The last few years have seen an explosion of interest in Zero Trust Network Access (ZTNA). The zero trust approach replaces the perimeter defense model with a "least privilege" framework where users authenticate to access specific data and applications, and their activities are continuously monitored.
ZTNA gained a boost in the wake of the COVID-19 pandemic, with more employees working remotely. The old perimeter defense model, exemplified by VPNs, provides a secured internet connection that gives remote users privileges as if they were on an internal private network. This doesn't match up with a zero trust mindset; and to make things worse, many organizations found that their infrastructure couldn't handle the traffic loads created by large numbers of remote workers connecting via VPN.
To read this article in full, please click here
http://dlvr.it/StKxzr
Langganan:
Posting Komentar (Atom)
Versa extends SASE platform to the LAN edge
Versa Networks has bumped up its secure access service edge (SASE) software with a variety of features, including AI to help customers bette...
-
Tighter integration between Fortinet's SASE and SD-WAN offerings is among the new features enabled by the latest version of the company&...
-
In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security ...
-
Cisco is adding a security module to its observability platform that promises to help enterprises assess threat risks and protect cloud-base...
Tidak ada komentar:
Posting Komentar