As cloud architecture spelled an end to the “walled fortress” security model, the rapid transition to a remote workforce has accelerated the demise of perimeter defenses.Organizations have been forced to rethink their approach to network access and reimagine the fundamentals of user management, endpoint security and access control. This demands transitioning away from a technology that until recently has been a fixture – the virtual private network (VPN). A crucial first step in re-securing modern hybrid work environments is to embrace the principles of Zero Trust Network Access (ZTNA).The Zero Trust security model trusts nothing and no one by default, including users inside the network perimeter. Threats exist internally as well as externally, and every user, device and network must be assumed to be hostile until proven otherwise.Analyst firm Gartner adds that in today’s enterprise, there are too many entry points to fully protect. Therefore, an effective security stance must protect the assets on the network rather than the network itself. Every device, user and network connection needs to be authenticated and authorized, continuously. ZTNA is designed to provide access to resources on a least-privileged basis, derived from pre-established identity- and context-based criteria.SaaS apps and cloud migration blurred the network perimeter, exposing inadequacies of traditional VPN and firewall solutions, forcing organizations to search for alternative solutions. Digital transformation and hybrid deployment models, combined with work-from-anywhere and bring-your-own-device (BYOD) policies, helped improve productivity, but often at the cost of security. A lack of visibility and access controls resulted in siloed operations across NetOps, SecOps, and ITOps. The rise of ransomware-as-a-service (RaaS) required CIOs and CSOs to bolster their security with a prevention-first strategy to protect endpoints, networks, and data. These trends and issues are exacerbated in the SMB and mid-market, where IT can be 100% SaaS and Cloud driven, making traditional perimeter security a thing of the past. Initial response to these trends was a myriad of security and network tools – some old and some new – including endpoint protection platforms (EPP), endpoint detection and response (EDR), network detection and response (NDR), secure web gateway (SWG), cloud access security broker (CASB), next-generation firewall, content filtering and more. Individually, these tools have been inefficient and less effective due to the multi-vendor nature of solution deployment. Additionally, traditional VPNs drove the pursuit of a more holistic ZTNA, where ZTNA-as-a-service consolidates several network and security tools into a single, comprehensive solution.Zero-day phishing detection User reauthentication Connector logging improvements Event export improvements Mobile MDM improvements If you’d like to learn more about CylanceGATEWAY and other solutions with Cylance® AI or the BlackBerry MSSP Partner Program, please fill out the form found on our BlackBerry MSSP Partners page.
Guest blog courtesy of BlackBerry Cylance. Read more BlackBerry Cylance blogs here. Regularly contributed guest blogs are part of MSSP Alert’s sponsorship program.