Navegando por Autor "Chagas, Marcelino Francisco Gomes das"
Agora exibindo 1 - 1 de 1
- Resultados por Página
- Opções de Ordenação
Item Comparação de VPN e ZTNA: uma análise de segurança e desempenho em ambientes corporativo(2024-09-30) Chagas, Marcelino Francisco Gomes das; Medeiros, Robson Wagner Albuquerque de; http://lattes.cnpq.br/3169193612606500Constant technological advances and the rapid expansion of infrastructures in public cloud providers have created significant challenges for companies, especially with regard to information security. Traditional security measures, such as Virtual Private Networks (VPNs), which create a secure tunnel for data transmission between the user and the corporate network, are not always adequate to protect data in cloud environments, resulting in a growing need to re-evaluate protection strategies. The COVID-19 pandemic has further intensified this demand, as organizations have been forced to adopt remote working practices on a large scale. In this scenario, trust in the final data has become a critical concern, especially given the limitations of traditional VPN solutions. In response to these challenges, Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA) have emerged as promising approaches. ZTNA is a technology based on the principles of ZTA that redefines network access control by eliminating implicit trust in any user or device, regardless of their location, and requiring continuous verification for every access attempt. This approach offers more granular security at the network and access control level, and is adaptable in on-premise and cloud environments, protecting data in distributed and constantly evolving corporate environments. The aim of this work is to carry out a comparative analysis of VPN and ZTNA network technologies, with an emphasis on evaluating security and performance. The security features offered by each technology will be examined, including authentication, access control and encryption, as well as the impact of these technologies on network performance in terms of latency, bandwidth and response time. Through this analysis, we aim to identify the advantages and disadvantages of each technological approach, offering valuable insights for IT professionals and organizations in selecting and implementing the solution best suited to their security and performance needs in modern corporate environments.