Legacy ZTNA Remedies Set You at Chance. It’s Time for ZTNA 2..

Legacy ZTNA Remedies Set You at Chance. It’s Time for ZTNA 2..


We live in a earth exactly where perform is an action, not a spot. Subsequent the pandemic’s wake, far more than three-quarters of international staff expressed that they want the possibility to operate from household at the very least element-time. For organizations significant and compact, this usually means fully embracing hybrid do the job. Equally, most of our purposes have moved from the stability of the personal information middle to the cloud. This pattern has been accelerating, with 80% of businesses embracing hybrid cloud approaches. The capacity to provide protected, seamless obtain to all apps from everywhere has hardly ever been more significant.

Previously, we secured the companies by deploying several security appliances within just non-public details centers—like firewalls and website proxies—and funneling all site visitors by way of them. Now that most apps and end users have still left the creating, people hook up immediately to programs fairly than heading into company headquarters or a branch business office to entry the apps they have to have to do their careers.

This direct-to-app change dramatically increases the assault floor, demanding additional stability and access controls to secure applications and information. In an exertion to get back management around the growing assault floor, zero believe in network obtain (ZTNA) alternatives emerged.

The Constraints of ZTNA 1.

Legacy ZTNA options have been launched almost a ten years ago when the danger landscape, company networks, and how and the place men and women worked were vastly unique. These legacy answers, known as ZTNA 1., no extended align with the realities of function, and destructive actors know how to exploit the gaps inside them.

ZTNA 1. presents corporations minimal security as the technologies work as a simple accessibility broker. When a person requests obtain to an application, the broker verifies regardless of whether the user has permission to access an software. Once the authorization is verified, the broker grants obtain, creating a relationship between consumer and software. And…that’s it. The user’s session is now “trusted,” so the broker goes away, leaving the consumer with entire accessibility to the software with out any additional checking or scrutiny.

This is the architectural design of ZTNA 1.. This product isn’t just problematic in the context of today’s menace landscape, it is hazardous. In this article are 5 methods that ZTNA 1. puts companies at possibility:

  • Violates the principle of the very least privilege: ZTNA 1. is extremely permissive, granting accessibility to applications based mostly on outdated constructs like IP tackle and port figures. This legacy solution doesn’t provide entry management to sub-applications or particular application capabilities.
  • Makes it possible for and ignores: When entry to an application is granted, ZTNA 1. implicitly trusts whichever or whoever accessed the application with out monitoring consumer, application, or gadget conduct variations.
  • No security inspection: ZTNA 1. simply cannot detect or reduce malware or lateral motion across connections. It focuses on software obtain, not securing targeted visitors to and from purposes.
  • Does not safeguard all business info: ZTNA 1. does not supply visibility or information handle, leaving enterprises vulnerable to the chance of details exfiltration from attackers or malicious insiders.
  • Can’t safe all programs: ZTNA 1. only secures a subset of non-public apps that use static ports, leaving personal apps that use dynamic ports, cloud-indigenous apps, or SaaS apps unprotected.

ZTNA 2. is a much better way to secure absolutely everyone and every little thing, in all places

Holding organization knowledge safe is difficult now that function can be performed just about everywhere. ZTNA 2. options present infinite scalability and total and constant stability for perimeterless companies with:

  • The very least privilege obtain: ZTNA 2. permits precise access regulate at the application and sub-application ranges, unbiased of network constructs like IP and port quantities.
  • Ongoing rely on verification: After accessibility to an software is granted, ZTNA 2. offers steady have confidence in evaluation primarily based on alterations in unit posture, user behavior, and application behavior.
  • Continuous stability inspection: ZTNA 2. employs deep and ongoing inspection of all application targeted visitors, even for authorized connections. This helps avoid all threats, including zero-working day threats.
  • Defense of all info: ZTNA 2. provides reliable command of info throughout all apps, together with private applications and SaaS purposes, with a one data decline prevention (DLP) policy.
  • Protection for all programs: ZTNA 2. regularly secures all kinds of applications utilized throughout the enterprise, together with contemporary cloud-native apps, legacy non-public programs, and SaaS programs.

Watch our ZTNA 2. launch party to master about innovations and very best techniques for securing the hybrid workforce with ZTNA 2..


Kumar Ramachandran serves as Senior Vice President of Products for Secure Entry Service Edge (SASE) products at Palo Alto Networks. Kumar co-launched CloudGenix in March 2013 and was its CEO, creating the SD-WAN class. Prior to founding CloudGenix, Kumar held leadership roles in Item Administration and Promoting for the multi-billion greenback branch routing and WAN optimization corporations at Cisco. Prior to Cisco, he managed purposes and infrastructure for firms this sort of as Citibank and Providian Fiscal. Kumar retains an MBA from UC Berkeley Haas University of Enterprise and a Master’s in Computer system Science from the College of Bombay.

Share this post

Similar Posts