The use of a modern remote access solution offers elements of endpoint security, identity verification, selective application sharing, access control for internal and external applications, cloud-based monitoring with anomaly detection, multi-factor authentication and central user management. With Active Directory, users can be easily managed via the cloud. This is how the transformation of the IT network architecture succeeds - from "perimeter security" to "zero trust", even for medium-sized businesses.