It’s not a stretch to say that most industries and organizations today have contractors in the mix who need remote access to the company’s network. Yet the traditional virtual private network (VPN) method of enabling access for corporate contractors—as well as other third parties such as vendors, partners, and customers—has a key flaw. The VPN model, by design, requires companies to place excessive trust in every contractor and third party who taps into the network, when a “zero trust” approach is really what’s needed.