The working model in business has dramatically shifted over the last few years — a trend accelerated by the pandemic. The shifting to a work-from-home environment has provided proof that a remote/hybrid work setting is viable for many workforces, and that they can maintain productivity levels for workers not on-premises full-time. And the working model we see emerge beyond 2022 is a hybrid option in which workers are stationed across multiple locations, including main offices, remote branches, at home, in shared workspaces or the like.
A shift, such as this, to a hybrid working model brings forth many changes, and one in particular is the expansion of the attack surface and threat landscape available to cybercriminals. In essence, having workforces from multiple remote locations that are not often using the same network address each day introduces cybersecurity complications for those tasked with protecting an organization’s data and systems.
The traditional method of delivering security and access to central IT systems for remote staff has been to use a VPN (virtual private network) connection. These were fine when the number of connections needed was relatively low and easy to manage. But using VPN connections for mass remote staff, and for the dynamic hybrid workforce model, is now a significant management issue for IT teams.
A better approach to securing access for modern-day hybrid workforces is ZTNA, or Zero Trust Network Access. ZTNA delivers the cybersecurity, authentication and access authorizations needed on hybrid networks. In this blog, we will discuss what is ZTNA, how ZTNA secures access and simplifies network-security management and reasons to adopt ZTNA for your hybrid workforce. Let’s dive in.
What is ZTNA?
Gartner gives the definition of ZTNA as “a product or service that creates an identity — and context-based, logical access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a set of named entities.”
ZTNA is a network designed and implementation methodology that delivers on the concept of Zero Trust. And it begs to question — what is Zero Trust?
When a network implements Zero Trust, every connection is considered potentially hostile, irrespective of where it originates. A request to access an application that comes from within the network perimeter — such as from a PC in the corporate HQ — is treated the same as one that originates on the internet via a dynamic IP address. Both requests need the same level of cybersecurity challenges and must provide the correct authentication responses before access is allowed.
No connection is assumed to be safe based on where it originates. This level of cybersecurity moves beyond the traditional model of securing the perimeter, and, as a result, ZTNA is sometimes described as creating a software-defined perimeter, of SDP.
ZTNA is widely considered the best approach to deliver the business continuity and access required for on-premises and cloud-based applications and services to hybrid workforces spread over remote network locations.
ZTNA provides robust cybersecurity without imposing an onerous user application experience on workers due to complicated and tedious authentication and authorization processes. This is especially true when compared to legacy VPN access security solutions.
Delivery Modern Hybrid Workforce Security with ZTNA
The goal of ZTNA is to deliver secure access to business applications and data hosted on-premise or in the cloud from client endpoints, irrespective of where the user happens to be at a particular time. Delivering this flexible access presents a technical and security challenge — one that is hard to deliver and manage using VPN, but one that ZTNA can easily enable.
How ZTNA secures access to business resources
The Zero Trust principles that make up the foundation of ZTNA solutions are the following precepts:
How ZTNA simplifies IT network-security management
ZTNA solutions work differently from edge-based security solutions such as VPN gateways and firewalls. The architecture of ZTNA provides access to applications using the following principles that implement the Zero-Trust philosophy:
How ZTNA Creates a Seamless Experience for End-Users
ZTNA solutions work the same irrespective of where users connect. The authentication and security challenges a user must provide are the same if they are at their PC in the main office, or on a mobile network connection at a local coffee shop.
Why ZTNA is Critical to Maintaining Business Continuity in the Modern Workforce
Stated above, connections via ZTNA are made to specific resources that are located on-premises or in the cloud. The routing to these resources occurs via ZTNA brokers. This means that the end-users do not — and indeed cannot — know where the applications they are using are hosted. This means the organization can move the hosting location of an application server or service anytime without impacting end users. When they next connect, the ZTNA broker will connect them to wherever the resource they need is currently hosted.
How ZTNA Differs from VPN
One frequently asked question is why use ZTNA when we already have a VPN infrastructure that works in our organization, and that is certainly a fair question to ask.
But the main reason is the depth of cybersecurity offered. Traditional VPNs deliver network-wide access. Once a user is authenticated via VPN, they have access to anything that their overall permissions grant. For all intents and purposes, they may as well be in the office connected to the corporate network.
While with ZTNA, users are connected only to a specific application via micro-segmented tunnels that require separate and recurring authentication. Additional layers of security can be added to VPN solutions to make them more secure, but if you are going to do that, then looking to ZTNA instead makes more sense.
Additional ways in which VPNs compare poorly to ZTNA:
Why To Adopt ZTNA In Your Workforce Environment
Restating some of the aforementioned reasons, including that by use of a VPN, a single user’s compromised credentials can result in significant access to key parts of the network, whereas ZTNA limits the attack surface area should there be a breach. But reasons span beyond just the above mentioned to why organizations should adopt ZTNA. The list includes the following:
ZTNA — A Practical Solution For the Modern Hybrid Workforce
ZTNA, or Zero Trust Network Access, provides a modern and secure solution to providing access controls to users operating in the hybrid working landscape. ZTNA enables access to applications in the new multi-cloud world seamlessly for end-users, while simultaneously delivering the security IT teams need, alongside the flexibility to change backend services, as required.
Progress Kemp LoadMaster load balancers provide integral services when delivering ZTNA in your organization. You can learn more about Zero Trust Network Access and integrations using the LoadMaster by speaking to one of our product solutions experts. Click the contact us button here to be connected to one of our technical product specialists.