear that even the largest organizations with advanced firewalls still fall victim to breaches. Curious to know some of the reasons that firewalls and VPNs are letting organizations down? Read more below.<\/p>\n

A thinner sheet of protection across a larger attack surface<\/p>\n

VPNs and firewalls extend the network, increasing the attack surface with public IP addresses as they connect more users, devices, locations, and clouds. Users can now work from anywhere with an internet connection, further extending the network. The proliferation of IoT devices has also increased the number of Wi-Fi access points across this extended network, including that seemingly harmless Wi-Fi connected espresso machine needed for a post-lunch boost, creating new attack vectors to exploit.<\/p>\n

Perimeter-based architecture means more work for IT teams<\/p>\n

More doesn\u2019t mean better when it comes to firewalls and VPNs. Expanding a perimeter-based security architecture rooted in firewalls and VPNs means more deployments, more overhead costs, more time wasted for IT teams – but less security and less peace of mind. <\/p>\n

Pain also comes in the form of degraded user experience and satisfaction with VPN technology for the entire organization due to backhauling traffic (72% of organizations are slightly to extremely dissatisfied with their VPN experience).<\/p>\n

Other challenges like the cost and complexity of patch management, security updates, software upgrades, and constantly refreshing aging equipment as an organization grows are enough to exhaust even the largest and most efficient IT teams. The bigger the network, the more operational complexity and time required.<\/p>\n

VPNs and firewalls can\u2019t effectively guard against today\u2019s threat landscape<\/p>\n

VPNs and firewalls deployed to protect and defend network access behave a lot like a security guard who sits at the front of a store in order to stop theft. <\/p>\n

\t\t\tSecurity Guards<\/p>\n

\t\t\tFirewalls and VPNs<\/p>\n

\t\t\tStationed at the front door of a valuable store – tasked with identifying and stopping attacks. Can\u2019t monitor all entrances at the same time.<\/p>\n

\t\t\tDeployed at key access points to an organization\u2019s network. Can\u2019t stop all the threats across every access point.<\/p>\n

\t\t\tOnce an attacker gets in, they get access to the entire store.<\/p>\n

\t\t\tPermit lateral threat movement by placing users and entities onto the network.<\/p>\n

\t\t\t1:few threat detection can\u2019t scale unless you hire a lot of security guards to monitor all entrances.<\/p>\n

\t\t\tCan\u2019t inspect encrypted traffic and enforce real-time security policies at scale.<\/p>\n

\t\t\tCan be slow, tired, expensive to hire, late for their shift and present a number of other issues that allow threats to go undetected and unanswered.<\/p>\n

\t\t\tSuffer from a variety of other challenges related to cost, complexity, operational inefficiency, poor user experiences, organizational rigidity, and more.<\/p>\n

Much like a lone security guard, VPNs and firewalls can help mitigate some risk, but they can\u2019t keep up with the scale and complexity of the cybercrime of today. Your network is extending exponentially as you digitally transform your organization. With constant attacks on the horizon and a thinner cover of protection, how many million security guards can you hire?<\/p>\n

The Zero Trust Exchange delivers on the promise of security<\/p>\n

Unlike network-centric technologies like VPNs – zero trust architecture minimizes your attack surface and connects users to the apps they need directly\u2014without putting anyone or anything on the network as a whole.<\/p>\n

Zscaler delivers zero trust with its cloud native platform: the Zscaler Zero Trust Exchange. The Zero Trust Exchange starts with the premise that no user, workload, or device is inherently trusted. The platform brokers a secure connection between a user, workload, or device and an application\u2014over any network, from anywhere by looking at identity, app policies, and risk.<\/p>\n

As threats grow more dangerous, we can\u2019t rely on a single security guard to keep everybody out anymore. VPNs and firewalls were designed to make organizations feel secure, but with all the evolving threats of today highlighting the cracks in these technologies, IT and security teams are left with a false sense of security.<\/p>\n

Truly secure digital transformation can only be delivered by implementing a zero trust architecture. The Zscaler Zero Trust Exchange is the comprehensive cloud platform designed to keep your users, workloads, IoT\/OT, and B2B traffic safe in an environment where VPNs and firewalls can\u2019t. <\/p>\n

If you\u2019d like to learn more, join our webinar that serves as an introduction to zero trust and provides entry-level information about the topic. <\/p>\n

Or, if you\u2019d like to go a level deeper, consider registering for one of our interactive whiteboard workshops for free\u00a0\u00a0<\/p>\n

\u200b[[{“value”:”<\/p>\n

Firewalls and VPNs were once hailed as the ultimate solutions for robust enterprise security, but in today\u2019s evolving threat landscape, organizations face a growing number of breaches and vulnerabilities that are outpacing these solutions. Today, the world we work in looks very different from the on-premises era as industries transform how and where work gets done. Firewalls and VPNs are crumbling pillars of a bygone era. They provide a false sense of security because they come with significant weaknesses that put companies at risk\u2014weaknesses that are only realized when embracing digital transformation.<\/p>\n

Innovation in generative AI, automation, and IoT\/OT technologies across industries is set to continue breaking barriers in 2024. This innovation also opens the door for attackers to automate phishing campaigns, craft evasive malware, reduce the development time of threats using AI, and even sell Ransomware-as-a-Service (RaaS).<\/p>\n

With the growing severity and number of breaches, there\u2019s a heightened concern that VPN vulnerabilities will leave the door open for attackers. According to a Cybersecurity Insider survey<\/a>, nearly 50% of organizations experienced VPN-related attacks from July 2022 to July 2023, and 90% of organizations are concerned about attackers exploiting third-party vendors to gain backdoor access into their networks through VPNs.\u00a0<\/p>\n

It\u2019s becoming clear that even the largest organizations with advanced firewalls still fall victim to breaches. Curious to know some of the reasons that firewalls and VPNs are letting organizations down? Read more below.<\/p>\n\n

A thinner sheet of protection across a larger attack surface<\/strong><\/p>\n

VPNs and firewalls extend the network, increasing the attack surface with public IP addresses as they connect more users, devices, locations, and clouds. Users can now work from anywhere with an internet connection, further extending the network. The proliferation of IoT devices has also increased the number of Wi-Fi access points across this extended network, including that seemingly harmless Wi-Fi connected espresso machine needed for a post-lunch boost, creating new attack vectors to exploit.<\/p>\n

Perimeter-based architecture means more work for IT teams<\/strong><\/p>\n

More doesn\u2019t mean better when it comes to firewalls and VPNs. Expanding a perimeter-based security architecture rooted in firewalls and VPNs means more deployments, more overhead costs, more time wasted for IT teams – but less security and less peace of mind.\u00a0<\/p>\n

Pain also comes in the form of degraded user experience and satisfaction with VPN technology for the entire organization due to backhauling traffic (72% of organizations are slightly to extremely dissatisfied with their VPN experience).<\/p>\n

Other challenges like the cost and complexity of patch management, security updates, software upgrades, and constantly refreshing aging equipment as an organization grows are enough to exhaust even the largest and most efficient IT teams. The bigger the network, the more operational complexity and time required.<\/p>\n

VPNs and firewalls can\u2019t effectively guard against today\u2019s threat landscape<\/strong><\/p>\n

VPNs and firewalls deployed to protect and defend network access behave a lot like a security guard who sits at the front of a store in order to stop theft.\u00a0<\/p>\n

\n

Security Guards<\/strong><\/p>\n


\n\t\t\t <\/p>\n

Firewalls and VPNs<\/strong><\/p>\n


\n\t\t\t <\/p>\n

Stationed at the front door of a valuable store – tasked with identifying and stopping attacks. Can\u2019t monitor all entrances at the same time.<\/p>\n


\n\t\t\t <\/p>\n

Deployed at key access points to an organization\u2019s network. Can\u2019t stop all the threats across every access point.<\/p>\n


\n\t\t\t <\/p>\n

Once an attacker gets in, they get access to the entire store.<\/p>\n


\n\t\t\t <\/p>\n

Permit lateral threat movement by placing users and entities onto the network.<\/p>\n


\n\t\t\t <\/p>\n

1:few threat detection can\u2019t scale unless you hire a lot of security guards to monitor all entrances.<\/p>\n


\n\t\t\t <\/p>\n

Can\u2019t inspect encrypted traffic and enforce real-time security policies at scale.<\/p>\n


\n\t\t\t <\/p>\n

Can be slow, tired, expensive to hire, late for their shift and present a number of other issues that allow threats to go undetected and unanswered.<\/p>\n


\n\t\t\t <\/p>\n

Suffer from a variety of other challenges related to cost, complexity, operational inefficiency, poor user experiences, organizational rigidity, and more.<\/p>\n

\n\t\t\t<\/p><\/div>\n\n

Much like a lone security guard, VPNs and firewalls can help mitigate some risk, but they can\u2019t keep up with the scale and complexity of the cybercrime of today. Your network is extending exponentially as you digitally transform your organization. With constant attacks on the horizon and a thinner cover of protection, how many million security guards can you hire?<\/p>\n

The Zero Trust Exchange delivers on the promise of security<\/strong><\/p>\n

Unlike network-centric technologies like VPNs – zero trust architecture minimizes your attack surface and connects users to the apps they need directly\u2014without putting anyone or anything on the network as a whole.<\/p>\n

Zscaler delivers zero trust with its cloud native platform: the Zscaler Zero Trust Exchange. The Zero Trust Exchange starts with the premise that no user, workload, or device is inherently trusted. The platform brokers a secure connection between a user, workload, or device and an application\u2014over any network, from anywhere by looking at identity, app policies, and risk.<\/p>\n\n

As threats grow more dangerous, we can\u2019t rely on a single security guard to keep everybody out anymore. VPNs and firewalls were designed to make organizations feel secure, but with all the evolving threats of today highlighting the cracks in these technologies, IT and security teams are left with a false sense of security.<\/p>\n

Truly secure<\/em> digital transformation can only be delivered by implementing a zero trust architecture. The Zscaler Zero Trust Exchange is the comprehensive cloud platform designed to keep your users, workloads, IoT\/OT, and B2B traffic safe in an environment where VPNs and firewalls can\u2019t.\u00a0<\/p>\n

<\/em><\/strong><\/p>\n

If you\u2019d like to learn more, join our webinar<\/a> that serves as an introduction to zero trust and provides entry-level information about the topic.\u00a0<\/p>\n

Or, if you\u2019d like to go a level deeper, consider registering for one of our interactive whiteboard workshops<\/a> for free<\/p>\n

“}]]\u00a0[[{“value”:”Firewalls and VPNs were once hailed as the ultimate solutions for robust enterprise security, but in today\u2019s evolving threat landscape, organizations face a growing number of breaches and vulnerabilities that are outpacing these solutions. Today, the world we work in looks very different from the on-premises era as industries transform how and where work gets done. Firewalls and VPNs are crumbling pillars of a bygone era. They provide a false sense of security because they come with significant weaknesses that put companies at risk\u2014weaknesses that are only realized when embracing digital transformation.<\/p>\n

Innovation in generative AI, automation, and IoT\/OT technologies across industries is set to continue breaking barriers in 2024. This innovation also opens the door for attackers to automate phishing campaigns, craft evasive malware, reduce the development time of threats using AI, and even sell Ransomware-as-a-Service (RaaS).<\/p>\n

With the growing severity and number of breaches, there\u2019s a heightened concern that VPN vulnerabilities will leave the door open for attackers. According to a Cybersecurity Insider survey, nearly 50% of organizations experienced VPN-related attacks from July 2022 to July 2023, and 90% of organizations are concerned about attackers exploiting third-party vendors to gain backdoor access into their networks through VPNs. <\/p>\n

It\u2019s becoming clear that even the largest organizations with advanced firewalls still fall victim to breaches. Curious to know some of the reasons that firewalls and VPNs are letting organizations down? Read more below.<\/p>\n

A thinner sheet of protection across a larger attack surface<\/p>\n

VPNs and firewalls extend the network, increasing the attack surface with public IP addresses as they connect more users, devices, locations, and clouds. Users can now work from anywhere with an internet connection, further extending the network. The proliferation of IoT devices has also increased the number of Wi-Fi access points across this extended network, including that seemingly harmless Wi-Fi connected espresso machine needed for a post-lunch boost, creating new attack vectors to exploit.<\/p>\n

Perimeter-based architecture means more work for IT teams<\/p>\n

More doesn\u2019t mean better when it comes to firewalls and VPNs. Expanding a perimeter-based security architecture rooted in firewalls and VPNs means more deployments, more overhead costs, more time wasted for IT teams – but less security and less peace of mind. <\/p>\n

Pain also comes in the form of degraded user experience and satisfaction with VPN technology for the entire organization due to backhauling traffic (72% of organizations are slightly to extremely dissatisfied with their VPN experience).<\/p>\n

Other challenges like the cost and complexity of patch management, security updates, software upgrades, and constantly refreshing aging equipment as an organization grows are enough to exhaust even the largest and most efficient IT teams. The bigger the network, the more operational complexity and time required.<\/p>\n

VPNs and firewalls can\u2019t effectively guard against today\u2019s threat landscape<\/p>\n

VPNs and firewalls deployed to protect and defend network access behave a lot like a security guard who sits at the front of a store in order to stop theft. <\/p>\n

\t\t\tSecurity Guards<\/p>\n

\t\t\tFirewalls and VPNs<\/p>\n

\t\t\tStationed at the front door of a valuable store – tasked with identifying and stopping attacks. Can\u2019t monitor all entrances at the same time.<\/p>\n

\t\t\tDeployed at key access points to an organization\u2019s network. Can\u2019t stop all the threats across every access point.<\/p>\n

\t\t\tOnce an attacker gets in, they get access to the entire store.<\/p>\n

\t\t\tPermit lateral threat movement by placing users and entities onto the network.<\/p>\n

\t\t\t1:few threat detection can\u2019t scale unless you hire a lot of security guards to monitor all entrances.<\/p>\n

\t\t\tCan\u2019t inspect encrypted traffic and enforce real-time security policies at scale.<\/p>\n

\t\t\tCan be slow, tired, expensive to hire, late for their shift and present a number of other issues that allow threats to go undetected and unanswered.<\/p>\n

\t\t\tSuffer from a variety of other challenges related to cost, complexity, operational inefficiency, poor user experiences, organizational rigidity, and more.<\/p>\n

Much like a lone security guard, VPNs and firewalls can help mitigate some risk, but they can\u2019t keep up with the scale and complexity of the cybercrime of today. Your network is extending exponentially as you digitally transform your organization. With constant attacks on the horizon and a thinner cover of protection, how many million security guards can you hire?<\/p>\n

The Zero Trust Exchange delivers on the promise of security<\/p>\n

Unlike network-centric technologies like VPNs – zero trust architecture minimizes your attack surface and connects users to the apps they need directly\u2014without putting anyone or anything on the network as a whole.<\/p>\n

Zscaler delivers zero trust with its cloud native platform: the Zscaler Zero Trust Exchange. The Zero Trust Exchange starts with the premise that no user, workload, or device is inherently trusted. The platform brokers a secure connection between a user, workload, or device and an application\u2014over any network, from anywhere by looking at identity, app policies, and risk.<\/p>\n

As threats grow more dangerous, we can\u2019t rely on a single security guard to keep everybody out anymore. VPNs and firewalls were designed to make organizations feel secure, but with all the evolving threats of today highlighting the cracks in these technologies, IT and security teams are left with a false sense of security.<\/p>\n

Truly secure digital transformation can only be delivered by implementing a zero trust architecture. The Zscaler Zero Trust Exchange is the comprehensive cloud platform designed to keep your users, workloads, IoT\/OT, and B2B traffic safe in an environment where VPNs and firewalls can\u2019t. <\/p>\n

If you\u2019d like to learn more, join our webinar that serves as an introduction to zero trust and provides entry-level information about the topic. <\/p>\n

Or, if you\u2019d like to go a level deeper, consider registering for one of our interactive whiteboard workshops for free”}]]\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

Firewalls and VPNs were once hailed as the ultimate solutions […]<\/p>\n","protected":false},"author":0,"featured_media":2326,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zenith-zscaler"],"yoast_head":"\nWhy Firewalls and VPNs Give You a False Sense of Security Sid Bhatia - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia\" \/>\n<meta property=\"og:description\" content=\"Firewalls and VPNs were once hailed as the ultimate solutions […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-05T22:52:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia\",\"datePublished\":\"2024-02-05T22:52:10+00:00\",\"dateModified\":\"2024-02-05T22:52:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/\"},\"wordCount\":2865,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg\",\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/\",\"name\":\"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg\",\"datePublished\":\"2024-02-05T22:52:10+00:00\",\"dateModified\":\"2024-02-05T22:52:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/","og_locale":"en_US","og_type":"article","og_title":"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia","og_description":"Firewalls and VPNs were once hailed as the ultimate solutions […]","og_url":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/","og_site_name":"JHC","article_published_time":"2024-02-05T22:52:10+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/"},"author":{"name":"","@id":""},"headline":"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia","datePublished":"2024-02-05T22:52:10+00:00","dateModified":"2024-02-05T22:52:10+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/"},"wordCount":2865,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg","articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/","url":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/","name":"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg","datePublished":"2024-02-05T22:52:10+00:00","dateModified":"2024-02-05T22:52:10+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/firewalls-vpns-give-false-sense-of-security-blog-700x467-MoVCJb.jpeg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/why-firewalls-and-vpns-give-you-a-false-sense-of-security-sid-bhatia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Why Firewalls and VPNs Give You a False Sense of Security Sid Bhatia"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2325"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2325\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2326"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}