Back to Blog
VPN Zero Trust Remote Work Security ZTNA Australian SMB Cybersecurity Network Security

VPN vs Zero Trust: Remote Work Security for Australian SMBs

By Ash Ganda | 15 October 2024 | 12 min read

Remote work isn’t going away. For Australian SMBs, the question isn’t whether to support remote access—it’s how to do it securely without enterprise budgets or dedicated security teams.

Two fundamentally different approaches dominate the conversation: VPNs and Zero Trust Network Access (ZTNA). Both provide secure remote access, but they do it in completely different ways, with different security implications, costs, and complexity.

This guide compares both approaches to help you choose what makes sense for your business.

Understanding the Security Models

The Traditional VPN Approach

The Castle-and-Moat Model

VPNs are built on perimeter security thinking:

  • Create a secure perimeter around your network
  • Authenticate users at the gate
  • Once inside, trust everything within the perimeter
  • Encrypt the connection between remote users and the network

Think of it like a castle with a moat. If you have the drawbridge password, you’re in—and once you’re in, you can generally access everything inside the castle walls.

How VPNs Work

When an employee connects via VPN:

  1. VPN client establishes encrypted tunnel to VPN gateway
  2. User authenticates (username/password, sometimes MFA)
  3. Device receives internal IP address
  4. All traffic routes through the VPN tunnel
  5. User appears to be “on the network”

The Security Assumption

VPNs assume:

  • The network perimeter defines the security boundary
  • Authenticated users can be trusted
  • Devices connecting from inside are reasonably secure
  • Network segmentation handles different security levels

Understanding the Security Models Infographic

This worked well when most work happened in offices with controlled networks and managed devices.

The Zero Trust Approach

Never Trust, Always Verify

Zero Trust flips the traditional model:

  • No network location is inherently trusted
  • Every access request is verified independently
  • Users get access only to specific resources they need
  • Continuous verification throughout the session

There’s no castle and no perimeter. Every door requires its own authentication, every time.

How Zero Trust Works

When an employee accesses resources:

  1. Identity verified (who are you?)
  2. Device posture checked (is your device secure?)
  3. Context evaluated (where, when, how are you connecting?)
  4. Access granted to specific application only
  5. Session monitored for anomalies
  6. Re-verification at regular intervals

The Security Assumption

Zero Trust assumes:

  • Networks are always hostile (including internal networks)
  • User authentication alone isn’t sufficient
  • Devices can’t be fully trusted
  • Compromise is inevitable; contain the blast radius

This matches modern reality: work happens everywhere, threats are sophisticated, and breaches will occur.

VPN Strengths and Weaknesses

Where VPNs Excel

Simplicity of Concept

VPNs are straightforward:

  • Connect to VPN, access everything you normally would
  • Users understand the mental model
  • IT teams have decades of experience
  • Troubleshooting is well-documented

Wide Application Support

VPNs work with everything:

  • Legacy applications that don’t support modern authentication
  • Network file shares
  • Internal web applications
  • Databases and servers
  • Network printers

If it works on your local network, it works over VPN.

Full Network Access

Sometimes you actually need broad network access:

  • IT administrators managing infrastructure
  • Developers accessing multiple internal services
  • Support staff troubleshooting across systems

VPNs provide this naturally.

Mature Technology

VPN technology is proven:

  • Established vendors
  • Known security characteristics
  • Clear implementation patterns
  • Extensive documentation

VPN Limitations

VPN Strengths and Weaknesses Infographic

All-or-Nothing Access

Once authenticated, users typically have broad network access:

  • More access than most users need
  • Lateral movement easy if credentials compromised
  • Difficult to apply granular controls
  • Entire network exposed to compromised devices

A marketing employee probably doesn’t need access to accounting systems, but VPN typically grants it anyway.

Device Trust Problem

VPNs authenticate users, not devices:

  • Personal devices with malware can connect
  • No visibility into device security posture
  • Outdated or unpatched devices gain access
  • BYOD scenarios create risk

You’re trusting both the user and whatever device they’re using.

Performance Impact

All traffic routing through VPN creates issues:

  • Bandwidth bottlenecks at VPN gateway
  • Latency for cloud applications
  • Poor experience for video conferencing
  • Scaling requires more VPN infrastructure

Accessing Microsoft 365 from Sydney via VPN gateway in Melbourne adds unnecessary hops.

Split-Tunnel Dilemma

To address performance issues, you can enable split-tunneling:

  • Only some traffic goes through VPN
  • Better performance for cloud services
  • But compromises security monitoring
  • Complex to configure correctly

Management Overhead

VPN infrastructure requires ongoing work:

  • Hardware or virtual appliances to maintain
  • Certificates to manage
  • Client software to deploy and update
  • Capacity planning as users grow
  • Monitoring and troubleshooting

For SMBs without dedicated IT staff, this adds up.

Zero Trust Strengths and Weaknesses

Where Zero Trust Excels

Granular Access Control

Every application gets separate access decisions:

  • Marketing staff access marketing tools only
  • Finance team isolated from other systems
  • Contractors limited to specific resources
  • Principle of least privilege enforced naturally

Compromised credentials grant access to one application, not everything.

Device Security Verification

Access decisions factor in device posture:

  • Is the device encrypted?
  • Is antivirus running and updated?
  • Is the OS patched?
  • Are risky configurations present?

Non-compliant devices get limited or no access until remediated.

Context-Aware Decisions

Access adapts to risk:

  • New location? Require additional authentication
  • Unusual time? Apply extra verification
  • Risky behaviour detected? Terminate session
  • Anomalous access pattern? Flag for review

Security matches the threat level.

Better for Cloud Services

Direct connections to cloud applications:

  • No hair-pinning through corporate network
  • Optimal performance for SaaS
  • Scales naturally with cloud adoption
  • No VPN capacity constraints

Users in Perth access Microsoft 365 directly through Azure’s Perth datacentre, not via your office.

Zero Trust Strengths and Weaknesses Infographic

Reduced Attack Surface

Applications aren’t exposed on the network:

  • No open ports scanning reveals
  • Services invisible until authenticated
  • Lateral movement inherently difficult
  • Compromised network doesn’t expose applications

Zero Trust Limitations

Implementation Complexity

Zero Trust requires more upfront work:

  • Each application needs configuration
  • Identity integration for each service
  • Policy definition per resource
  • Testing each access path

This isn’t plug-and-play like a traditional VPN.

Application Compatibility

Not everything works with modern Zero Trust:

  • Legacy applications without modern auth
  • Network protocols beyond HTTP/HTTPS
  • Custom internal applications
  • Older systems that can’t be modified

You may need hybrid approaches for these scenarios.

Learning Curve

Zero Trust thinking is different:

  • Users notice more authentication prompts
  • IT teams need new skills and understanding
  • Policy design requires security thinking
  • Troubleshooting follows different patterns

There’s genuine organisational change required.

Potential for User Friction

Stricter security can impact productivity:

  • More frequent authentication challenges
  • Denied access when device posture fails
  • Confusion when context triggers additional verification
  • Support tickets from users locked out

Getting the balance right takes iteration.

Cost Comparison for Australian SMBs

VPN Costs

Traditional VPN Appliance

Capital Expense:

  • Hardware VPN gateway: $1,500-5,000
  • Replacement every 3-5 years
  • Additional for redundancy

Operating Expense:

  • Support/maintenance: 15-20% of hardware cost annually
  • Client licenses: Often included or minimal
  • Internet bandwidth: Ensure adequate VPN gateway connectivity
  • Management time: Ongoing configuration and monitoring

Example: 20-User SMB

  • Initial: $3,000 gateway + $500 setup
  • Ongoing: $600/year support + ~5 hours/month management
  • 3-year total: ~$15,000 or ~$63/user/month

Cloud VPN Service

Operating Expense Only:

  • Per-user pricing: $8-15/user/month
  • No hardware to purchase
  • Support included
  • Easier scaling

Example: 20-User SMB

  • Monthly: $10/user × 20 = $200/month
  • Annual: $2,400
  • 3-year total: $7,200 or $30/user/month

Cloud VPN is more predictable and lower total cost for most SMBs.

Zero Trust Costs

Cloud-Based ZTNA Services

Options vary significantly:

Entry-Level ZTNA:

  • Products like Cloudflare Access, Twingate
  • $5-10/user/month
  • Core ZTNA functionality
  • Good for straightforward use cases

Mid-Tier ZTNA:

  • Products like Perimeter 81, Zscaler Private Access
  • $15-25/user/month
  • More advanced features
  • Better for complex environments

Enterprise ZTNA:

  • Products like Palo Alto Prisma Access
  • $30-50+/user/month
  • Comprehensive security stack
  • Typically overkill for SMBs

Example: 20-User SMB

  • Entry ZTNA: $8/user × 20 = $160/month = $1,920/year
  • Mid-Tier: $20/user × 20 = $400/month = $4,800/year
  • 3-year entry level: $5,760 or $24/user/month

Hidden Costs

Both approaches have non-obvious costs:

  • Initial setup and configuration time
  • User training and support
  • Policy development and refinement
  • Integration with existing tools
  • Ongoing administration

Zero Trust typically has higher initial setup time but lower ongoing management burden once configured properly.

Microsoft-Centric Cost Advantage

If You Have Microsoft 365

Many Microsoft 365 licenses include Zero Trust capabilities:

Microsoft 365 Business Premium:

  • Azure AD with Conditional Access
  • Intune for device management
  • Azure AD Application Proxy
  • Basic ZTNA functionality included

Cost: Already included in ~$33/user/month subscription

Azure AD Premium P1:

  • More sophisticated Conditional Access
  • Better device compliance policies
  • Application integration

Cost: Included with M365 Business Premium or ~$10/user/month standalone

For Microsoft-centric SMBs, Zero Trust capabilities may cost little or nothing additional beyond existing licensing.

Implementation Comparison

VPN Implementation

Typical Timeline: 1-2 Weeks

Phase 1 - Setup (1 week):

  • Install and configure VPN gateway
  • Configure authentication (AD/Azure AD integration)
  • Set up network routing
  • Configure firewall rules
  • Test connectivity

Phase 2 - Deployment (1 week):

  • Deploy VPN clients to devices
  • Distribute credentials/certificates
  • Train users on connection process
  • Pilot with small group
  • Full rollout

Skills Required:

  • Network administration
  • Firewall configuration
  • Understanding of routing and subnetting
  • Active Directory/Azure AD knowledge

Most IT professionals or MSPs handle this routinely.

Ongoing Effort:

  • Certificate renewal (annual or periodic)
  • Client updates as needed
  • Capacity monitoring
  • User support (connection issues)
  • ~3-5 hours monthly for small deployments

Zero Trust Implementation

Typical Timeline: 4-8 Weeks

Phase 1 - Planning (1-2 weeks):

  • Inventory applications requiring access
  • Define user groups and access requirements
  • Plan identity integration
  • Design policy framework
  • Choose ZTNA platform

Phase 2 - Foundation (1-2 weeks):

  • Set up identity provider integration
  • Configure device management (MDM/Intune)
  • Define device compliance policies
  • Set up user groups and attributes
  • Test authentication flows

Phase 3 - Application Integration (2-3 weeks):

  • Configure access to each application
  • Set up connectors/agents as needed
  • Define application-specific policies
  • Test each application thoroughly
  • Document access procedures

Phase 4 - Rollout (1-2 weeks):

  • Pilot with power users
  • Gather feedback and refine
  • Gradual rollout to broader groups
  • User training and documentation
  • Support intensive period

Skills Required:

  • Identity and access management (IAM)
  • Understanding of modern authentication (SAML, OAuth, OIDC)
  • Security policy design
  • Application architecture knowledge
  • Change management

Steeper learning curve; may benefit from professional services for initial setup.

Ongoing Effort:

  • New application integration as needed
  • Policy refinement based on usage patterns
  • User provisioning/deprovisioning
  • Monitoring and anomaly investigation
  • ~2-4 hours monthly after stabilisation

Choosing the Right Approach

VPN Makes Sense When:

Your Environment Fits Traditional Patterns

  • Primarily on-premises applications and file shares
  • Small number of remote users
  • All users need broad network access
  • Legacy applications that can’t support modern auth

You Need Immediate Simplicity

  • Limited IT expertise or time
  • Quick remote access required
  • Temporary solution while planning migration
  • Budget constraints preclude monthly subscriptions

Network-Level Access Is Required

  • IT administrators need full network access
  • Network protocols beyond HTTP/HTTPS
  • Applications that assume local network presence

Example Scenario: 10-person manufacturing firm with on-premises ERP system, network file shares, and occasional remote access needs. IT support via external MSP. VPN provides what’s needed without complexity.

Zero Trust Makes Sense When:

Modern Cloud-Forward Environment

  • Primarily SaaS applications (Microsoft 365, Salesforce, etc.)
  • Mix of personal and corporate devices
  • Remote-first or hybrid workforce
  • Security is a primary concern

Granular Control Is Valuable

  • Different access requirements per user group
  • Contractors and third parties need limited access
  • Compliance requirements for access segregation
  • Sensitive data requires additional protection

Growth and Scaling Planned

  • Expanding workforce
  • Adding locations
  • Increasing cloud adoption
  • Want scalable security model

Example Scenario: 25-person professional services firm with Microsoft 365, cloud-based practice management software, remote team across multiple cities. BYOD policy for flexibility. Zero Trust provides secure access without compromising user experience.

Hybrid Approach

Many SMBs run both:

Common Pattern:

  • Zero Trust for cloud applications and general users
  • VPN for legacy on-premises systems and administrators
  • Gradual migration toward full Zero Trust as legacy systems modernise

Benefits:

  • Security improvements without ripping everything out
  • Time to learn and adapt
  • Support for transition period
  • Practical migration path

Considerations:

  • Managing two systems adds complexity
  • Clear policies on what uses which access method
  • Ensure consistent security posture across both
  • Plan timeline for full migration

Making the Transition

From VPN to Zero Trust

If you’re considering moving from VPN to Zero Trust:

Assessment Phase:

  1. Inventory all applications accessed via VPN
  2. Categorise by authentication support (modern vs legacy)
  3. Identify user groups and access patterns
  4. Document current pain points
  5. Define success criteria

Pilot Approach:

  1. Start with cloud applications only
  2. Pilot with tech-savvy user group
  3. Maintain VPN as fallback
  4. Gather feedback and refine
  5. Expand gradually

Common Challenges:

  • User resistance to change
  • Legacy applications requiring VPN workarounds
  • Learning curve for IT team
  • Policy definition complexity

Give yourself 3-6 months for full transition, longer for complex environments.

Starting Fresh

If building remote access from scratch:

Start with Zero Trust if:

  • Primarily cloud applications
  • Modern workforce expectations
  • Building security culture from day one
  • Want scalable foundation

Start with VPN if:

  • Significant on-premises infrastructure
  • Need remote access immediately
  • Limited IT expertise available
  • Plan to evolve over time

There’s no wrong choice—align with your current reality and near-term direction.

Security Considerations

VPN Security Best Practices

If running VPN, strengthen security:

Strong Authentication:

  • Require MFA for all VPN connections
  • Use certificate-based authentication where possible
  • Regular credential rotation
  • Disable legacy protocols

Network Segmentation:

  • Don’t grant full network access by default
  • Segment sensitive systems
  • Apply firewall rules even for VPN users
  • Monitor VPN user activity

Device Security:

  • Require endpoint protection on connecting devices
  • Consider device compliance checks before connection
  • Separate personal and corporate devices
  • Regular device audits

Monitoring:

  • Log all VPN connections
  • Alert on anomalies (unusual times, locations)
  • Review access patterns regularly
  • Quick incident response procedures

Zero Trust Security Advantages

Zero Trust inherently provides:

Continuous Verification:

  • Not just at login
  • Throughout session
  • Based on risk signals
  • Adaptive responses

Micro-Segmentation:

  • Application-level access control
  • Lateral movement prevention
  • Blast radius containment
  • Precise audit trails

Device Posture Integration:

  • Real-time compliance checking
  • Automated remediation triggers
  • Risk-based access decisions
  • Device health visibility

Identity-Centric Security:

  • User and device identity verified
  • Context-aware policies
  • Behaviour analytics
  • Anomaly detection

Getting Help

Whether implementing VPN or Zero Trust, professional guidance accelerates success and avoids costly mistakes.

At CloudGeeks, we help Australian SMBs design and implement remote access security that matches their actual needs and budget. We work with both approaches and can help you evaluate which makes sense for your specific situation.

From initial assessment through implementation and ongoing management, we ensure your remote workers have secure access without unnecessary complexity.

Conclusion

VPN and Zero Trust aren’t simply competing products—they represent fundamentally different security philosophies.

VPNs work well for traditional networks with on-premises applications and users who need broad access. They’re simpler to understand and implement but carry security limitations in modern environments.

Zero Trust better matches cloud-forward organisations with distributed workforces and diverse devices. Implementation requires more upfront effort but delivers stronger security and better long-term scalability.

For many Australian SMBs, the answer isn’t purely one or the other. A hybrid approach during transition, or complementary deployment for different use cases, often makes the most sense.

Evaluate based on your actual applications, workforce patterns, security requirements, and IT capabilities. The right answer is the one that provides secure access your users will actually use, at a cost your business can sustain.


Ready to transform your business?

Let's discuss how AI and cloud solutions can drive your digital transformation. Our team specializes in helping Australian SMBs implement cost-effective technology solutions.

Bella Vista, Sydney