{"id":7562,"date":"2022-01-10T11:27:39","date_gmt":"2022-01-10T10:27:39","guid":{"rendered":"https:\/\/www.asecus.ch\/?p=7562"},"modified":"2022-01-31T13:50:35","modified_gmt":"2022-01-31T12:50:35","slug":"have-antivirus-solutions-become-obsolete","status":"publish","type":"post","link":"https:\/\/www.asecus.ch\/en\/news\/have-antivirus-solutions-become-obsolete\/","title":{"rendered":"Have antivirus-solutions become obsolete?"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1qp9h-741645402ca062cc5e8fc0a46b86aa3d\">\n.avia-section.av-1qp9h-741645402ca062cc5e8fc0a46b86aa3d{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.asecus.ch\/wp-content\/uploads\/2020\/08\/header_ueber-uns.png);\nbackground-position:50% 0%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='mobile-max-heigth'  class='avia-section av-1qp9h-741645402ca062cc5e8fc0a46b86aa3d main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_textblock  avia-builder-el-first  hero-container avia-bg-style-scroll av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_px='250'><div class='container av-section-cont-open' style='height:250px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-7562'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5\">\n#top .av-special-heading.av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5{\npadding-bottom:0;\ncolor:#ffffff;\nfont-size:70px;\n}\nbody .av-special-heading.av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5 .av-special-heading-tag{\nfont-size:70px;\n}\n.av-special-heading.av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5 .av-subheading{\nfont-size:18px;\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5 .av-special-heading-tag{\nfont-size:25px;\n}\n.av-special-heading.av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5 .av-subheading{\ndisplay:none;\n}\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-ky8iyj39-3f039a7673aa271f627d89078b9d5ce5 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-1  avia-builder-el-no-sibling  top-special-heading av-inherit-size'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Have antivirus solutions become obsolete?<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-7562'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-kdon9vit-a75c57b837ec5678aff65f78eff08161 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"breadcrumb breadcrumbs avia-breadcrumbs\"><div class=\"breadcrumb-trail\" ><span class=\"trail-before\"><span class=\"breadcrumb-title\">You are here:<\/span><\/span> <span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\" ><span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ListItem\" itemprop=\"itemListElement\" ><a itemprop=\"url\" href=\"https:\/\/www.asecus.ch\/en\/\" title=\"Asecus\" rel=\"home\" class=\"trail-begin\"><span itemprop=\"name\">Home<\/span><\/a><span itemprop=\"position\" class=\"hidden\">1<\/span><\/span><\/span> <span class=\"sep\">\/<\/span> <span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\" ><span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ListItem\" itemprop=\"itemListElement\" ><a itemprop=\"url\" href=\"https:\/\/www.asecus.ch\/en\/news\/have-antivirus-solutions-become-obsolete\/\" title=\"Have antivirus-solutions become obsolete?\"><span itemprop=\"name\">Have antivirus-solutions become obsolete?<\/span><\/a><span itemprop=\"position\" class=\"hidden\">2<\/span><\/span><\/span><\/div><\/div>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcom12tj-524b27619b124ade1fe89cdccca84ac0\">\n.avia-section.av-kcom12tj-524b27619b124ade1fe89cdccca84ac0{\nmargin-top:0px;\nmargin-bottom:0px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-kcom12tj-524b27619b124ade1fe89cdccca84ac0 alternate_color avia-section-no-padding avia-no-border-styling  avia-builder-el-3  el_after_av_textblock  el_before_av_hr  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-7562'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1magt-06e475b6cf22ffa09d392d67ae562de8\">\n.flex_column.av-1magt-06e475b6cf22ffa09d392d67ae562de8{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1magt-06e475b6cf22ffa09d392d67ae562de8 av_one_full  avia-builder-el-4  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c\">\n#top .hr.av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c{\nmargin-top:0px;\nmargin-bottom:10px;\n}\n.hr.av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c .hr-inner{\nwidth:50px;\n}\n<\/style>\n<div  class='hr av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c hr-custom  avia-builder-el-5  el_before_av_textblock  avia-builder-el-first  hr-center hr-icon-no'><span class='hr-inner inner-border-av-border-none'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-ktwl2mla-7ebebab4d8f7e28cd96a46f36ebe5f86 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Ransomware despite antivirus solutions<\/h3>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-kdive95n-060e3250ff84a9964101af68c7bd49d1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Ransomware remains one of the most popular attack methodes used by cyber criminals. Files are encrypted in order to extort a ransom. Companies that fall victim to a ransomware campaign can comply with such ransom demands in the hope that the encrypted data will be restored in a reasonable amount of time. It should be noted however, that the actual decryption of data or the restoration of data from backups is a smaller problem. The downtime of IT systems that provide basic services often requires significantly more time for a successful recovery. Since 2019, attackers have gone one step further. With the so-called double extortion tactic, the data is not only encrypted, but also stolen. A customer who refuses to pay a corresponding ransom is now also threatened with the publication of the data. Companies with appropriate backup and recovery processes are remain vulnerable to the new tactic as the publication of their customer data and corresponding damage to their image.<\/p>\n<p>Switzerland is an attractive target: 46% of Swiss companies surveyed by Sophos stated that they had been the victim of a ransomware attack at least once in the last year. That is 9 percent more than the global average. The National Cyber Security Centre (NCSC) also warns SMEs in particular about the dangers of ransomware. This is because 80% of the reported attacks in Switzerland were carried out on SMEs.<\/p>\n<h4><strong>Why do so many companies fall victim to a ransomware attack and why do conventional antivirus solutions not offer adequate protection against ransomware?<\/strong><\/h4>\n<p>In the early days of antivirus programs, viruses were detected by their signature. However, this detection method can be easily circumvented by attackers by slightly modifying the malicious code.<\/p>\n<p>The next step in the evolution was the introduction of Endpoint Protection Platforms (EPP). In addition to signatures, they also use machine learning, behavioural analyses, sandboxing and other means to ensure endpoint protection. Modern EPP solutions offer the highest protection against known and unknown threats, but represent the last line of defence.<\/p>\n<p>Ransomware attackers are not satisfied with encrypting individual endpoints or their accessible data. They move around the network, gain higher privileges and compromise critical systems. The encryption software is thus distributed to all accessible systems. To coordinate and control the attack, command and control servers are used.<\/p>\n<p>Endpoint Detection and Response (EDR) and Network Detection and Response (NDR) systems can enhance EPP systems. They bring more visibility and can detect attacks or unusual events. However, many alert-messages without further context make it difficult for security teams to react effectively and quickly to an attack. The focus of EDR and NDR solutions is mainly on the technological side and not on the operational needs of companies.<\/p>\n<h4><strong>What does state-of-the-art protection against ransomware look like?<\/strong><\/h4>\n<p>In the evolution of endpoint protection solutions, another big step was taken in 2018: Extended Detection and Response (XDR). With XDR, different data silos are broken down and merged to provide holistic protection. In addition to endpoint data, data from the network, cloud resources, IAM and other systems are additionally taken into account. This consolidation of disparate data provides greater visibility and context. Threats can thus be detected more quickly and eliminated before damage occurs. Palo Alto Networks coined the term XDR in 2018 and remains the leading manufacturer of XDR solutions today.<\/p>\n<p>Cortex XDR from Palo Alto Networks offers companies the tools that were previously only available to specialists in Security Operation Centres (SOC). It provides you with a powerful platform that gives you visibility across all channels and the tools to intervene in the event of an attack. Asecus can help you configure Cortex XDR effectively and support you in its operation and maintenance.<\/p>\n<\/div><\/section><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-7562'><div class='entry-content-wrapper clearfix'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c\">\n#top .hr.av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c{\nmargin-top:0px;\nmargin-bottom:10px;\n}\n.hr.av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c .hr-inner{\nwidth:50px;\n}\n<\/style>\n<div  class='hr av-kty3pyev-6a8a19dd35aa204ccacc6b139976d90c hr-custom  avia-builder-el-8  el_after_av_section  el_before_av_textblock  avia-builder-el-first  hr-center hr-icon-no'><span class='hr-inner inner-border-av-border-none'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p>\n<section  class='av_textblock_section av-ktybxmxq-4d1b3a9ce02c7d0e58a6c812aab66c54 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong>Get in touch with our security experts today!<\/strong><\/p>\n<\/div><\/section>\n<section class=\"asecus_hubspot_contact_form_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div id=\"hubspot_form\"><\/div><\/section>\n<div   data-autoplay=''  data-interval='5'  data-animation='fade'  data-show_slide_delay='90'  class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-11  el_after_asecus_hubspot_contact_form  avia-builder-el-last  '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class='avia-content-slider-inner'><div class='slide-entry-wrap'><article class='slide-entry flex_column  post-entry post-entry-11640 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/en\/news\/from-wan-to-sd-wan-more-agility-and-security\/' data-rel='slide-1' class='slide-image' title='From WAN to SD-WAN: More Agility and Security'><img decoding=\"async\" loading=\"lazy\" width=\"2048\" height=\"1366\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-1.png\" class=\"wp-image-11641 avia-img-lazy-loading-11641 attachment-portfolio size-portfolio wp-post-image\" alt=\"View of Earth from space with glowing data streams orbiting it. In the foreground, the letters \u201cSD-WAN\u201d are displayed in large white letters.\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-1.png 2048w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-1-300x200.png 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-1-1030x687.png 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-1-768x512.png 768w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-1-1536x1025.png 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/en\/news\/from-wan-to-sd-wan-more-agility-and-security\/' title='From WAN to SD-WAN: More Agility and Security'>From WAN to SD-WAN: More Agility and Security<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-meta'><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-28T14:43:55+01:00\" >28. February 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >SD-WAN is a forward-looking alternative that enhances traditional WANs with\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/02\/sd-wan-1.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1366<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2048<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Anton Dreher<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-1-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Anton Dreher<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-10T11:27:39+01:00\" >2025-02-28 14:43:55<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-02-28 14:43:55<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>From WAN to SD-WAN: More Agility and Security<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-11614 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/en\/news\/microsoft-discontinues-default-outbound-access-in-azure\/' data-rel='slide-1' class='slide-image' title='Microsoft discontinues Default Outbound Access in Azure'><img decoding=\"async\" loading=\"lazy\" width=\"2048\" height=\"858\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-2.jpg\" class=\"wp-image-11615 avia-img-lazy-loading-11615 attachment-portfolio size-portfolio wp-post-image\" alt=\"Digital illustration of a stylized blue cloud with conductor track and circuit design on a background of binary code and network connections.\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-2.jpg 2048w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-2-300x126.jpg 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-2-1030x432.jpg 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-2-768x322.jpg 768w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-2-1536x644.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/en\/news\/microsoft-discontinues-default-outbound-access-in-azure\/' title='Microsoft discontinues Default Outbound Access in Azure'>Microsoft discontinues Default Outbound Access in Azure<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-meta'><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-01-17T09:01:05+01:00\" >17. January 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Azure customers who previously relied on Default Outbound Access must implement\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/azure_outbound-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>858<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2048<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Anton Dreher<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-1-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Anton Dreher<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-10T11:27:39+01:00\" >2025-01-17 09:01:05<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-17 09:01:05<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Microsoft discontinues Default Outbound Access in Azure<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-11593 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/en\/news\/ztna-the-secure-alternative-to-the-classic-vpn\/' data-rel='slide-1' class='slide-image' title='ZTNA: The secure alternative to the classic VPN'><img decoding=\"async\" loading=\"lazy\" width=\"2048\" height=\"1366\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-2.jpg\" class=\"wp-image-11596 avia-img-lazy-loading-11596 attachment-portfolio size-portfolio wp-post-image\" alt=\"Person interacting with tablet while icons for password, fingerprint, credit card, smartphone, and network security are displayed \u2013 focus on digital authentication and cybersecurity.\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-2.jpg 2048w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-2-300x200.jpg 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-2-1030x687.jpg 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-2-768x512.jpg 768w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-2-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/en\/news\/ztna-the-secure-alternative-to-the-classic-vpn\/' title='ZTNA: The secure alternative to the classic VPN'>ZTNA: The secure alternative to the classic VPN<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-meta'><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-01-12T13:56:10+01:00\" >12. January 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >The Zero Trust Network Access (ZTNA) approach offers a forward-looking alternative\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/01\/ztna-vpn-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1366<\/span>\n\t\t\t\t\t\t<span itemprop='width'>2048<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Anton Dreher<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-1-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Anton Dreher<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-10T11:27:39+01:00\" >2025-01-12 13:56:10<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-12 13:56:56<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ZTNA: The secure alternative to the classic VPN<\/span><\/span><\/span><\/article><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A lot has happend in the field of endpoint protection in recent years. <\/p>\n","protected":false},"author":9,"featured_media":7573,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[182],"tags":[189,193],"class_list":["post-7562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-news-en","tag-ransomware-en"],"_links":{"self":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts\/7562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/comments?post=7562"}],"version-history":[{"count":0,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts\/7562\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/media\/7573"}],"wp:attachment":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/media?parent=7562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/categories?post=7562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/tags?post=7562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}