Saturday, May 31, 2025
News Wave
No Result
View All Result
  • Home
  • World
  • USA
  • Business
  • Sports
  • Entertainment
  • Technology
News Wave
  • Home
  • World
  • USA
  • Business
  • Sports
  • Entertainment
  • Technology
No Result
View All Result
News Wave
No Result
View All Result
Home Business

The Real Deal About ZTNA and Zero Trust Access

22 February 2024
in Business
0 0
The Real Deal About ZTNA and Zero Trust Access
Share on FacebookShare on Twitter


ZTNA hasn’t delivered on the full promise of zero trust

Zero Trust has been all the rage for several years; it states, “never trust, always verify” and assumes every attempt to access the network or an application could be a threat. For the last several years, zero trust network access (ZTNA) has become the common term to describe this type of approach for securing remote users as they access private applications. While I applaud the progress that has been made, major challenges remain in the way vendors have addressed the problem and organizations have implemented solutions. To start with, the name itself is fundamentally flawed. Zero trust network access is based on the logical security philosophy of least privilege. Thus, the objective is to verify a set of identity, posture, and context related elements and then provide the appropriate access to the specific application or resource required…not network level access.

Most classic ZTNA solutions on the market today can’t gracefully provide this level of granular control across the full spectrum of private applications. As a result, organizations have to maintain multiple remote access solutions and, in most scenarios, they still grant access at a much broader network or network segment level. I believe it’s time to drop the “network” from ZTNA and focus on the original goal of least-privilege, zero trust access (ZTA).

Classic ZTNA drawbacks

With much in life, things are easier said than done and that concept applies to ZTNA and secure remote access. When I talk to IT executives about their current ZTNA deployments or planned initiatives there are a set of concerns and limitations that come up on a regular basis. As a group, they are looking for a cloud or hybrid solution that provides a better user experience, is easier for the IT team to deploy and maintain, and provides a flexible and granular level of security…but many are falling short.

With that in mind, I pulled together a list of considerations to help people assess where they are and where they want to be in this technology space. If you have deployed some form of ZTNA or are evaluating solutions in this area, ask yourself these questions to see if you can, or will be able to, meet the true promise of a true zero trust remote access environment.

Is there a method to keep multiple, individual user to app sessions from piggybacking onto one tunnel and thus increasing the potential of a significant security breach?
Does the reverse proxy utilize next-generation protocols with the ability to support per-connection, per-application, and per-device tunnels to ensure no direct resource access?
How do you completely obfuscate your internal resources so only those allowed to see them can do so?
When do posture and authentication checks take place? Only at initial connection or continuously on a per session basis with credentials specific to a particular user without risk of sharing?
Can you obtain awareness into user activity by fully auditing sessions from the user device to the applications without being hindered by proprietary infrastructure methods?
If you use Certificate Authorities that issue certs and hardware-bound private keys with multi-year validity, what can be done to shrink this timescale and minimize risk exposure?

While the security and architecture elements mentioned above are important, they don’t represent the complete picture when developing a holistic strategy for remote, private application access. There are many examples of strong security processes that failed because they were too cumbersome for users or a nightmare for the IT team to deploy and maintain. Any viable ZTA solution must streamline the user experience and simplify the configuration and enforcement process for the IT team. Security is ‘Job #1’, but overworked employees with a high volume of complex security tools are more likely to make provisioning and configuration mistakes, get overwhelmed with disconnected alerts, and miss legitimate threats. Remote employees frustrated with slow multi-step access processes will look for short cuts and create additional risk for the organization.

To ensure success, it’s important to assess whether your planned or existing private access process meets the usability, manageability and flexibility requirements listed below.

The solution has a unified console enabling configuration, visibility and management from one central dashboard.
Remote and hybrid workers can securely access every type of application, regardless of port or protocol, including those that are session-initiated, peer-to-peer or multichannel in design.
A single agent enables all private and internet access functions including digital experience monitoring functions.
The solution eliminates the need for on-premises VPN infrastructure and management while delivering secure access to all private applications.
The login process is user friendly with a frictionless, transparent method across multiple application types.
The ability to handle both traditional HTTP2 traffic and newer, faster, and more secure HTTP3 methods with MASQUE and QUIC

Cisco Secure Access: A modern approach to zero trust access

Secure Access is Cisco’s full-function Security Service Edge (SSE) solution and it goes far beyond traditional methods in multiple ways. With respect to resource access, our cloud-delivered platform overcomes the limitations of legacy ZTNA. Secure Access supports every factor listed in the above checklists and much more, to provide a unique level of Zero Trust Access (ZTA). Secure Access makes online activity better for users, easier for IT, and safer for everyone.

Here are just a few examples:

To protect your hybrid workforce, our ZTA architectural design has what we call ‘proxy connections’ that connect one user to one application: no more. If the user has access to several apps as once, each app connection has its own ‘private tunnel’. The result is true network isolation as they are completely independent. This eliminates resource discovery and potential lateral movement by rogue users.
We implement per session user ID verification, authentication and rich device compliance posture checks with contextual insights considered.
Cisco Secure Access delivers a broad set of converged, cloud-based security services. Unlike alternatives, our approach overcomes IT complexity through a unified console with every function, including ZTA, managed from one interface. A single agent simplifies deployment with reduced device overhead. One policy engine further eases implementation as once a policy is written, it can be efficiently used across all appropriate security modules.
Hybrid workers get a frictionless process: once authenticated, they go straight to any desired application-with just one click. This capability will transparently and automatically connect them with least privileged concepts, preconfigured security policies and adaptable enforcement measures that the administrator controls.
Connections are quicker and provide high throughput. Highly repetitive authentication steps are significantly reduced.

With this type of comprehensive approach IT and security practitioners can truly modernize their remote access. Security is greatly enhanced, IT operations work is dramatically simplified, and hybrid worker satisfaction and productivity maximized.

To obtain deeper insights into the technical requirements for true zero trust private access and to see how Cisco Secure Access with ZTA overcomes the limitations of ZTNA, view the Deep dive into a modern Zero Trust Access (ZTA) architecture webinar. Also, visit the Cisco SSE Institute site for more information on ZTA and SSE.

We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!

Cisco Security Social Channels

InstagramFacebookTwitterLinkedIn

Share:



Source link

Tags: AccessdealRealtrustZTNA
Previous Post

The Situation and Angelina Pivarnick Shock Costars by Revealing They Dated Pre-Jersey Shore

Next Post

A Marketplace of Girl Influencers Managed by Moms and Stalked by Men

Related Posts

75% of Workers Today Plan to Have a Job in Retirement. Here's Why You Should, Too.
Business

75% of Workers Today Plan to Have a Job in Retirement. Here's Why You Should, Too.

by My News Wave
31 May 2025
0

A significant motivation for retirement is to cease working, especially for those who have endured stressful jobs over the years. However, a recent survey by the Employee Benefit Research Institute reveals that 75% of workers are considering continuing to work during retirement, suggesting it may offer various benefits. Embracing a job in retirement could enhance financial stability and personal fulfillment, making it a worthwhile option for many retirees. Full Article

Read more
Down 24%, Should You Buy the Dip on BigBear.ai?
Business

Down 24%, Should You Buy the Dip on BigBear.ai?

by My News Wave
31 May 2025
0

BigBear.ai (NYSE: BBAI), an AI data analytics firm, has experienced significant share price volatility, soaring 142% over the past year compared to an 11% return for the S&P 500, though it has recently faced a 24% decline in the last three months. This downturn has raised questions for investors about whether it is a good time to buy or a signal to avoid the stock. Despite its past gains, the company still has much to...

Read more
2 High-Dividend Stocks Smart Investors Can Buy in June
Business

2 High-Dividend Stocks Smart Investors Can Buy in June

by My News Wave
31 May 2025
0

As June approaches, there are promising investment opportunities in dividend stocks. Tyler Crowe recommends HF Sinclair (NYSE: DINO), while Certified Financial Planner® Matt Frankel suggests the Vanguard International High Dividend Yield ETF (NASDAQ: VYMI) to capitalize on the low valuations of non-U.S. companies. *Stock prices referenced are from May 22, 2025, with the video published on May 24, 2025. Full Article

Read more
The 2026 COLA Could Disappoint Social Security Retirees
Business

The 2026 COLA Could Disappoint Social Security Retirees

by My News Wave
31 May 2025
0

Retirees on a fixed income rely heavily on Social Security benefits to cover their expenses, making annual increases crucial to maintaining their financial stability amid rising prices. While benefits are expected to rise in 2026, the anticipated increase is likely to be disappointing for many seniors. Despite this, retirees should not be overly concerned, as adjustments are necessary for keeping pace with inflation, even if the increments fall short of expectations. Full Article

Read more
Why Altcoins Were Flopping on Friday
Business

Why Altcoins Were Flopping on Friday

by My News Wave
30 May 2025
0

On a forgettable Friday, the equities market's decline and concerns over global trade led investors to steer clear of cryptocurrencies, with few showing any positive movement. Ethereum (CRYPTO: ETH) fell nearly 3%, while other notable declines included Solana (CRYPTO: SOL) at 4%, Chainlink (CRYPTO: LINK) at almost 7%, and Dogecoin (CRYPTO: DOGE) dropping over 8%. The ongoing trade war, marked by tariffs from the Trump administration, continued to fuel fears among crypto investors about its...

Read more
Why Oklo Stock Bumped Higher This Week
Business

Why Oklo Stock Bumped Higher This Week

by My News Wave
30 May 2025
0

This week, the American nuclear industry gained attention, particularly with a notable increase in Oklo (NYSE: OKLO) stock, which rose over 5%. The momentum was driven by President Trump's recent executive order, signed last Friday, which aims to support the nuclear sector by permitting reactor testing at Department of Energy laboratories and allowing the construction of nuclear power facilities on public land. This executive action is expected to bolster the growth and development of the...

Read more
News Wave

News Summarized. Time Saved. Bite-sized news briefs for busy people. No fluff, just facts.

CATEGORIES

  • Africa
  • Asia Pacific
  • Australia
  • Business
  • Canada
  • Entertainment
  • Europe
  • India
  • Middle East
  • New Zealand
  • Sports
  • Technology
  • UK
  • USA
  • World

LATEST NEWS STORIES

  • Egypt, Tunisia, Algeria call on Libyan parties to cease escalation, hold simultaneous elections – Middle East Monitor
  • The Mississippi town behind the box office hit Sinners
  • Emmy-winning actress Valerie Mahaffey dies at 71 after cancer battle
  • About Us
  • Disclaimer
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact Us

Copyright © 2025 News Wave
News Wave is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • World
  • USA
  • Business
  • Sports
  • Entertainment
  • Technology

Copyright © 2025 News Wave
News Wave is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In