Very slick
Use Cases and Deployment Scope
Pros
- Redundant tunnel endpoints
- Zero trust access management
Cons
- Static IP addresses are behind a subscription tier. Being able to pay for specific features would be useful when you don’t be the full stack on offer.
- Alerts for tunnels going down could be more granular. While you can subscribe to tunnel down events, there isn’t an obvious difference between 1/5 is down vs 9/10 out of action. Where the latter would be substantially more of a pressing issue you have to login to check which is the case.
Return on Investment
- 100% of our services run through zero trust, not even a printer can be accessed without the user being verified and the workstation in good standing via Defender. This means our WiFi is just a ‘guest’ internet access setup and is of no security risk to us.
