This article on protecting remote workers promotes "split tunneling" as a good thing. I totally disagree with that premise - maybe it is all those years of working under a mountain. I have yet to see any organization take the time to actually analyze the traffic of their remote workforce BEFORE deciding on an appropriate split tunnel configuration.
For instance, I've seen many organizations offload "web browsing traffic" because it is simply not connecting to a business application. What is in place today with split tunneling configuration is simply OOTB default dumbness. One example is offloading and permitting simultaneous connections to an enterprise network and PasteBin.com at the same time. See any problem with that?
I'd like to hear your experience on configuring split tunneling. Maybe it works for you...