All posts

The VPN was on fire, and no one could put it out

That was the day we switched to an identity‑aware proxy for remote access. Firewalls, credential stores, scattered SSH keys—gone. Instead, every connection checked who you were, not where you were coming from. Every request passed through a remote access proxy that enforced policy in real time. It was clean, controlled, and visible. Identity‑aware proxy, or IAP, changes how remote access works. You stop thinking about network location. You connect regardless of IP, without a static VPN tunnel s

Free White Paper

Always-On VPN + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

That was the day we switched to an identity‑aware proxy for remote access. Firewalls, credential stores, scattered SSH keys—gone. Instead, every connection checked who you were, not where you were coming from. Every request passed through a remote access proxy that enforced policy in real time. It was clean, controlled, and visible.

Identity‑aware proxy, or IAP, changes how remote access works. You stop thinking about network location. You connect regardless of IP, without a static VPN tunnel sitting open. A remote access proxy handles session authentication and authorization at the edge. It verifies identity through single sign‑on, multi‑factor authentication, and continuous checks during the session.

Using an IAP means security rules follow the person, not the device. A developer opening an internal admin tool from a laptop at home goes through the same strict checks as one connecting from the office. Policies can be tied to user roles in your identity provider. You can decide who gets into the staging dashboard, who can touch production, and who can only see logs.

The remote access proxy also becomes a single point for logging and monitoring. You get a trace of every command, every request, every login attempt. That visibility turns security from an afterthought into a continuous process. Managers can measure real usage. Engineers can debug without guessing.

Continue reading? Get the full guide.

Always-On VPN + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Legacy VPN access grants a blanket permit. Once someone is in, they can move laterally. An identity‑aware proxy shuts that door. Access is scoped to a single app, service, or database. Session starts, session ends, scope disappears. That reduces attack surface and makes compliance easier, because each access event is fully recorded with user identity attached.

Deploying one no longer needs months of planning. Modern remote access proxy tools can integrate with the identity provider you already have, whether it’s Okta, Google Workspace, or Azure AD. You register your internal service, apply policies, and employees log in through the proxy. TLS is automatic, audits are automatic, and revoking access is one click.

When you see it live for the first time, the difference is obvious. No dangling SSH keys. No “who has the VPN right now?” emails. Just tight, identity‑centric access that fits the way teams work now.

You can see this working in minutes. Try it with hoop.dev and watch your identity‑aware remote access proxy replace your old VPN before the day ends.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts