The pandemic has forced millions of people to work from home. This instantly caused heartburn for the IT departments of large corporations because remote workers create new security vulnerabilities and open companies to cyberattacks and hacking. Big companies have spent the last decade moving data behind firewalls and suddenly are being asked to let thousands of employees pierce the many layers of protection against outside threats.
Comcast announced a new product that will alleviate many of the corporate IT concerns. Comcast, along with Aruba has created the Comcast Business Teleworker VPN product. This product creates a secure VPN at an employee’s home and transports the VPNs for all remote workers to a remote datacenter where corporate IT can then deal with all remote workers in one place. This isolates the worker connections from the corporate firewalls and employees instead deal with copies of corporate software that sit in a datacenter.
There is a perceived long-term need for the product since as many as 70% of companies say that they are likely to continue with the work-from-home model after the end of the pandemic. Working from home is now going to be a routine component of corporate life.
At the home end, the Comcast product promises to not interfere with existing home broadband. The only way for Comcast to do this is to establish a second data stream from a house using a separate cable modem (or utilizing modems that can establish more than one simultaneous connection). This is an important aspect of the product because one of the biggest complaints about working from home is that many homes have problems accommodating more than one or two workers or students at the same time. This new product would be ill-received by workers if implementing it means less bandwidth for everybody else in the home.
By routing all remote employees to a common hub, Comcast will enable corporate IT staff to mimic the work computing environment for remote workers. Many companies are currently giving remote employees limited access to core software systems and data, but this arrangement effectively establishes the Comcast hub as a secure node on the office network.
This is something that any ISP with a fiber network should consider mimicking. An open-access network on fiber already does this same thing today. An open-access network creates a VPN at each customer of a given ISP and then aggregates the signals, untouched, to deliver to the ISP. On a fiber network, this function can be done by fairly simple routing. Fiber ISPs can also provide the home working path separate from the consumer path by either carving out a VPN or else providing a second data path – something most fiber ONTs already allow.
Comcast has taken the extra step of partnering with Aruba to enable a corporation to establish a virtual corporate data center at a remote site. But fiber ISPs don’t have to be that complicated and rather than offering this to only large corporate clients, a fiber network could deliver a secure path between home and office for a business with only a few remote employees.
This could even be provided to sole proprietors and could safely link home and office on a VPN. That allows for the marketing of a ‘safe office’ connection for businesses of any size and would provide the average small business a much more secure connection between home and office than they have today.
Every fiber provider that serves both residential communities and business districts ought to develop some version of this product by year-end. If working from home is a new reality, then fiber-based ISPs ought to be catering to that market using the inherent robustness and safety of a fiber network to create and route VPNs over the local fiber network.