

The cybersecurity community is moving toward ZTNA and software-defined perimeter (SDP) architectures as part of a need to automate identity-based access as we move to a cloud world were applications and users are connecting to networks at unprecedented scale. National Institute of Standards and Technology (NIST) describes zero trust generally as: “A collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised.“ NIST states that a zero-trust strategy is “primarily focused on data and service protection but can and should be expanded to include all enterprise assets (devices, infrastructure, components, applications, virtual and cloud components) and subjects (end users, applications and other non-human entities that request information from resources.” RELATED: Industry Voices-Raynovich: Will 2021 get more SASE? At its core, zero trust means the network needs to use many techniques to verify that applications and users have confirmed their identity and deserve access in order to build a defendable and impermeable perimeter between an enterprise network and the rest of the world. It means that the network should have zero trust in you. First of all, zero trust doesn’t mean that you should have zero trust in the network. Let’s take a look at what zero trust means. ZTNA is part of the new paradigm - build defense into the network, like an antibody. See also Who’ll be the Next Tech Titan at the GeekWire Awards? Cast your vote – GeekWire These days, security needs to be everywhere. And firewall approaches depend on discrete functions or devices that need to be bolted on to the network. Cloud security products are often focused on the data center - so-called “East-West” traffic - rather than worrying about connections to the outside world or other cloud apps. For example, functions such as malware defense, anti-virus, and Advanced Threat Protection (ATP) are often focused on security endpoints and specific devices, rather than inside the network itself. For many years, the network has been an island in the security jungle.

ZTNA and SASE will play a key role in this automate-and-integrate approach, which may be why they are so hot. End users and cloud applications are creating and terminating network connections at a rapid rate, and these networks no longer live in an easily defined perimeter such as the home or the enterprise office. This is changing as the world becomes more cloud-oriented. The broader trend in cybersecurity right now is integration of functions: Cybersecurity practitioners actually have too many tools at their disposal, and what they would like to do is use a variety of cybersecurity functions as an integrated portfolio that can leverage data and connections and provide automation.


ZTNA and SASE are interesting because they represent a specific approach to cybersecurity, rather than a specific function (such as the acronyms above). Now some new ones have arrived - Secure Access Service Edge ( SASE) and Zero Trust Network Access (ZTNA), so it’s important to define what they are and what they mean. You may be overwhelmed with cybersecurity acronyms and buzzwords - I know that as an analyst it’s hard to follow FWaaS, SWG, DLP, DDoS, APT, ATP, and ASVs.
