Zero-trust security

Issue 1 2021 Infrastructure

Following the COVID-19 pandemic, many businesses restructured their entire office strategy by locking or reducing their office footprint, others introducing hot desks policies and some going completely remote. This shift brings with it a variety of elements as well as challenges in terms of security.


Simeon Tassev.

Policies and processes must be adapted, and controls need to become software-based to cater to a world where people are empowered to work from anywhere. The Secure Access Service Edge (SASE) is built on a zero-trust approach that requires all connecting devices to meet the criteria as defined by security policies and have the right levels of authentication. This framework offers an effective solution to security challenges faced today and in the future.

The edge is growing

The traditional approach of boundary protection with remote access becomes increasingly cumbersome and ineffective as the edge grows and boundaries become more amorphous. Environments need to open up to allow for an increased workforce of people who are not necessarily working from within the corporate physical location. A more flexible and scalable approach is needed, but at the same time, security needs to be tighter than ever. To facilitate current and future workforce requirements, enterprises need to ensure that all endpoints and connections are managed with consistent policies regardless of location.

The work-from-anywhere business model creates greater edge computing challenges and changes network access needs, as more users, devices and applications become located outside of the corporate enterprise. Locking down the perimeter is no longer effective or even possible, and doing so negatively impacts business efficiency. A different approach is essential to facilitate today’s dynamic access requirements.

Trust is earned

SASE starts from a base of zero trust. This means that, by default, all devices are untrusted. To earn trust and gain access, policies need to be applied and criteria met, such as various levels of authentication that must be implemented. To do this, agents are loaded onto endpoint devices, which connect with the SASE system and receive the relevant levels of access and permissions to enable connection. It allows businesses to facilitate a remote or hybrid workforce using public infrastructure, while still applying corporate security policies consistently and homogeneously.

Using an SASE framework ensures more effective management, as policies and access controls are applied consistently regardless of device or location. This is also more secure because it is homogenous and leaves no room for error with regard to policy implementation. Using this type of network design places enterprises in a more effective position to manage the complex workforce setup that the ‘new norm’ has created.

Ensuring effectiveness

The first step in effectively implementing an SASE framework is to understand, from an architectural perspective, how it will function. An assessment is therefore required of the applications that are in place, what is required to access them, and where they need to be accessed from in order for employees to perform their jobs. Businesses need to map what users need to connect to and where. Only once this is understood can the relevant controls be put into place, and technology implemented to enforce and police these controls. Furthermore, this updates the permissions required along with access controls and authentication.

Technology is a crucial tool in facilitating a zero-tolerance network approach as it is impossible to enforce controls otherwise, but choosing the right tool and customising it effectively can prove challenging. The most appropriate technology solution depends on the architecture and specific requirements of an enterprise. The right security partner can ensure that technology, access and strategies are linked to the particular needs of the enterprise and design a solution to suit. Risk mitigation is the key, and an effective partner can help businesses to navigate the uncharted waters of the current environment and position them to meet future changes with greater ease.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Western Digital reveals new solutions
Products & Solutions News & Events Infrastructure
Western Digital unveiled new solutions and technology demonstrations at the Future of Memory and Storage Conference 2024. The innovations cater to diverse market segments, from hyperscale cloud to automotive and consumer storage.

Read more...
The Duxbury Services Gateway revolutionises the Edge
Products & Solutions Infrastructure
Duxbury Networking has announced the launch of the Duxbury Services Gateway (DSG) range. These cost-effective edge compute appliances are designed to meet the diverse needs of South African businesses including SD-WAN, Firewall, and IP PBX applications.

Read more...
Navigating the evolving tech landscape in 2024 and beyond
Residential Estate (Industry) Infrastructure
Progress in the fields of AI, VR and social media is to be expected, but what is not, is our fundamental relationship with how we deploy solutions in our business and how it integrates with greater organisational strategies and goals.

Read more...
Eight terabyte desktop SSD
Products & Solutions Infrastructure
Western Digital has expanded its SanDisk portfolio with the new 8 TB SanDisk Desk Drive, its highest capacity yet on an external desktop solid state drive (SSD), also available with 4 TB

Read more...
78% of organisations highly concerned about cloud security
Information Security Infrastructure
As organisations develop and deploy more cloud applications, security becomes more complicated. Many organisations are adopting a hybrid or multi-cloud approach, which has expanded the attack surface and increased complexity.

Read more...
Share large files securely and without delay
Infrastructure Products & Solutions
Professional teams don't have to wait for large file uploads, dabble with insecure sharing platforms, or spend money on file servers and network storage. StorVault FileSpace is a South African solution providing fast, affordable, and secure file streaming.

Read more...
Expanded Cambium cnMatrix portfolio for enhanced network automation
Duxbury Networking Infrastructure Products & Solutions
Duxbury Networking, a southern Africa distributor for Cambium Networks, has announced that Cambium has expanded its cnMatrix switch portfolio with enhanced network automation and the new EX3024F Fibre Aggregation Switch.

Read more...
Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...