There are things that should make a comeback NOW.

And then there are things that should NEVER make a comeback.

One of the things that should definitely be on the “Please Never Make a Comeback” list is VPN. You remember “VPNing”, right? You want to send a quick email or check a document from home or an airport, so you have to dial into your VPN, wait forever for it to connect then access it, albeit at incredibly delayed speeds. But wait, [connection lost]…gotta dial back in… Yes that VPN! Pretty much the worst thing ever.

Thank goodness we live in the modern world where we have phones with TVs that can connect to anything, anywhere. And the Cloud to host all the data and services we could ever need.

Got to Be a Better Way

As they say, with great power comes great responsibility, which is exactly why companies are looking to secure their data within the cloud. They’re looking to encrypt data and control access for the awesome services that their employees love. Services like Evernote, Jive, Salesforce.com, Box, ServiceNow, Workday etc.

Unfortunately, there are vendors that think VPN is the answer to this securing your coveted cloud services. They ask their customers to force their employees to VPN or install agents on their BYOD devices in order to access and use the cloud securely. Honestly, I can’t believe that other companies would even think of proposing VPN or agents on their mobile devices but hey, some people think Hammer pants and hairspray are still cool – so live and let live.

Frictionless Cloud Security

What companies want is to secure their information within their cloud services and leverage capabilities like encryption, data loss prevention (DLP), and application auditing without requiring agents, downloads, or other footprint on the device, and without the need for VPN or backhaul of mobile traffic through the enterprise network!

In other words, they want to do this without introducing any friction into the process. Aside from the irritation the friction elicits, it also creates legitimate security vulnerability – users have proven time and again that they will try to find ways around security protocols that inconvenience them.

Scope your Requirements

When it comes to cloud data security, many IT and Security folks are in the process of building their requirements (aside from no VPN!). Our cloud security experts took the time to speak with dozens of leading enterprises, and found that they are pulling lessons from the banking industry in order to shore up their data security.