• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Search
Search
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Security
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Security for Chromebook
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella and Cisco Secure Access Packages
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
      • Cisco Umbrella for Government Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Your SSE journey with Cisco
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
      • Umbrella and Duo Layered Protection
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
        • – FTC Safeguards Rule Compliance 2023
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
      • Cybersecurity Webinars
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is DNS Security
      • What is a Secure Web Gateway
      • What is a Cloud Access Security Broker (CASB)
      • What is Security Service Edge (SSE)
      • What is Secure Access Service Edge (SASE)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Free Trial Quick Start Guide
      • Free Trial Help and Tips
  • Trends & Threats
    • Market Trends
      • Generative AI Cybersecurity Risks and Rewards
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Clearing search keywords
Security

Protect remote workers today while building the network of tomorrow

Author avatar of Lorraine BellonLorraine Bellon
September 8, 2020 • 3 minute read
View blog >

Remote work isn’t just the future – it’s here and now. With most, if not all, of your users working from home, you need to deliver the same level of protection for the sensitive, business-critical data on their laptops and mobile devices as if they were working in the office. Cybercrime hasn’t slowed down during 2020, and the persistent work-from-home situation is a prime candidate for exploits.

The VPN blind spot

Many remote employees skip connecting to the VPN, which leaves their unprotected machines exposed to malware and data exfiltration. But why would so many users bypass the easy safety net of the VPN? In some cases, a user simply forgets to connect at the start of a workday. Sometimes, if everyone tries to connect at the beginning of the workday on Monday, a user might have problems connecting, and decides to get started on work without the VPN (and forgets to try again later). After all, many SaaS applications, like O365, can be configured to work without a VPN connection.

Sometimes, however, a user will disconnect from the VPN because of network performance issues. Maybe the SaaS applications perform better without it, and since they no longer need to be on the VPN for these applications to function, it’s easy to want to trade speed and productivity for protection from cyberthreats.

More traffic, higher costs

Most organizations designed their VPN hardware-based framework to handle a predictable population of remote and roaming users. When every employee suddenly moves to 100% remote work, the hardware-based VPN faces an unexpected surge in bandwidth requirements. With no clear end to remote working in sight, IT teams are forced to make some tough decisions: should they redesign their network to handle the new surge in VPN traffic? This requires purchasing new hardware and access to a building to install it, along with spending budget that may or may not be available to spend.

Enter cloud-delivered security

New research from Gartner investigates how to secure access in a cost-effective way, today and in the future. To achieve these goals, Gartner recommends a Zero Trust Network Access (ZTNA) identity and access framework, in conjunction with a Secure Access Service Edge (SASE) networking and security infrastructure. By deploying these two cloud-delivered frameworks in unison, organizations can deliver secure access at scale while keeping costs down and enable better workplace productivity.

By taking the pressure off existing hardware (like firewalls and VPN endpoints), a combined ZTNA and SASE approach gives organizations the speed and flexibility they need in their networks to aid remote worker productivity, without compromising security posture. And by choosing providers that can deliver these capabilities from the cloud, IT teams can deploy, configure, and manage the services quickly without the need for physical access to hardware inside buildings. After all, the IT administrators are working from home, too.

In addition to ZTNA, the research recommends the use of a secure web gateway (SWG) for URL and malware filtering and a cloud access security broker (CASB) for visibility and control of activities inside SaaS applications. Many IT teams are dealing with smaller budgets than expected for the upcoming fiscal year and seek to cut costs wherever possible. One easy way to simplify purchasing and save on overlapping functionality is by selecting vendors that can deliver multiple capabilities in one converged, cloud-delivered service and bill based on consumption today, not on expected scale for tomorrow.

Learn more by reading the rest of the research report here.

Start today, plan for tomorrow

Cisco Umbrella combines multiple security functions, including SWG and CASB, into a single cloud-delivered service — helping you deliver the right level of security anywhere your users work. If your users skip the VPN, Umbrella keeps them covered from whatever threats might be falling out of the digital clouds. If you already use Cisco AnyConnect as a VPN client, then you can simply enable the Umbrella roaming security module — no additional agents required. Easily add more functionality as your network evolves and grows, delivering flexible access and security when and how you need it.

Suggested Blogs

  • Cisco Umbrella Delivered Better Cybersecurity and 231% ROI February 21, 2023 2 minute read
  • Cisco Listed as a Representative Vendor in Gartner® Market Guide for Single-Vendor SASE January 26, 2023 3 minute read
  • How to Evaluate SSE Vendors: Questions to Ask, Pitfalls to Avoid June 23, 2022 5 minute read

Share this blog

FacebookTweetLinkedIn
Subscribe to the Cisco Umbrella blog Subscribe

Follow Us

Facebook X LinkedIn Youtube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2025 Cisco Umbrella