<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Devin Partida &#8211; MartechView</title>
	<atom:link href="https://martechview.com/author/devin-partida/feed/" rel="self" type="application/rss+xml" />
	<link>https://martechview.com</link>
	<description>Where Technology Powers Customer Experience</description>
	<lastBuildDate>Thu, 22 Jan 2026 06:25:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://martechview.com/wp-content/uploads/2023/10/Fevicon.png</url>
	<title>Devin Partida &#8211; MartechView</title>
	<link>https://martechview.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>When New Year Travel Strains Corporate VPNs and SASE</title>
		<link>https://martechview.com/when-new-year-travel-strains-corporate-vpns-and-sase/</link>
		
		<dc:creator><![CDATA[Devin Partida]]></dc:creator>
		<pubDate>Tue, 20 Jan 2026 13:36:07 +0000</pubDate>
				<category><![CDATA[CX]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Customer Experience (CX)]]></category>
		<guid isPermaLink="false">https://martechview.com/?p=33308</guid>

					<description><![CDATA[<p>Peak New Year travel tests VPN and SASE resilience. How IT teams can reduce latency, close security gaps, and keep remote workers productive.</p>
<p>The post <a rel="nofollow" href="https://martechview.com/when-new-year-travel-strains-corporate-vpns-and-sase/">When New Year Travel Strains Corporate VPNs and SASE</a> appeared first on <a rel="nofollow" href="https://martechview.com">MartechView</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Peak New Year travel tests VPN and SASE resilience. How IT teams can reduce latency, close security gaps, and keep remote workers productive.</h2>
<p><span style="font-weight: 400;">As the new year begins, airport lounges fill with employees juggling boarding passes and last-minute work, often while connected to public Wi-Fi. During peak travel periods, many rely on virtual private networks (VPNs) and secure access service edge (SASE) platforms to reach corporate applications securely. But crowded networks and sudden traffic spikes can increase latency and open subtle security gaps—disruptions that slow productivity and heighten risk for IT teams.</span></p>
<h3><span style="font-weight: 400;">The New Year Network Strain</span></h3>
<p><span style="font-weight: 400;">Post-holiday travel drives a surge in remote connections from geographically dispersed—and often less secure—locations. That sudden load funnels traffic through corporate access points and public networks alike, increasing contention and latency.</span></p>
<p><span style="font-weight: 400;">Traditional VPNs, which backhaul traffic to centralized data centers, are particularly vulnerable when many users connect at once. The result is familiar: sluggish application performance, dropped video calls, and frustrated employees.</span></p>
<p><span style="font-weight: 400;">Security risks rise in parallel. </span><a href="https://martechview.com/can-ai-finally-fix-the-travel-planning-mess/"><span style="font-weight: 400;">Peak travel periods</span></a><span style="font-weight: 400;"> attract threat actors, and unsecured public Wi-Fi makes “evil twin” access points an easy way to intercept credentials. Tax-season phishing and social-engineering campaigns also intensify. One recent analysis found that tax scam reports climbed 62 percent year over year from 2024 to 2025, raising the odds that a single compromised device could expose corporate systems. Capacity limits, architectural constraints, and attack volume compound one another, leaving networks strained unless IT teams intervene deliberately.</span></p>
<h3><span style="font-weight: 400;">Strategies for Bulletproofing Networks in the New Year</span></h3>
<p><span style="font-weight: 400;">For organizations that already have VPN and SASE in place, resilience depends less on wholesale replacement than on targeted operational adjustments and clear user guidance.</span></p>
<h4><span style="font-weight: 400;">Conduct a year-end network health check</span></h4>
<p><span style="font-weight: 400;">IT teams should plan for traffic spikes around major travel windows by running simulated load tests on VPN concentrators and SASE enforcement nodes. These tests reveal bottlenecks before users encounter them, allowing teams to provision temporary capacity and avoid emergency firefighting. Proper planning reduces service degradation, cuts help-desk tickets, and delivers more predictable performance.</span></p>
<h4><span style="font-weight: 400;">Evaluate advanced VPN configurations</span></h4>
<p><span style="font-weight: 400;">Multihop or double-VPN architectures may be appropriate for high-risk users, but they come with performance costs. Surveys indicate that 57 percent of users have experienced a cyberattack while using a VPN, underscoring the need to test advanced configurations under realistic load. Measuring added latency, CPU usage, and throughput helps teams apply stronger protections only where they justify the trade-off.</span></p>
<h4><span style="font-weight: 400;">Prioritize critical applications with quality of service (QoS)</span></h4>
<p><span style="font-weight: 400;">Application-aware QoS policies can preserve usability during congestion by prioritizing essential traffic. When SASE platforms support application classification, enforcement should occur as close to the user as possible. This approach maintains interactive performance without requiring costly bandwidth upgrades.</span></p>
<h4><span style="font-weight: 400;">Review and optimize SASE policies</span></h4>
<p><span style="font-weight: 400;">Ahead of the travel season, teams should tighten rules that allow unnecessary local breakouts, confirm application mappings, and tune threat thresholds to reduce false positives that trigger mass reauthentication or session drops. Just as important, policy push and rollback procedures must be tested to ensure smooth deployment across regions. Well-calibrated policies reduce friction while maintaining security under volatile traffic conditions.</span></p>
<h4><span style="font-weight: 400;">Implement split tunneling—carefully</span></h4>
<p><span style="font-weight: 400;">Where appropriate, allow approved traffic to exit locally rather than routing every packet through a corporate data center. Sensitive traffic should remain inspectable under strict SASE or firewall controls. When done correctly, split tunneling reduces congestion and latency, improves application responsiveness, and lowers infrastructure costs during peak demand.</span></p>
<h3><span style="font-weight: 400;">Foundations for Strong New Year Connectivity</span></h3>
<p><span style="font-weight: 400;">Even the best configurations rely on fundamentals. Predictable performance during travel windows requires proactive monitoring, disciplined capacity planning, and informed users.</span></p>
<p><span style="font-weight: 400;">Dashboards focused on year-end transitions should track connection success rates, latency, session drops, and authentication failures. Stress tests enable teams to adjust capacity or routing before problems escalate.</span></p>
<p><span style="font-weight: 400;">Operational hygiene begins with visibility. Many outages and security incidents trace back to unmanaged endpoints, yet surveys show that 51 percent of security professionals lack full visibility into devices on their networks. Accurate inventories enable targeted protections and smarter decision-making.</span></p>
<p><span style="font-weight: 400;">Finally, brief, practical guidance for travelers—one-page cheat sheets or short refreshers—can reduce risky behavior and help users resolve minor issues on their own. Education paired with simple controls turns users into allies rather than liabilities.</span></p>
<h3><span style="font-weight: 400;">Keeping Networks Secure in the New Year</span></h3>
<p><span style="font-weight: 400;">New Year travel amplifies both load and risk, but it does not have to overwhelm IT teams. With a concise year-end playbook, targeted tuning, and real-time monitoring, seasonal stress becomes a manageable variation—keeping employees productive and threats contained as the year begins.</span></p>
<p>The post <a rel="nofollow" href="https://martechview.com/when-new-year-travel-strains-corporate-vpns-and-sase/">When New Year Travel Strains Corporate VPNs and SASE</a> appeared first on <a rel="nofollow" href="https://martechview.com">MartechView</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
