SDP vs VPN: A Real-World Performance and Security Comparison

VPNs grant network access. SDPs grant application access. This comparison covers attack surface, lateral movement, latency benchmarks, device posture, and a 5-phase migration path from VPN to SDP.

Every company with remote employees has a VPN. It has been the default answer to “how do we let people access internal systems from outside the office” for over two decades. OpenVPN, WireGuard, IPSec tunnels, Cisco AnyConnect. The technology works. Employees connect, authenticate with credentials, and get access to the corporate network. The problem is what happens after that connection is established. A VPN gives you a network. An SDP gives you an application. That single difference changes everything about your security posture, your attack surface, and what an attacker can do if credentials are compromised.

In 2024, Verizon’s Data Breach Investigations Report found that exploitation of VPN and edge device vulnerabilities as an initial access vector grew 180% year over year. Fortinet, Ivanti, Citrix, and Palo Alto all disclosed critical pre-authentication RCE vulnerabilities in their VPN products, and attackers exploited each one within days of disclosure. Gartner predicts that by 2025, at least 70% of new remote access deployments will use ZTNA (zero trust network access, the market term for SDP) rather than VPN, up from less than 10% in 2021. This article puts both approaches side by side with real CVE data, latency numbers, and architectural comparisons.

How VPN Access Actually Works

When an employee connects to a corporate VPN, the client software establishes an encrypted tunnel to the VPN gateway. The gateway authenticates the user (typically username/password plus an optional MFA token), assigns a virtual IP address from the corporate subnet, and routes traffic between the client and the internal network. From that point forward, the remote laptop behaves as if it were physically plugged into an office Ethernet port.

This means the employee can reach every device on the network that their IP address is allowed to access. The database server on port 5432. The internal wiki on port 443. The file server on port 445. The monitoring dashboard. The printer. The IP phone system. Even devices and services they have no business accessing are reachable at the TCP level. Firewall rules can restrict some of this, but the fundamental access model is network-wide.

The VPN gateway itself must listen on a public port. OpenVPN typically runs on UDP 1194 or TCP 443. WireGuard uses UDP 51820. IPSec uses UDP 500 and 4500. These ports are visible to every scanner on the internet. Shodan indexes over 4.2 million VPN endpoints globally, complete with version strings and supported cipher suites. An attacker does not need to break your VPN encryption. They just need to find a pre-authentication vulnerability in your VPN software, and those appear regularly. Fortinet, Pulse Secure, Citrix, and Palo Alto have all disclosed critical pre-auth RCE vulnerabilities in their VPN products. The timeline is relentless: Fortinet CVE-2024-21762 (CVSS 9.6, mass exploitation within 72 hours), Ivanti CVE-2023-46805/CVE-2024-21887 (exploited against 2,100+ organizations including MITRE and CISA itself), Citrix CVE-2023-4966 “Citrix Bleed” (session hijack used by LockBit ransomware against Boeing and DP World), and Palo Alto CVE-2024-3400 (CVSS 10.0, exploited as a zero-day with 22,500 exposed devices). CISA ordered all federal agencies to disconnect Ivanti VPN devices in January 2024.

A quick scan reveals what attackers see.

Scanning a traditional VPN endpoint
$ nmap -sU -p 1194,51820,500,4500 vpn.example.com
VPN ports visible to the internet
PORT      STATE  SERVICE

1194/udp  open   openvpn

4500/udp  open   ipsec-nat-t

500/udp   open   isakmp

51820/udp open   wireguard

Four open ports. Four services responding to unauthenticated probes. Four attack surfaces available to anyone with nmap installed.

How SDP Access Works Differently

Software-Defined Perimeter takes the opposite approach. There are no open ports. The server does not respond to connection attempts from unauthorized clients. No TCP handshake. No UDP response. No ICMP reply. To a port scanner, the server simply does not exist.

Access begins with a Single Packet Authorization (SPA) request. The client sends one cryptographically signed UDP packet to the SDP controller. This packet contains the user’s identity, a timestamp, and the specific application being requested. If the packet is invalid, the controller does nothing. No error response. No RST packet. Complete silence. The attacker learns nothing.

If the SPA is valid, the controller verifies the user’s identity (certificate, MFA), checks the device posture (OS version, patch level, disk encryption, endpoint protection status), and evaluates the access policy. Only if all checks pass does the controller instruct the SDP gateway to open a port for that specific client IP, to that specific application, for a limited time window. The client then establishes a mutual TLS connection directly to the application. No network access. No subnet. No lateral movement.

Free to use, share it in your presentations, blogs, or learning materials.
SDP vs VPN comparison showing VPN granting full network access with visible ports versus SDP providing per-application access with zero open ports and mutual TLS
Side-by-side comparison of VPN and SDP architectures. The VPN grants full subnet access through an always-on tunnel with visible gateway ports. SDP provides per-application access through SPA authentication, controller verification, and time-limited mTLS tunnels with zero visible ports.

The diagram above maps both access models from the remote user to the protected resources. On the VPN side, the tunnel opens access to the entire network, and all three servers are reachable. On the SDP side, the user is authorized for only the web application. The database and file server are invisible, shown as dashed outlines because no port is open, no route exists, and no connection is possible.

Attack Surface Comparison

The difference in attack surface between VPN and SDP is not incremental. It is categorical.

VPN attack surface. The VPN gateway listens on at least one public port. That port responds to unauthenticated probes. The gateway software (OpenVPN, StrongSwan, WireGuard) processes incoming packets before authentication occurs. Any parsing vulnerability in the handshake code is exploitable without credentials. Once an attacker gets past the VPN (through credential theft, session hijacking, or a pre-auth exploit), they land on the internal network with access to every routable IP address.

SDP attack surface. Zero public ports. The SDP controller validates a single UDP packet before any TCP connection is permitted. If the SPA packet is invalid, there is no response. The attacker cannot distinguish between “the server rejected my packet” and “there is no server here at all.” Even if an attacker captures valid credentials, they also need a valid device certificate, a device that passes posture checks, and a policy that grants access to the specific application they are targeting. Compromising one factor is not enough.

Here is what a port scan looks like against an SDP-protected server.

Scanning an SDP-protected server
$ nmap -sS -sU -p- –max-rate 5000 sdp-protected.example.com
All 65535 scanned TCP ports are filtered

All 65535 scanned UDP ports are open|filtered

Nmap done: 1 IP address (1 host up) — 0 open ports

Zero open ports. The server exists on the network (ICMP shows it as “up”), but no service responds to any probe on any port. There is nothing to fingerprint, nothing to exploit, and nothing to DDoS.

Free to use, share it in your presentations, blogs, or learning materials.
Security and performance benchmarks comparing SDP and VPN across attack surface, latency, blast radius, authentication depth, DDoS resilience, and ransomware entry statistics
Visual benchmark comparison across six dimensions: attack surface, latency overhead, blast radius after compromise, authentication depth, DDoS resilience, and ransomware entry statistics from Mandiant M-Trends 2025.

The benchmarks above show the contrast in measurable terms. The attack surface bar for VPN spans four open ports while SDP shows zero. The blast radius visualization shows VPN exposing an entire network graph of hosts versus SDP containing access to a single verified node. The authentication depth comparison makes the difference tangible: VPN checks two factors (password and optional MFA) before granting network access, while SDP chains five verification layers (SPA, identity, device posture, policy evaluation, mutual TLS) before granting access to one application.

Lateral Movement: The Critical Difference

Lateral movement is the technique attackers use to spread through a network after gaining initial access. They compromise one machine, scan for other hosts, exploit weak services, and eventually reach the target (usually a database, a domain controller, or a file server with sensitive data). VPNs enable lateral movement by design. Once you are on the network, you can reach other hosts. Firewall rules help, but they are often misconfigured, overly permissive, or bypassed through trusted service accounts.

SDP eliminates lateral movement entirely. The connection is between the client and a single application. There is no network access. The client cannot ping other hosts, scan other ports, or establish connections to services they were not explicitly authorized for. Even if an attacker compromises the SDP client device, the damage is limited to the one application the user was authorized to access at that moment.

Consider a real scenario. An employee’s laptop is compromised through a phishing email. With a VPN connection active, the malware can scan the entire 10.0.0.0/8 subnet, discover the HR database, the payroll system, and the domain controller. With SDP, the malware can reach exactly one application (the one the employee was using), and that access expires when the session ends.

Performance: Latency and Throughput

VPNs add latency because every packet is encapsulated inside the tunnel protocol. IPSec adds 50-80 bytes of overhead per packet. OpenVPN over TCP adds even more because you have TCP-inside-TCP, which causes retransmission amplification when packet loss occurs. WireGuard is the leanest option at roughly 32 bytes of overhead, but even WireGuard adds a processing step for every packet in both directions.

Typical latency overhead by VPN protocol:

  • OpenVPN (UDP). 15-25ms added latency, 10-15% throughput reduction due to encryption overhead and user-space processing
  • OpenVPN (TCP). 25-40ms added latency, TCP-in-TCP meltdown under packet loss, throughput drops 30-50% on lossy links
  • IPSec (IKEv2). 8-15ms added latency, kernel-space processing helps, but ESP header overhead is significant
  • WireGuard. 3-8ms added latency, kernel-space, minimal overhead, best VPN performance available

SDP connections use direct mTLS between the client and the application. There is no tunnel encapsulation, no extra header overhead, and no intermediary processing every packet. The latency overhead is limited to the TLS handshake (one round trip) and the per-packet encryption cost (negligible on modern hardware with AES-NI). In practice, SDP adds 2-5ms of latency, which is comparable to a direct HTTPS connection.

The initial SDP connection takes slightly longer than a VPN reconnect because the SPA validation, controller authorization, and gateway provisioning happen before the first TCP SYN. This adds 200-500ms to the first connection. But once the mTLS tunnel is established, every subsequent request is faster than VPN because there is no tunnel overhead.

Device Posture: What VPNs Cannot Check

Most VPN solutions authenticate the user. Username, password, maybe an MFA token. That is it. The VPN has no visibility into the state of the device. Is the operating system patched? Is disk encryption enabled? Is the antivirus running and up to date? Is the firewall on? A VPN happily connects a laptop running an unpatched Windows 7 with no antivirus, disabled firewall, and a known keylogger installed. The credentials were valid, so access is granted.

SDP controllers check device posture before every connection, not just at login. The SDP client reports the OS version, patch level, disk encryption status, endpoint protection state, and firewall configuration. If any check fails, the connection is denied. The user sees a message explaining what needs to be fixed before access is granted. This is not a one-time check at enrollment. It runs before every session and can be configured to run periodically during active sessions.

Example posture requirements for a typical SDP policy:

  • Operating system within 30 days of latest security update
  • Full disk encryption enabled (BitLocker, FileVault, LUKS)
  • Endpoint protection agent running with definitions less than 24 hours old
  • Host firewall enabled and configured
  • No jailbreak/root detection flags on mobile devices
  • Valid client certificate issued by the organization’s CA

When VPN Is Still the Right Choice

SDP is not a universal replacement for VPN. There are scenarios where a VPN is simpler, cheaper, and perfectly adequate.

Small teams with simple needs. A 5-person startup that needs remote access to a single office network benefits from WireGuard’s simplicity. Setting up an SDP stack for 5 users is overkill.

Site-to-site connectivity. Connecting two office networks together is a VPN’s native use case. IPSec site-to-site tunnels are well understood, reliable, and supported by every enterprise router. SDP is designed for user-to-application access, not network-to-network bridging.

Legacy applications that require network-level access. Some older applications use broadcast protocols, dynamic port ranges, or UDP-based services that do not map cleanly to SDP’s per-application model. If the application expects to be on the same subnet as the client, a VPN is the pragmatic choice until the application is modernized.

Budget constraints. A WireGuard VPN server costs nothing beyond the Linux host it runs on. Commercial SDP solutions from Zscaler, Cloudflare, or Palo Alto carry per-user-per-month licensing fees. Open-source options like OpenZiti exist, but they require more setup and operational expertise.

When SDP Is the Clear Winner

High-security environments. Financial institutions, healthcare organizations, government agencies, and any company handling sensitive data. The zero-attack-surface model and per-application access control are not optional in these contexts.

Third-party contractor access. Giving a contractor VPN access to your network is giving them the keys to the building. SDP lets you grant access to exactly one application, with a specific time window, verified device posture, and full session logging. When the contract ends, you revoke the policy. No VPN credentials to rotate, no firewall rules to clean up.

Multi-cloud and hybrid environments. Applications distributed across AWS, Azure, GCP, and on-premises data centers. A VPN would need multiple tunnels, split routing, and complex firewall rules. SDP abstracts the network entirely. The user connects to the application regardless of where it runs.

Compliance requirements. PCI-DSS, HIPAA, SOC 2, and ISO 27001 all require demonstrable access controls, audit trails, and least-privilege enforcement. SDP provides these natively. VPNs require bolting on additional tools to achieve equivalent compliance documentation.

Protecting against ransomware. Mandiant’s M-Trends 2024 report found that exploits surpassed phishing as the top initial access vector, with VPN and edge devices being the most targeted category. Sophos’s Active Adversary Report 2024 attributed 23% of ransomware initial access to VPN compromise. SDP eliminates this vector by removing the VPN endpoint from the internet entirely.

Migration Path: VPN to SDP

Free to use, share it in your presentations, blogs, or learning materials.
Five-phase VPN to SDP migration timeline showing identify, deploy alongside, migrate apps, restrict VPN, and decommission stages with attack surface reduction bar
The five-phase migration from VPN to SDP, each phase shown with its icon, output, and position on the attack surface reduction timeline. Blue for discovery, purple for parallel deployment, wine for migration, mustard for restriction, and teal for full SDP completion.

The migration timeline above maps each phase with a distinct color and icon. Phase 1 (blue) uses a magnifying glass scanning servers to identify high-value targets. Phase 2 (purple) shows VPN and SDP shield running side by side. Phase 3 (wine) visualizes apps moving from the VPN box into the SDP shield. Phase 4 (mustard) shows the VPN being restricted with firewall bars tightening. Phase 5 (teal) ends with a checkmark and the VPN crossed out. The attack surface reduction bar at the bottom shows the progressive decrease from high (red) to zero (teal) across all five phases.

Moving from VPN to SDP is not a single cutover. It is a phased migration that runs both systems in parallel.

  • Phase 1: Identify high-value applications. Start with the applications that handle the most sensitive data: databases, admin panels, financial systems. These get SDP protection first.
  • Phase 2: Deploy SDP alongside VPN. Install the SDP controller and gateway. Configure policies for the identified applications. Users access these apps through SDP while everything else stays on VPN.
  • Phase 3: Migrate application by application. Move each internal application behind SDP. Test access from all user groups. Verify that the legacy VPN-only path still works as a fallback.
  • Phase 4: Restrict VPN scope. As applications move to SDP, tighten VPN firewall rules so VPN users can only reach applications not yet migrated. This reduces the VPN’s blast radius progressively.
  • Phase 5: Decommission VPN. Once all applications are behind SDP, shut down the VPN gateway. Remove the public-facing port. The attack surface drops to zero.

Organizations That Already Made the Switch

Google replaced its corporate VPN with BeyondCorp, an internal SDP implementation, starting in 2014. The project is now a commercial product (BeyondCorp Enterprise). Google’s 150,000+ employees access internal applications without a VPN. Cloudflare documented replacing its own VPN with Cloudflare Access (their ZTNA product) internally. Siemens deployed Zscaler ZIA/ZPA across 300,000+ employees to replace legacy VPN infrastructure.

The US Federal Government issued CISA M-22-09 in January 2022, mandating all federal agencies adopt zero trust architecture by fiscal year 2024. The memorandum explicitly calls for moving away from perimeter-based VPN models. The UK National Cyber Security Centre published guidance in 2023 recommending ZTNA over VPN for remote access. The ZTNA market reached $2.1 billion in 2023 and is projected to grow to $19.6 billion by 2031 (CAGR of 32%), while the traditional VPN market is growing at under 3% annually.

The Bottom Line

VPNs solve a 1990s problem: “how do we extend the office network to remote locations.” SDP solves a 2026 problem: “how do we give users access to specific applications without exposing any network infrastructure.” If your threat model includes compromised credentials, insider threats, or sophisticated attackers who will exploit lateral movement, SDP is the architecture that addresses those risks. If your needs are simpler, a well-configured WireGuard VPN with MFA and strict firewall rules remains a solid option.

The question is not whether SDP is better than VPN in a technical vacuum. It is whether the additional protection justifies the operational complexity and cost for your specific environment. For most organizations handling sensitive data, serving external contractors, or operating in regulated industries, the answer is becoming increasingly clear.


References


Frequently Asked Questions

What is the main difference between SDP and VPN?

A VPN grants access to an entire network. Once connected, the user can reach every routable device on the subnet. SDP grants access to a single application. The user connects directly to one service through a mutual TLS tunnel, with no visibility into the rest of the network. If a VPN is a hallway pass to the building, SDP is a key to one specific room.

Is SDP more secure than VPN?

Yes, for most threat models. SDP has zero open ports (the server is invisible to scanners), enforces per-application access (no lateral movement), checks device posture before every connection, and uses mutual TLS with short-lived certificates. VPN exposes at least one public port, grants network-wide access after authentication, and typically does not verify device security state. Mandiant’s 2024 report found VPN and edge devices were the most targeted exploit category for initial access.

Can SDP completely replace a VPN?

For most use cases, yes. SDP handles user-to-application remote access, which is the primary VPN use case. Google replaced its corporate VPN with BeyondCorp across 150,000+ employees. Siemens deployed ZTNA across 300,000+ employees. Two scenarios still favor VPN: site-to-site network connectivity (IPSec tunnels between offices) and legacy applications that require broadcast protocols or dynamic port ranges on the same subnet.

Does SDP add more latency than VPN?

The initial SDP connection takes 200-500ms longer than a VPN reconnect because of SPA validation, controller authorization, and gateway provisioning. After that, SDP is faster. VPN adds 3-40ms per packet depending on the protocol (WireGuard 3-8ms, OpenVPN TCP 25-40ms) due to tunnel encapsulation. SDP uses direct mTLS with no tunnel overhead, adding only 2-5ms, comparable to a standard HTTPS connection.

How does SDP prevent lateral movement?

SDP connections are between the client and a single application. There is no network access, no subnet, and no routing to other hosts. The client cannot ping, scan, or connect to any service beyond the one it was authorized for. Even if malware compromises the client device, it can only reach the one application the user was accessing, and that access expires when the session ends. VPNs enable lateral movement by design because they place the client on the network.

What is Single Packet Authorization in SDP?

Single Packet Authorization (SPA) is the first step in SDP access. The client sends one cryptographically signed UDP packet to the controller containing the user identity, a timestamp, and the requested application. If the packet is invalid, the controller does nothing. No error, no response, complete silence. Valid packets trigger the controller to verify identity, check device posture, and open a time-limited port for that specific client IP to that specific application. This makes the server invisible to port scanners.

How do I start migrating from VPN to SDP?

Start with a 5-phase approach. Phase 1: identify high-value applications handling sensitive data. Phase 2: deploy SDP alongside VPN, routing only those apps through SDP. Phase 3: migrate applications one by one, keeping VPN as fallback. Phase 4: restrict VPN firewall rules so VPN users can only reach apps not yet migrated. Phase 5: decommission the VPN gateway once all apps are behind SDP. Open-source options like OpenZiti provide SDP without licensing fees. Commercial options include Zscaler ZPA, Cloudflare Access, and Palo Alto Prisma Access.