Home Latest News Palo Alto Networks Urge Enterprises to Move to ZTNA 2.0

Palo Alto Networks Urge Enterprises to Move to ZTNA 2.0

by CISOCONNECT Bureau

Palo Alto Networks urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0). ZTNA was developed as a replacement for virtual private networks (VPNs) when it became clear that most VPNs did not adequately scale and were overly permissive, but the first-generation ZTNA products (ZTNA 1.0) are too trusting and can put customers at significant risk. ZTNA 2.0 solves these problems by removing implicit trust to help ensure organizations are properly secured.

For modern organizations where hybrid work and distributed applications are the norm, ZTNA 1.0 has several limitations. It is overly permissive in granting access to applications because it can’t control access to sub-applications or particular functions. Additionally, there is no monitoring of changes in user, application or device behavior, and it can’t detect or prevent malware or lateral movement across connections. ZTNA 1.0 also cannot protect all enterprise data.

In a new report, John Grady, ESG senior analyst, said: “First-generation/ZTNA 1.0 solutions fall short in many ways on delivering on the promise of true zero trust. In fact, they grant more access than is desired. What’s more, once access is granted in ZTNA 1.0 solutions, the connection is implicitly trusted forever, allowing a handy exploit route for sophisticated threats and/or malicious actions and behavior.” Grady also said, “It is time to embrace a new approach to ZTNA, one that has been designed from the ground up to meet the specific challenges of modern applications, threats, and a hybrid workforce.”

Adding to challenges stemming from a hybrid workforce, Jerry Chapman, an engineering fellow at Optiv said that securing today’s hybrid workforce, with an increase in cloud and mobile technologies and evolving requirements, can be complicated. “Rethinking Zero Trust is essential for modern, hybrid organizations to prevent threats. Together with Palo Alto Networks, we’re advising our customers to incorporate ZTNA 2.0 principles like continuous review of identity and connection across their domains to stay secure,” he added.

ZTNA 2.0-capable products, such as Palo Alto Networks Prisma Access, help organizations meet the security challenges of modern applications, threats and the hybrid workforce. ZTNA 2.0 incorporates the following key principles:

Least-privileged access — enables precise access control at the application and sub-application levels, independent of network constructs like IP addresses and port numbers.
Continuous trust verification — after access to an application is granted, continuous trust assessment is ongoing based on changes in device posture, user behavior and application behavior.
Continuous security inspection — uses deep and ongoing inspection of all application traffic, even for allowed connections to help prevent threats, including zero-day threats.
Protection of all data — provides consistent control of data across all applications, including private applications and SaaS applications, with a single data loss prevention (DLP) policy.
Security for all applications — consistently secures all types of applications used across the enterprise, including modern cloud native applications, legacy private applications and SaaS applications.

New additions to Palo Alto Networks’ Prisma Access will add new capabilities. These include:

• A ZTNA connectorthat simplifies the process of onboarding cloud-native and traditional applications into the service, helping make ZTNA 2.0 easier to deploy and more secure.
• Acommon policy framework and data model for all SASE capabilities, managed from a single cloud management console.
• A self-serve autonomous digital experience management (ADEM) thathelps proactively notify users of issues that require prompt attention and provides them with guidance on how to remediate.

Prisma Access is generally available with full support for ZTNA 2.0. The new ZTNA connector, unified SASE, and self-service ADEM will be available in the next 90 days.

“This is a critical time for cybersecurity. We are in an era of unprecedented cyberattacks, and the past two years have dramatically changed work — for many, work is now an activity, not a place. This means that securing employees and the applications they need is both harder and more important,” said Nir Zuk, founder and chief technology officer at Palo Alto Networks.

Recommended for You

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads