Hey folks,
With so many of us working remotely or hopping between locations, I’ve been thinking a lot about secure remote access — not just VPNs, but the whole user experience + security model. How do you allow employees or devices to connect in, keep things locked down, and still avoid making their lives miserable?
On one hand I want zero-trust, tight controls, device posture checks, etc. On the other hand I don’t want everyone calling IT every time they shift from WiFi to mobile data or travel. I’d love to hear your real-world stories: What tools did you use? What process changes helped? What didn’t work and why? Let’s talk about how you’ve made secure remote access actually work rather than just sitting in a policy document.
Thanks!
With so many of us working remotely or hopping between locations, I’ve been thinking a lot about secure remote access — not just VPNs, but the whole user experience + security model. How do you allow employees or devices to connect in, keep things locked down, and still avoid making their lives miserable?
On one hand I want zero-trust, tight controls, device posture checks, etc. On the other hand I don’t want everyone calling IT every time they shift from WiFi to mobile data or travel. I’d love to hear your real-world stories: What tools did you use? What process changes helped? What didn’t work and why? Let’s talk about how you’ve made secure remote access actually work rather than just sitting in a policy document.
Thanks!