• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Rightsizing Your VPN Without Sacrificing Remote Worker Security

Rightsizing Your VPN Without Sacrificing Remote Worker Security

Remember back in March, when workplace doors were closed and employees were sent home for a brief shutdown? Some five months later, it’s safe to say the shutdown has been anything but brief. While some organizations have made the move to reopen on a provisional basis, many others have kept their buildings shuttered. There are plenty of reasons why but some simply see no reason to change as their safely scattered teams have functioned and produced much as they did when under the same roof. Users may not have buckled under the strain, but a core technology in their work-from-home support system may be feeling the pinch: VPNs.

Part of the issue is VPNs are handling far heavier traffic volume than was intended. When they were deployed, working from home was a perk enjoyed by some just once or twice a week and not the organization-wide mandate it became. Even lifting those mandates and reopening offices might not make the problem completely go away as one popularly cited statistic from Gartner suggests. According to the research firm, employers are planning to transition roughly 5% of their previously onsite workforce into fully remote roles.

We checked in with network experts in search of insights on what organizations need to consider as they plan for the remainder of 2020 and what comes after.

What to focus on during a VPN audit

Leaders in the field suggest conducting a thorough audit of a VPN, focusing on two areas:

  • Enhancing security: Cyber criminals have no reservations about leveraging the coronavirus pandemic to score a quick payday. Some scams have merely used the pandemic as window dressing, covering tried and true social engineering and phishing campaigns. Others see opportunity in a company being forced to operate in a way it wasn’t built to, e.g., entirely remotely. A properly tuned VPN along with a few supporting technologies can be instrumental to making sure these attacks fizzle. Some capabilities worth pursuing – if they’re not already in place – include granting a network the ability to assess an endpoint’s defense posture (antivirus running, patches implemented, etc.) and to restrict access to the network in the event of noncompliance. Network access should be further guarded using multifactor authentication as the security boost it provides far outweighs the mild inconvenience inflicted upon users. Audits should also confirm time is being made for more mundane, but important, maintenance tasks such as reviewing access control lists, revising policies as needed, etc. Organizations must also ensure they’re prepared for a data breach, should one happen. VPN access logs should be collected so they can be used to follow in the footsteps of an attacker, helping to fully remediate any damage caused.
  • Right-sizing capacity: Earlier we mentioned the idea that organizational VPNs are already stretched thin. We also talked about how, even when that traffic does eventually recede, it may not quite find its way back to pre-pandemic levels. Remote work has been validated in the eyes of many former skeptics. Now it’s a matter of ensuring your organization is able to support an appropriate level of access moving forward. To start, measure. It’s just like the cliché goes: “you can’t improve what you don’t measure.” Continuously monitor the traffic traversing your various VPNs as well as the number of distinct devices seeking connections, all in order to gain a feel for what an average day looks like. This might reveal that additional VPN resources aren’t needed. Instead, they may simply need to be redirected from lesser used sites to those that experience heavier traffic. Note: Be sure to engage with all departments to learn more about their individual strategies for reopening workplaces or possibly relocating users. If more resources is the answer, this data can help allocate new IP addresses, hubs, firewalls, etc. Of course, solving certain network bottlenecks may require a call to the organization’s internet service provider for additional circuits or more flexible usage caps.  

Next Steps: Start planning now for the future of your VPN

These are the kinds of conversations organizations must have in order to be sure users are able to continue to access the resources they need and that they can do so securely. The fact that so many businesses have adapted so seamlessly, and so quickly, to a fully remote posture is a testament to their digital maturity. However, more changes are coming and organizations must be ready to continue to evolve as they arrive.  

Need help auditing your VPN and network environment? Want to learn more about the steps you can take to right-size and secure user connectivity? Arraya can help. Our team of network experts can provide the strategic as well as hands-on technical support your organization needs to keep users securely connected while allowing for room to grow.

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team.

Comment on this and all of our posts on: LinkedIn, Twitter, and Facebook.

Follow us to stay up to date on our industry insights and unique IT learning opportunities.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}