Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

Better together: Zero trust and SASE

Image Description

The exponential rise in remote working caused by the COVID-19 pandemic has left a huge number of organisations suddenly coming to terms with new, highly dispersed IT environments. Such environments pose a number of challenges when compared to the more traditional on-premises alternatives that most organisations are used to, but perhaps the biggest challenge of all is how to secure them effectively.

About the author

Anurag Kahol is CTO at Bitglass.

Two of the best approaches currently available are zero trust and secure access service edge (SASE), but many organisations mistakenly believe they are mutually exclusive. As a result, cybersecurity teams are trying to rapidly educate themselves on both approaches before deciding which path to take. However, the good news is that they are highly complementary to each other. In fact, in nearly every situation they work best together, supporting security teams as they aim to prevent their environments stretching beyond the bounds of their control.

A fundamental shift has taken place

In the past, companies that wanted to establish secure remote working solutions would typically turn to tried-and-tested virtual private networks (VPNs) to give employees access to on-premises networks from anywhere, via a ‘virtual tunnel’.

However, the main security premise that VPNs are built on has become increasingly outdated in recent years - the notion of a clear network perimeter. With a VPN, users judged to be ‘trustworthy’ can go wherever they like inside the network, while everything/everyone else is blocked from entering in the first place. Such an approach fails to account for critical threats like insider attacks, or the fact that non-employees may need to access the network from time to time as well. But perhaps the biggest flaw with VPNs is that once someone is inside, they pretty much have free reign to do whatever they want. If a cybercriminal were to gain access via something as simple as compromised credentials, they would be able to go wherever they like and take anything from the network, no questions asked, because the VPN would view them as a trusted user.

Further, during this period, an increasingly large number of companies started to go directly to the cloud. This resulted in the surge in cloud application usage and consequently, a large blind spot that was outside of the purview of the traditional perimeter.

Fortunately, a growing number of businesses realize the inherent dangers of this, which is why IT management teams around the world are revisiting infrastructure in their droves, to find a better balance between productivity and security in this unfamiliar new working environment. Forward thinking organisations are adopting zero trust and SASE solutions together because doing so enables them to combine a least-privilege access approach with an architecture that streamlines how highly distributed users and cloud resources are secured.

A new cybersecurity approach to match the ‘new normal’

The need to maintain operational efficiency across remote workforces, means businesses are, understandably, putting more and more of their applications into the cloud. In order to secure these expanding surface areas, they require policies that enforce least-privilege access control via technologies like zero trust network access (ZTNA), secure web gateway (SWG), and cloud access security broker (CASB), just to name a few.

However, when these kinds of technologies are deployed on a one-off basis, it can leave businesses needing to manually replicate policies across different dashboards, which can be a laborious process, costing both time and money. It also limits consistent visibility and control across the IT ecosystem, which is highly problematic. Furthermore, the more solutions that get deployed, the worse the issue tends to become.

While zero trust is a way of thinking that focuses on appropriate authentication and secure access to data and systems on an as-needed basis, SASE refers to cloud-delivered platforms deployed at the edge, which provide far-reaching protections anywhere data goes. As integrated platforms that consist of an array of complementary solutions, SASE offerings are crucial when following a Zero Trust framework.

More consistent, comprehensive protection overall

In some instances, organisations following zero trust security principles can unintentionally drive up the amount of deployed point products, resulting in disparities in levels of protection across different use cases. SASE helps alleviate this issue by preserving and maintaining common security controls across all enterprise resources, helping remove blind spots that can/would otherwise arise. Security professionals can configure policies that control access to web destinations, safeguard SaaS apps, identify shadow IT, and secure apps on-premises, all from a single control point. Not only does this result in more consistent, comprehensive protection overall, but the greater ease of management can save significant amounts of time and money as well.

Over the past 12-18 months, the business landscape has changed beyond all recognition, forcing organisations of all shapes and sizes to adapt along with it. For many, this has been a major challenge, particularly when it comes to securing new, unfamiliar remote working solutions in a fast and effective manner. Often it’s down to confusion over the solutions available and a mistaken belief that it’s an ‘either/or’ decision. In fact, by uniting SASE and zero trust instead of choosing between them, organisations can create a reliable and secure environment that enables employees to easily interact both on and off premises, optimizing operational efficiency while keeping sensitive data safe wherever it goes.

Date

10 Jun 2021

Sources


Share


Other Blog

  • Microsoft's early Labor Day sales mean fantastic savings on a range of Surface devices and laptops

    On the hunt for a cheap laptop? Check out Microsoft's early Labor Day sales, which could save you hundreds on a Surface Pro and more.

    Read More
  • How to change your Roblox password or reset it

    We show you, step by step, how to change your Roblox password or reset your account if you’ve forgotten your login details.

    Read More
  • One in five firms admit to illegally spying on employees working from home

    A disturbing amount of companies have either already installed surveillance software to secretly spy on remote employees, or plan to do so.

    Read More
  • Red Hat makes drastic changes to CentOS, leaves users fuming

    Unpopular move comes after IBM’s Red Hat takeover.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us