COVID-19 Exposes the Shortcomings of Over-Reliance on VPNs

shortcomings of over-reliance on VPNs
As work from home mandates scattered employees to the wind, the COVID-19 pandemic highlighted the dangers for businesses in over-relying on Virtual Private Networks to allow their staff to securely work remotely.

VPN vs SASE in the Age of Remote Work

Shortcomings of over-reliance on VPNs became impossible to ignore as the global workforce shifted almost overnight to remote operations. While Virtual Private Networks were once the gold standard, the sudden stress test of a distributed perimeter revealed significant cracks in legacy infrastructure.

In the traditional networking model, remote users were expected to “tunnel” back into a central data centre to access applications. However, the shortcomings of over-reliance on VPNs are most evident in the resulting latency and “tromboning” of traffic. This model was never designed to support entire organisations working outside the office simultaneously, leading to performance bottlenecks that hindered productivity.

Moving Beyond the Limitations of Legacy Tunnels

Understanding the shortcomings of over-reliance on VPNs requires looking at the security implications as well. Legacy VPNs often grant broad access to the internal network once a user is authenticated. This is why Orro advocates for a Secure Access Service Edge (SASE) framework, which treats identity—not location—as the new perimeter.

The Secure Client to Cloud Advantage

As we transition into a permanent hybrid work model, addressing the shortcomings of over-reliance on VPNs means adopting a “Secure Client to Cloud” approach. This ensures that traffic is routed directly to where it is needed—whether that is a SaaS application or the public cloud—without the unnecessary detour through a central office. As noted by Gartner, this convergence of networking and security is no longer optional for the modern enterprise.

Modernise your remote access with Orro.

Ready to solve the bottlenecks of legacy networking? Contact the Orro team today to discuss our Network Services and Secure Client to Cloud solutions.

Enquire with Orro Today.

Related Insights

1 April 2026

Threat Hunt: Notepad++ Security Incident

9 March 2026

Exposure Management Service (CTEM)

Prioritise exposures that genuinely threaten business‑critical assets rather than noise.
10 November 2024

S4-8: The Evolution of Digital Forensics and Cybersecurity Part 2

Discover how digital forensics is revolutionising the fight against intellectual property theft and misconduct in the ever-evolving landscape of cybersecurity.

Explore our Resources​

Cyber
Australian Governance and Privacy Risk
post
The 2026 Australian Governance & Privacy Risk Checklist
Critical Infrastructure
OT governance in 2026
post
Air-Gapping Is Dead — What Pragmatic OT Governance Looks Like in 2026
Cyber
post-quantum cryptography planning Australia
post
Store Now, Decrypt Later — Why 2026 Is the Year to Start Your Post-Quantum Plan
Cyber
cyber governance continuous monitoring Australia
post
The Board Wants Proof, Not a Policy - How Continuous Exposure Management Closes the Governance Gap
Cyber
agentic AI governance gap
post
When AI Can Act, Not Just Answer — Closing the Agentic Governance Gap
Cyber
Australian Privacy Act compliance
post
Your Privacy Policy Isn't Enough Anymore — Now You Have to Prove It