VPN alternatives for business and privacy worriers alike

Online security became paramount thanks to Covid19 when remote access became necessary for work and leisure. Many businesses started looking for VPN alternatives (Virtual Private Network), so the past years gave birth to various options to defend yourself on the web.

Whether you’re looking for different ways to protect your business or are a privacy worrier – this article is just for you.

What can I use instead of a VPN?

A VPN establishes an encrypted communication tunnel to the internet by rerouting your data traffic through its servers. All you need to do to achieve network-wide security is to log in to your client and run the app. But while a VPN is an excellent solution for an individual, you should look into these bad boys if you’re looking to protect your business.

  1. Zero trust network access (ZTNA)

Zero trust means even you can’t be trusted. It’s a security measure mainly advertised for and used by companies. It’s a paranoid VPN alternative that:

  • Blocks all traffic by default;
  • Gives access to specific applications;
  • Uses multi-factor authentication (MFA);
  • Monitors all activity on the network;
  • Requires all network users to be continuously validated for security configuration;
  • Operates on the principle of least privilege – doesn’t give privileged access management to anyone in the network by default.

In layperson’s terms, to access the network further, you must re-validate yourself on almost every other step. You’re a threat from the program’s perspective, and your device is already a security liability – ergo, the constant re-authorization and “zero-trust” bit.

When this measure protects the network, the administrator authenticates users and monitors devices on and off the network. Another neat upside is that the net user can’t show their IP address outside the network’s perimeter (even when on the internet).

Consensus: ZTNA’s a safe security option keeping your company assets close to your chest (even if paranoically so). It’s a step up from hardware VPNs. But ZTNA isn’t adapted yet for easy home use and isn’t as convenient as a software VPN.

  1. Secure access service edge (SASE)

A couple of security solutions wearing a SASE (read: sassy) trenchcoat. The idea is to combine many services into a single, cloud-based security service.


Let’s go over each program hiding under the sassy coat to understand what SASE does.

Software-defined networking (SDN) – a network that’s managed via software.

Security web gateway (SWG) – prevents unsecured (possibly malicious) data traffic from entering a network.

Cloud access security brokers (CASBs) are “sensitive” points between the service provider and user that trigger different security policies once cloud-based resources are accessed.

The policies are: user authentication, authorization, single sign-on, credential mapping, device profiling, encryption, tokenization, logging, alerting, and malware detection/prevention.

Firewall as a service (FWaaS) – a firewall on your computer inspects and filters your data traffic. And FWaaS is the same concept but adapted to the cloud to make cloud computing more secure.

Zero trust network access (ZTNA) – as explained above, it’s a strict security option that prevents users from seeing anything they don’t have permission to access.

Consensus: SASE is a relatively new cloud-based security solution. It’s designed to be approachable and an all-in-one security solution for large companies.

However, due to it being fresh, troubleshooting may be harder, and managing the internal network can be a hassle. SASE may sometimes overlap with other security measures (like recently implemented SD-WAN) and cause performance issues.

  1. Proxy servers

When comparing a VPN vs. Proxy, both are similar in one regard – they reroute your data and change your IP address (Internet Protocol). But let’s talk proxy. This service means that another server on the web represents your device by proxy (pun intended).

Your internet service provider (ISP) gives you a distinct IP depending on your location. Your browser uses your IP to send requests to every server it contacts on the web.

When you use a proxy, your data traffic travels through their servers and gets a new IP. This is a good way to circumvent geoblocking and escape IP tracking (and all that comes with it).

There’s an ample number of proxies used for different purposes with different protocols, but I’ll only mention the topical ones further along in this article.

Consensus: using a proxy server will give you a new IP which is an excellent way to find markets with lower prices and find a way around geographical restrictions on the web.

HOWEVER, aside from IP change, a proxy doesn’t provide any security on the web or your network.

  1. Smart domain name server (DNS)

Smart DNS has some similarities to a VPN – it’s a service that uses both DNS servers and proxy ones to change your DNS address. Some refer to it as a DNS proxy.

The DNS system is a language that computers use to communicate. It uses the DNS to translate the website’s name (e.g. www.surfshark.com) into an IP address.

A smart DNS service routes the traffic through its servers and gives you a different DNS address without changing the IP. It also forces the websites you visit to look at your new-found DNS address first, which is usually enough to circumvent ISP-issued geo-blocks.

However, security-wise it offers nothing. Your IP is still the same and can be seen by more tenacious service providers.

Consensus: smart DNS is an excellent option to get over a geo-restriction when your device doesn’t support a VPN. However, it offers no protection.

  1. Shadowsocks

It’s a semi-proxy service whose main purpose is to dig under some restrictions and censorship (hint: it has something to do with Asian walls). Founded by a Chinese programmer, this service has an exciting founding history.

Shadowsocks is not entirely a proxy but an app that connects to a SOCKS5 proxy server. But the proxy itself differs from others by offering a combo of three authentication methods:

  • Null authentication – no authentication is necessary when connecting to a proxy. Your password’s accepted without checking;
  • Username/password authentication – the password is accepted as long as it corresponds with the username you gave;
  • GSS-API authentication – it’s a process where two or more computers (your device and the server you’re trying to reach) use the same authentication methods to verify your identity.

Shadowsocks, paired with SOCKS5, funnels your traffic through a remote server and changes your IP address before your data reaches the services you want to get to.

Consensus: Shadowsocks changes your IP and helps you hide your location, but it won’t secure your traffic. Its thin veil of security easily crumbles under deep packet inspection (DPI) tools (if somebody were to use them).

Might be great for individual use to overcome web restrictions, but Shadowsocks isn’t a good security option when managing your business network.

  1. SSH Tunnel

SSH tunneling, or SSH port forwarding, means transferring any data (referred to as arbitrary data) over an encrypted SSH channel.

What is SSH? 

Secure shell protocol that uses cryptography. A shell is a program where the commands are issued via text rather than a mouse, keyboard, or touchscreen. You can log in to your shell from a device that’s not yours – and that’s the basis for secure remote work with SSH.

Note: SSH connects you to a specific device. SSH sounds similar to a VPN, but SSH connects to a particular device, whereas a VPN connects to a network.

What is port forwarding?

Port forwarding lets servers from the internet access devices on a private network. Once data from the internet reaches a device, port forwarding redirects it through a specific entry place on the device – a port.

What is SSH port forwarding / SSH tunneling?

This lets you forward data via an encrypted tunnel from another client application running on the same computer as a secure shell client. Thanks to its cryptography and ability to connect directly, this security protocol can also be used to go over firewalls.

Consensus: SSH tunneling is a great security measure when looking at software VPN alternatives for a business. It encrypts your data passing through the SSH channels. Also, individual use of SSH tunneling is possible, but it requires knowledge.

There aren’t many drawbacks – SSH tunneling secures only the part of the data that goes through its client, and server-wide implementation requires experienced personnel.

  1. ToR

The onion router (TOR) is a good solution for individual users. But if you’re a speed-dependant business thinking of choosing TOR over a VPN, then you should reconsider.

What is ToR, in short, please?

The onion router refers to the ToR software and its network of ToR servers. The service is partially reliant on volunteers.

How does ToR work

Tor uses a group of layered private servers (volunteers offering their computers) to route and encrypt your internet traffic through the internet:

  1. It connects with a list of available nodes in the network spanning across the world;
  2. The data is funneled through a series of three random TOR nodes. Each of these is different from one another and has a unique encryption key:

The entry node knows the user and the relay node.

The relay node knows the entry and exit nodes.

The exit node knows the relay node and the destination.

Because of the network’s architecture, no single computer knows where the data flow origin point is and its final destination point – your identity and IP are safe.

However, ToR has some downsides. The main ones are – slow internet speeds, and the service doesn’t use obfuscation. That means even if your internet service provider can’t see what you’re browsing, they can still see you using ToR which is illegal in some countries.

Consensus: thanks to its unique infrastructure, ToR is a fantastic privacy tool for individual use. But its greatest asset is its bottleneck. While we agree with the internet being free and accessible for anyone, we also think there’s a simpler and faster way to secure your online presence, especially if you’re running an enterprise.

Closing thoughts

If you want to scale your business up and keep it safe, hardware VPNs are an exponentially growing hassle. A great legacy VPN replacement for a business is the SASE service. If your network is already secure and only needs a touch-up – try out ZTNA.

It all depends on your security administrator’s taste – do they like the flavor of detailed network management? Maybe their palette is not as refined yet, and you’re looking for a more straightforward solution.

Also, remember that many hardware VPN issues have been resolved by their successor – the software VPN. A VPN connection is a great option both for home use AND business. Easy to scale, simply implemented, and secured through the use of RAM-based servers, encryption, and obfuscation.

Secure remote work (and leisure) made possible with a software VPN

Get Surfshark


What is safer than a VPN?

ToR is said to offer more privacy for individual use thanks to its service infrastructure. It helps you access the dark web and is often used for secure communication. Nonetheless, the service is sometimes disruptive and doesn’t use obfuscation – it doesn’t hide the fact that you’re using ToR.

For business owners – it’s not recommended to shift from VPNs to ToR simply because of unreliable service speeds and lack of network management.

Is Tor better than VPN?

It depends on who is using it and why they need it. A brief ToR vs. VPN overview for you – ToR is great when you’re not concerned about speed and you need to relay something sensitive; a VPN is reliable when you need privacy on mundane internet browsing – it balances between speed and convenience.

Is VPN safer than proxy?

Yes, because a VPN not only gives you a new IP but also encrypts your data traffic and obfuscates it. A proxy will only reroute your traffic and change your IP, which makes it great for jumping over geo-blocks.