Posted on September 1, 2021
Want to interview Gerry?
ContactI love Gartner’s Quick Answers reports. As the name implies, they are a quick read – typically about five pages in length – and cover a topic that has been the subject of numerous recent client Inquiries into Gartner. When the Inquiries on a subject pile up, get ready for a Quick Answers report so the insights can be shared with a large number of their clients. The most recent subject? How organizations should be thinking about the interactions and dependencies between Identity & Access Management (IAM) and Zero Trust Network Access (ZTNA) as they implement Zero Trust security controls.
As Gartner recently noted, the number of inquiries they have received on ZTNA, which can be thought of as a simpler and more secure next gen VPN, have doubled over the last year. Those that have investigated the advantages of ZTNA quickly discover that to get the most out of the solution, they need to have a solid IAM solution in place. To get the maximum benefit out of ZTNA, an organization wants to be able to set granular access policies that limit each individual user’s access to only the specific applications, data, and IT resources they truly need to do their jobs. As a result, a successful ZTNA program initially starts with an accurate assessment of Identity and a solid IAM tool.
The Quick Answer: How Do Access Management and Zero Trust Network Access Tools Work Together? highlights the inextricable link between the two technologies (IAM and ZTNA). Knowing how important a robust IAM solution (e.g. one that includes multi-factor authentication – MFA) was to a secure ZTNA deployment, we made the strategic product design decision to include it as a core part of our ZTEdge Zero Trust Security platform. That’s right – ZTEdge customers do not need to invest in a separate costly identity solution like Okta or Ping Identity to get a fully IAM-enabled ZTNA solution.
ZTEdge IAM serves as the core authentication platform for the ZTEdge platform and can also act as an organization’s universal directory. Of course, if a company has invested in another SAML-supported directory or uses Active Directory, ZTEdge can broker authentication requests with those solutions. Additionally, ZTEdge IAM enables SSO for SaaS applications.
The ZTEdge ZTNA solution includes a unique patent-pending technology called Automatic Policy Builder that leverages ZTEdge IAM (or 3rd party IAM services). As the name implies, Automatic Policy Builder allows IT Admins to build granular per-user access policies, automatically. This unique capability frees up IT staff development time and makes policies easy to create, maintain, and monitor. AI-enabled analysis and alerts are available to support ongoing tuning of policies to improve an organization’s network security posture.
It is hard to think of two capabilities that are needed more by each other than IAM and ZTNA. Building Identity directly into the ZTEdge platform was one of many great calls made by our ZTEdge Product organization. We’ve been hearing this loud and clear from our customers and partners, and I am sure this will continue to be a consistent theme going forward.
Read more about ZTNA, and how it is a significant upgrade from VPN-based technologies, here.
“Operation Duck Hunt” Shuts Down QakBot Botnet
The FBI-led takedown of Qakbot was an operation that involved seven countries. Malware was removed from 700,000 computers. But don’t think all that makes you safe.
How GenAI is Supercharging Zero-Day Cyberattacks
Generative AI empowers its users to work fast, better and more efficiently. Alas, this includes cybercriminals, who are using malicious GenAI platforms to accelerate zero-day exploit creation.
Cybercriminals Disdain the Law, But Find Law Firms Attractive
Cybercriminals love the multiplier effect they get from attacking law firms: Hack in, and they get firm data PLUS juicy confidential client info.