Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Building a Secure Remote Connection Solution for Today’s Business

The need for secure and reliable connectivity continues to be top of mind for many organizations. The persistence of the pandemic is making this essential. But even if it wasn’t, many organizations are now committed to implementing permanent hybrid work and learning models, where employees and student alternate between on-premises and remote participation. The challenge of this transition involves more than just simple connectivity.

The need for secure and reliable connectivity continues to be top of mind for many organizations. The persistence of the pandemic is making this essential. But even if it wasn’t, many organizations are now committed to implementing permanent hybrid work and learning models, where employees and student alternate between on-premises and remote participation. The challenge of this transition involves more than just simple connectivity. Issues like reliability, scalability, and flexibility are essential to maintaining quality of experience (QoE) for users, without sacrificing protection for application performance.

Two solutions that every organization needs to secure and connect a work-from-anywhere (WFA) strategy is Zero Trust Network Access (ZTNA) and Secure SD-WAN.

Zero Trust Network Access

Many organizations rely on virtual private networks (VPNs) to create encrypted tunnels back to the company network. One new technology that is rapidly becoming crucial for organizations looking to evolve their VPN remote access is zero-trust network access (ZTNA). It simplifies secure connectivity by providing seamless, per-use access to applications, no matter where the user or application may be located.

ZTNA is also a critical extension of a zero trust security strategy. Zero trust assumes that every user or device is potentially compromised. As a result, access to resources is only granted after verifying the user and device. It also follows the least privilege principle, which means that once a user and device have been authenticated, access is only granted to those resources needed to do their job. Connections are then monitored to ensure that they comply with policy. 

ZTNA applies this same principle to application access. Unless specified by policy, location does not necessarily grant trust, so where a user is working from becomes irrelevant. This means that the same zero trust approach applies no matter where a user or device is physically located, so access to business-critical applications is consistently protected across hybrid worker and network models. ZTNA also only grants per-session access to individual applications and workflows, even after a user and/or device has been authenticated. This multi-step process happens automatically and invisibly. Users are verified and authenticated to ensure they are allowed to access an application before being granted access. And every device is also checked to ensure the device meets the application access policy. And these checks happen each time an application is accessed. And beyond simple password authentication, authorization also leverages a variety of contextual information, including user role, device type, device compliance, location, time, and how a device or user is connecting to the network or resource.

A true zero-trust approach to cybersecurity is a complex process that touches many systems and may take years to fully implement. But because ZTNA is much simpler to deploy, it can be run independently, to augment other systems, such as VPN or as a good first step as part of a larger ZTA strategy. 

Organizations looking to implement ZTNA should understand that not every solution is the same. Some may be limited in the types of applications they can support. Others only offer a partial solution. Building a complete ZTNA solution from scratch requires a variety of components: a client, a proxy, authentication, and security. When these elements are cobbled together from different vendors, run on different operating systems, and use different consoles for management and configuration, establishing an effective and manageable solution can be difficult.

Advertisement. Scroll to continue reading.

Secure SD-WAN

Another critical technology for enabling and securing the WFA workforce is SD-WAN. An effective SD-WAN solution is essential for organizations that need to connect branch offices and remote workers to multiple cloud environments. SD-WAN accelerates the delivery of cloud-based resources, whether those assets are deployed in a private or public cloud environment or users require access to business-critical Software-as-a-service (SaaS) applications, such as Salesforce, Microsoft Office 365, or streaming video and teleconferencing. 

However, the same challenges related to ZTNA apply to SD-WAN. Providing reliable access to cloud-based resources requires accelerated cloud on-ramp, broad application support, and granular controls, including dynamic failover, SLA-based application steering, and application availability—even during brownout or blackout conditions. Proven, enterprise-grade security is another critical function that is essential but that can be expensive to deploy after the fact. And which few SD-WAN vendors provide.

Finding the solution that’s right for you—today and tomorrow

When researching WFA solutions, organizations also need to make sure adaptability is part of the equation because circumstances and plans change. For maximum flexibility and to future-proof your investment, a solution provider should be able to support a variety of uses cases, including cloud-to-cloud and cloud-to-data center connections. It should also support you throughout your business transformation efforts, whether you plan to return all employees to the office, continue work-from-home policies, or any hybrid work combination in between. The ability to support the full range of work-from-anywhere models, even when they change, is essential to maintain QoE regardless of where a worker is performing their job. This is something all solutions need to accommodate. And most importantly, they should be able to do it securely.

Written By

John Maddison is EVP of Products and CMO at Fortinet. He has more than 20 years of experience in the telecommunications, IT Infrastructure, and security industries. Previously he held positions as general manager data center division and senior vice president core technology at Trend Micro. Before that John was senior director of product management at Lucent Technologies. He has lived and worked in Europe, Asia, and the United States. John graduated with a bachelor of telecommunications engineering degree from Plymouth University, United Kingdom.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...