Virtual private networks (VPNs) for securing remote access are no longer sufficient to effectively secure hybrid workforce access to enterprise applications. VPNs often provide more access than a user needs to an organization’s network. This expands the attack surface, making it easier for an attacker with stolen credentials to access critical resources. Because VPNs do not inspect connections, they can inadvertently expand the attack surface through a hijacked connection or compromised endpoint device, increasing the risk of lateral threat movement. In addition, VPNs are usually aggregated at a central location, adding latency issues for people working from home or other remote locations.