So, here’s the problem that starts at your firewall: Your security setup grants permission to a credentialed user to access your system. The credentials have been authenticated by several methods, and the user is free to move about your apps and files. It’s an everyday occurrence with our mobile, hybrid work systems. But what happens when someone either fools your authentication system or decides to go rogue? ZTNA gives you the ability to follow every user everywhere in your system.
ZTNA stands for Zero Trust Network Access, and it’s based on the premise that you can’t trust any user with unfettered access to your entire system. The rationale for a business to use ZTNA goes back to a security breach at Target more than 12 years ago, when the personal and credit card information for some 40 million customers was compromised. It’s become a classic case study for cybersecurity.
In short, hackers exploited a vulnerability in the system of a third-party contractor, a mechanical engineering firm. Using stolen credentials, the attackers gained access to Target’s systems, where they deployed malware on the company’s point-of-sale (POS) devices. This allowed them to capture sensitive customer information without being detected for several weeks.
Granted, firewall security systems have become much stronger over time, but for most of them, you can access any part of a system once you get past the firewall. ZTNA technology never stops tracking any user as long as they’re inside the network.
- It grants access only to specific applications and files based on system admin’s determination of each user’s need to know.
- It assumes every access attempt is risky (zero trust).
- It continuously monitors a user’s activity and verifies it.
In operation, ZTNA sets up one-to-one connections between users and the resources they need. It’s similar to two people who need to contact each other by exchanging phone numbers. But unlike two people exchanging numbers, ZTNA connections need to be re-verified and recreated periodically.
The technology is also device-based, which is critical in our hybrid work world of BYOD (Bring Your Own Device). ZTNA can incorporate the risk and security posture of devices as factors in access decisions. It does this by running software on the device itself (sort of like a license plate reader) or by analyzing network traffic to and from the device.
While there are variations of ZTNA technology, the bottom line is that the protection of your data – and your clients’ and customers’ data – is priceless. This is where we can help. Call us – 973-433-6676 – or email us to talk about your security needs, your workforce’s access needs and your administrative needs.
