// ////
VPN Replacement

VPN ReplacementHararei

The Software–Defined solution for Zero Trust Network Access


As companies ask their employees to work from home during periods of crisis, they are finding that the hardware–based legacy VPN is unable to cope with the demand. This causes their employees to be unproductive, as they cannot access critical systems and files stored on the company network.

In all liklihood the remote access solution deployed by a company was sized to handle a small number of essential personnel who need to occasionally work from home. With companies asking all (or a major proportion) of their employees to work remotely, the existing infrastructure cannot keep up. Ordering extra hardware may takes weeks.

As companies turn to their hardware suppliers for VPN appliances, they may also find that supply chain issues mean the legacy solution cannot even be purchased or deployed

The Zscaler Private Access (ZPA) solution does not use any hardware, and is entirely cloud–driven and can be delivered with the speed of a software deployment.

Zscaler Private Access (ZPA)

Legacy, hardware–based VPNs are not scalable to the demands being made of them when a significant proportion of the workforce is being asked to work from home.

ZPA allows enterprises to break free from the pain that their VPN has caused for years and move to a cloud–first approach — fundamentally decoupling security from the Data Center and moving enterprise security to the scalability, velocity and reliability of the Cloud.

ZPA delivers a secure remote access solution that can be deployed anywhere globally in a matter of minutes or hours, is more secure than traditional VPN, requires no hardware and is easier for users to use.


  1. Z–Brokers — secures the user to application connection
  2. Z–App — requests access to the application
  3. Z–Connector — initiates the inside–out connection to the ZEN

Getting Started

  • Deploy Z–App on endpoints
  • Deploy Z–Connectors in front of your applications
  • Define user and application access policies

How It Works

  1. User attempts to acess an application
  2. User identity/role is verified
  3. Policy is checked to determine if access is permitted
  4. Optimal path to application is determined
  5. If Allowed:
    • Z–Connector initiates an outbound connection
    • Z–App initiates a connection (per application)
    • Zscaler Cloud Broker stitches connections together
  6. Z–Connector provides application load balancing across application servers
  7. Monitor application usage — anomaly detection

ZPA Architecture

ZPA Architecture

Allow Hararei to help you rapidly scale up your Remote Access capabilities. Contact us for a no obligation consultation or visit us on the Internet at www.hararei.com



Detailed ZPA Technical Training