Advantages to Cloud VPNs: Scaling, Cost, Expertise, User Experience
With cloud VPNs, users log on to a third-party provider’s servers to access an enterprise’s secure cloud resources or a firewalled on-campus network. One of the biggest considerations with cloud VPNs is that cloud vendors can provide expertise that an institution’s IT department may lack, often with lower start-up costs.
“I think most of those conversations are happening for institutions that, perhaps prior to the pandemic, had no investment in a VPN solution,” says Joseph Potchanant, director of the cybersecurity and privacy program at EDUCAUSE. “It was easier for them to find a vendor to do so than it was to spin up their own because they were trying to do it rather quickly.”
According to Potchanant, the lower costs of ramping up a VPN solution without needing to build on-premises infrastructure to support it also appeal to many college and university IT executives he’s spoken to.
However, expertise and cost are just a few of the things that make cloud VPNs attractive to colleges and universities. Two factors that are of utmost importance to college administrators are the ability to scale quickly and support a user base that is geographically dispersed.
“If today I have 50,000 users, am I able to double the size of my population without my team taking four, five, six months to do it? That is the type of thing that I’m looking for,” says Marcel Mutsindashyaka, CIO of Oberlin College in Ohio and one of EdTech’s higher education IT influencers.
Those users could potentially be spread all over the United States or perhaps internationally. Because of that, there may be less of a desire from institutions to have users log in to an on-premises VPN due to their distance from the campus infrastructure.
“Applications are no longer in the data center alone. They’re in the cloud, in multiple clouds, in Software as a Service applications — they’re everywhere,” says Anand Oswal, senior vice president of network security at Palo Alto Networks. “The old construct of me taking the connectivity for my laptop, backhauling it to a central demilitarized zone and applying some processing on it leads to a very poor experience for the user.”