SECURE NETWORK ACCESS

Appgate CybersecurityJuly 7, 2022 3 minute read

PODCAST: Zero Trust Access for the Corporate Network

Network security teams are dusting off corporate campus LANs and WANs and rebooting legacy NACs … so how do they apply modern Zero Trust security principles beyond remote access?

The sprawl of resources, applications and users has fundamentally changed the face of corporate network security. Organizations now need a solution that is flexible enough to cover multiple secure access use cases, regardless of where a connection is initiated.

On this episode of the Zero Trust Thirty podcast, Garrett Bekker, Principal Research Analyst at 451 Research, a part of S&P Global Market Intelligence, and cybersecurity insider Chris Scheels investigate how Zero Trust Network Access (ZTNA) reduces security complexity, improves user experience and delivers a unified policy engine to control user-to-resource and resource-to-resource connections from inside and outside the fading, traditional corporate perimeter.

Listen below to learn:

  • The difference between Zero Trust security and ZTNA (hint: you can’t buy Zero Trust security)
  • Why organizations that implemented Zero Trust access for remote workforces are going backwards if employees returning to the office simply plug back in to a local area network that doesn’t reinforce zero implicit trust
  • How the complexity of managing secure access across corporate networks can become a risk and even a business inhibitor
  • How Zero Trust Network Access is like a “NAC on steroids” and why NACs may be headed for the sunset


How Zero Trust Network Access secures the corporate network

As workforces return to offices, there’s a shift coming when it comes to securing on-premises corporate networks and CISOs and CIOs are beginning to rethink  network access control. Here are a few things Garrett and Chris say to keep in mind on applying the Zero Trust security principles and least privilege access to your corporate network:

  • Think “secure access” rather than “remote access.” A unified policy engine reduces the complexity of today’s hybrid organizations. It allows a user to have the same experience regardless of whether they’re in the office or working remotely. That engine can also eliminate the implicit trust for all devices, including IoT devices.
  • ZTNA isn’t just for remote access anymore. The right ZTNA solution delivers secure access across multiple use cases, which is particularly valuable for hybrid organizations that have on-premises and remote employees. It can replace VPNs and NACs due to its versatility. ZTNA adoption is increasing, according to 451 Research, with 23% of enterprises already using it, 21% with ZTNA projects underway and 35% with plans to adopt it in the next six months to two years.
  • Automation is your friend. A Zero Trust journey is a marathon, not a sprint, so it will take time to get to a point where automation is possible. It’s one of the later stages of the maturity model, it can save some time and solve some headaches as you look to reduce the complexity of securing your corporate network.

Additional resources on Zero Trust secure access for corporate networks:

Webinar: How to Unleash and Secure the Cloud with Zero Trust Security
Report: How to Select the Right ZTNA Offering
Podcast: Secure Access for Post-pandemic Hybrid Workforces
Sign up: Live weekly demo on Wednesdays

Receive News and Updates From Appgate