Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2546,"date":"2024-02-23T12:54:07","date_gmt":"2024-02-23T12:54:07","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/"},"modified":"2024-02-23T12:54:07","modified_gmt":"2024-02-23T12:54:07","slug":"the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/","title":{"rendered":"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am"},"content":{"rendered":"

ZTNA hasn\u2019t delivered on the full promise of zero trust<\/strong><\/span><\/h2>\n

Zero Trust has been all the rage for several years; it states, \u201cnever trust, always verify\u201d and assumes every attempt to access the network or a\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

ZTNA hasn\u2019t delivered on the full promise of zero trust<\/strong><\/h2>\n

Zero Trust has been all the rage for several years; it states, \u201cnever trust, always verify\u201d and assumes every attempt to access the network or an application could be a threat. For the last several years, zero trust network access (ZTNA) has become the common term to describe this type of approach for securing remote users as they access private applications. While I applaud the progress that has been made, major challenges remain in the way vendors have addressed the problem and organizations have implemented solutions. To start with, the name itself is fundamentally flawed. Zero trust network access is based on the logical security philosophy of least privilege. Thus, the objective is to verify a set of identity, posture, and context related elements and then provide the appropriate access to the specific application or resource required\u2026not network level access.<\/p>\n

Most classic ZTNA solutions on the market today can\u2019t gracefully provide this level of granular control across the full spectrum of private applications. As a result, organizations have to maintain multiple remote access solutions and, in most scenarios, they still grant access at a much broader network or network segment level. \u00a0I believe it\u2019s time to drop the \u201cnetwork\u201d from ZTNA and focus on the original goal of least-privilege, zero trust access (ZTA).<\/p>\n

Classic ZTNA drawbacks<\/strong><\/h2>\n

With much in life, things are easier said than done and that concept applies to ZTNA and secure remote access. When I talk to IT executives about their current ZTNA deployments or planned initiatives there are a set of concerns and limitations that come up on a regular basis. As a group, they are looking for a cloud or hybrid solution that provides a better user experience, is easier for the IT team to deploy and maintain, and provides a flexible and granular level of security\u2026but many are falling short.<\/p>\n

With that in mind, I pulled together a list of considerations to help people assess where they are and where they want to be in this technology space. If you have deployed some form of ZTNA or are evaluating solutions in this area, ask yourself these questions to see if you can, or will be able to, meet the true promise of a true zero trust remote access environment.<\/p>\n

Is there a method to keep multiple, individual user to app sessions from piggybacking onto one tunnel and thus increasing the potential of a significant security breach?
\nDoes the reverse proxy utilize next-generation protocols with the ability to support per-connection, per-application, and per-device tunnels to ensure no direct resource access?
\nHow do you completely obfuscate your internal resources so only those allowed to see them can do so?
\nWhen do posture and authentication checks take place? Only at initial connection or continuously on a per session basis with credentials specific to a particular user without risk of sharing?
\nCan you obtain awareness into user activity by fully auditing sessions from the user device to the applications without being hindered by proprietary infrastructure methods?
\nIf you use Certificate Authorities that issue certs and hardware-bound private keys with multi-year validity, what can be done to shrink this timescale and minimize risk exposure?<\/p>\n

While the security and architecture elements mentioned above are important, they don\u2019t represent the complete picture when developing a holistic strategy for remote, private application access. There are many examples of strong security processes that failed because they were too cumbersome for users or a nightmare for the IT team to deploy and maintain. Any viable ZTA solution must streamline the user experience and simplify the configuration and enforcement process for the IT team. Security is \u2018Job #1\u2019, but overworked employees with a high volume of complex security tools are more likely to make provisioning and configuration mistakes, get overwhelmed with disconnected alerts, and miss legitimate threats. Remote employees frustrated with slow multi-step access processes will look for short cuts and create additional risk for the organization.<\/p>\n

To ensure success, it\u2019s important to assess whether your planned or existing private access process meets the usability, manageability and flexibility requirements listed below.<\/p>\n

The solution has a unified console enabling configuration, visibility and management from one central dashboard.
\nRemote and hybrid workers can securely access every type of application, regardless of port or protocol, including those that are session-initiated, peer-to-peer or multichannel in design.
\nA single agent enables all private and internet access functions including digital experience monitoring functions.
\nThe solution eliminates the need for on-premises VPN infrastructure and management while delivering secure access to all private applications.
\nThe login process is user friendly with a frictionless, transparent method across multiple application types.
\nThe ability to handle both traditional HTTP2 traffic and newer, faster, and more secure HTTP3 methods with MASQUE and QUIC<\/p>\n

Cisco Secure Access: A modern approach to zero trust access<\/strong><\/h2>\n

Secure Access<\/a> is Cisco\u2019s full-function Security Service Edge (SSE) solution and it goes far beyond traditional methods in multiple ways. With respect to resource access, our cloud-delivered platform overcomes the limitations of legacy ZTNA. Secure Access supports every factor listed in the above checklists and much more, to provide a unique level of Zero Trust Access (ZTA). Secure Access makes online activity better for users, easier for IT, and safer for everyone. <\/p>\n

Here are just a few examples:<\/p>\n

To protect your hybrid workforce, our ZTA architectural design has what we call \u2018proxy connections\u2019 that connect one user to one application: no more. If the user has access to several apps as once, each app connection has its own \u2018private tunnel\u2019. The result is true network isolation as they are completely independent. This eliminates resource discovery and potential lateral movement by rogue users.
\nWe implement per session user ID verification, authentication and rich device compliance posture checks with contextual insights considered.
\nCisco Secure Access delivers a broad set of converged, cloud-based security services. Unlike alternatives, our approach overcomes IT complexity through a unified console with every function, including ZTA, managed from one interface. A single agent simplifies deployment with reduced device overhead. One policy engine further eases implementation as once a policy is written, it can be efficiently used across all appropriate security modules.
\nHybrid workers get a frictionless process: once authenticated, they go straight to any desired application-with just one click. This capability will transparently and automatically connect them with least privileged concepts, preconfigured security policies and adaptable enforcement measures that the administrator controls.
\nConnections are quicker and provide high throughput. Highly repetitive authentication steps are significantly reduced.<\/p>\n

With this type of comprehensive approach IT and security practitioners can truly modernize their remote access. Security is greatly enhanced, IT operations work is dramatically simplified, and hybrid worker satisfaction and productivity maximized.<\/p>\n

To obtain deeper insights into the technical requirements for true zero trust private access and to see how Cisco Secure Access with ZTA overcomes the limitations of ZTNA, view the Deep dive into a modern Zero Trust Access (ZTA) architecture<\/a> webinar.\u00a0Also, visit the Cisco SSE Institute site<\/a> for more information on ZTA and SSE.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0Move beyond ZTNA with Zero Trust Access to modernize remote user security\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

ZTNA hasn\u2019t delivered on the full promise of zero trust<\/strong><\/span><\/h2>\n

Zero Trust has been all the rage for several years; it states, \u201cnever trust, always verify\u201d and assumes every attempt to access the network or a\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

ZTNA hasn\u2019t delivered on the full promise of zero trust<\/strong><\/h2>\n

Zero Trust has been all the rage for several years; it states, \u201cnever trust, always verify\u201d and assumes every attempt to access the network or an application could be a threat. For the last several years, zero trust network access (ZTNA) has become the common term to describe this type of approach for securing remote users as they access private applications. While I applaud the progress that has been made, major challenges remain in the way vendors have addressed the problem and organizations have implemented solutions. To start with, the name itself is fundamentally flawed. Zero trust network access is based on the logical security philosophy of least privilege. Thus, the objective is to verify a set of identity, posture, and context related elements and then provide the appropriate access to the specific application or resource required\u2026not network level access.<\/p>\n

Most classic ZTNA solutions on the market today can\u2019t gracefully provide this level of granular control across the full spectrum of private applications. As a result, organizations have to maintain multiple remote access solutions and, in most scenarios, they still grant access at a much broader network or network segment level. \u00a0I believe it\u2019s time to drop the \u201cnetwork\u201d from ZTNA and focus on the original goal of least-privilege, zero trust access (ZTA).<\/p>\n

Classic ZTNA drawbacks<\/strong><\/h2>\n

With much in life, things are easier said than done and that concept applies to ZTNA and secure remote access. When I talk to IT executives about their current ZTNA deployments or planned initiatives there are a set of concerns and limitations that come up on a regular basis. As a group, they are looking for a cloud or hybrid solution that provides a better user experience, is easier for the IT team to deploy and maintain, and provides a flexible and granular level of security\u2026but many are falling short.<\/p>\n

With that in mind, I pulled together a list of considerations to help people assess where they are and where they want to be in this technology space. If you have deployed some form of ZTNA or are evaluating solutions in this area, ask yourself these questions to see if you can, or will be able to, meet the true promise of a true zero trust remote access environment.<\/p>\n

Is there a method to keep multiple, individual user to app sessions from piggybacking onto one tunnel and thus increasing the potential of a significant security breach?
\nDoes the reverse proxy utilize next-generation protocols with the ability to support per-connection, per-application, and per-device tunnels to ensure no direct resource access?
\nHow do you completely obfuscate your internal resources so only those allowed to see them can do so?
\nWhen do posture and authentication checks take place? Only at initial connection or continuously on a per session basis with credentials specific to a particular user without risk of sharing?
\nCan you obtain awareness into user activity by fully auditing sessions from the user device to the applications without being hindered by proprietary infrastructure methods?
\nIf you use Certificate Authorities that issue certs and hardware-bound private keys with multi-year validity, what can be done to shrink this timescale and minimize risk exposure?<\/p>\n

While the security and architecture elements mentioned above are important, they don\u2019t represent the complete picture when developing a holistic strategy for remote, private application access. There are many examples of strong security processes that failed because they were too cumbersome for users or a nightmare for the IT team to deploy and maintain. Any viable ZTA solution must streamline the user experience and simplify the configuration and enforcement process for the IT team. Security is \u2018Job #1\u2019, but overworked employees with a high volume of complex security tools are more likely to make provisioning and configuration mistakes, get overwhelmed with disconnected alerts, and miss legitimate threats. Remote employees frustrated with slow multi-step access processes will look for short cuts and create additional risk for the organization.<\/p>\n

To ensure success, it\u2019s important to assess whether your planned or existing private access process meets the usability, manageability and flexibility requirements listed below.<\/p>\n

The solution has a unified console enabling configuration, visibility and management from one central dashboard.
\nRemote and hybrid workers can securely access every type of application, regardless of port or protocol, including those that are session-initiated, peer-to-peer or multichannel in design.
\nA single agent enables all private and internet access functions including digital experience monitoring functions.
\nThe solution eliminates the need for on-premises VPN infrastructure and management while delivering secure access to all private applications.
\nThe login process is user friendly with a frictionless, transparent method across multiple application types.
\nThe ability to handle both traditional HTTP2 traffic and newer, faster, and more secure HTTP3 methods with MASQUE and QUIC<\/p>\n

Cisco Secure Access: A modern approach to zero trust access<\/strong><\/h2>\n

Secure Access<\/a> is Cisco\u2019s full-function Security Service Edge (SSE) solution and it goes far beyond traditional methods in multiple ways. With respect to resource access, our cloud-delivered platform overcomes the limitations of legacy ZTNA. Secure Access supports every factor listed in the above checklists and much more, to provide a unique level of Zero Trust Access (ZTA). Secure Access makes online activity better for users, easier for IT, and safer for everyone. <\/p>\n

Here are just a few examples:<\/p>\n

To protect your hybrid workforce, our ZTA architectural design has what we call \u2018proxy connections\u2019 that connect one user to one application: no more. If the user has access to several apps as once, each app connection has its own \u2018private tunnel\u2019. The result is true network isolation as they are completely independent. This eliminates resource discovery and potential lateral movement by rogue users.
\nWe implement per session user ID verification, authentication and rich device compliance posture checks with contextual insights considered.
\nCisco Secure Access delivers a broad set of converged, cloud-based security services. Unlike alternatives, our approach overcomes IT complexity through a unified console with every function, including ZTA, managed from one interface. A single agent simplifies deployment with reduced device overhead. One policy engine further eases implementation as once a policy is written, it can be efficiently used across all appropriate security modules.
\nHybrid workers get a frictionless process: once authenticated, they go straight to any desired application-with just one click. This capability will transparently and automatically connect them with least privileged concepts, preconfigured security policies and adaptable enforcement measures that the administrator controls.
\nConnections are quicker and provide high throughput. Highly repetitive authentication steps are significantly reduced.<\/p>\n

With this type of comprehensive approach IT and security practitioners can truly modernize their remote access. Security is greatly enhanced, IT operations work is dramatically simplified, and hybrid worker satisfaction and productivity maximized.<\/p>\n

To obtain deeper insights into the technical requirements for true zero trust private access and to see how Cisco Secure Access with ZTA overcomes the limitations of ZTNA, view the Deep dive into a modern Zero Trust Access (ZTA) architecture<\/a> webinar.\u00a0Also, visit the Cisco SSE Institute site<\/a> for more information on ZTA and SSE.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0Move beyond ZTNA with Zero Trust Access to modernize remote user security\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2547,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nThe Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am\" \/>\n<meta property=\"og:description\" content=\"ZTNA hasn\u2019t delivered on the full promise of zero trust Zero Trust has been all the rage for several years; it states, \u201cnever trust, always verify\u201d and assumes every attempt to access the network or a\u2026 Read more on Cisco Blogs \u200b[[{"value":" ZTNA hasn\u2019t delivered on the full promise of zero trust Zero Trust has been all the rage for several years; it states, \u201cnever trust, always verify\u201d and assumes every attempt to access the network or an application could be a threat. For the last several years, zero trust network access (ZTNA) has become the common term to describe this type of approach for securing remote users as they access private applications. While I applaud the progress that has been made, major challenges remain in the way vendors have addressed the problem and organizations have implemented solutions. To start with, the name itself is fundamentally flawed. Zero trust network access is based on the logical security philosophy of least privilege. Thus, the objective is to verify a set of identity, posture, and context related elements and then provide the appropriate access to the specific application or resource required\u2026not network level access. Most classic ZTNA solutions on the market today can\u2019t gracefully provide this level of granular control across the full spectrum of private applications. As a result, organizations have to maintain multiple remote access solutions and, in most scenarios, they still grant access at a much broader network or network segment level. \u00a0I believe it\u2019s time to drop the \u201cnetwork\u201d from ZTNA and focus on the original goal of least-privilege, zero trust access (ZTA). Classic ZTNA drawbacks With much in life, things are easier said than done and that concept applies to ZTNA and secure remote access. When I talk to IT executives about their current ZTNA deployments or planned initiatives there are a set of concerns and limitations that come up on a regular basis. As a group, they are looking for a cloud or hybrid solution that provides a better user experience, is easier for the IT team to deploy and maintain, and provides a flexible and granular level of security\u2026but many are falling short. With that in mind, I pulled together a list of considerations to help people assess where they are and where they want to be in this technology space. If you have deployed some form of ZTNA or are evaluating solutions in this area, ask yourself these questions to see if you can, or will be able to, meet the true promise of a true zero trust remote access environment. Is there a method to keep multiple, individual user to app sessions from piggybacking onto one tunnel and thus increasing the potential of a significant security breach? Does the reverse proxy utilize next-generation protocols with the ability to support per-connection, per-application, and per-device tunnels to ensure no direct resource access? How do you completely obfuscate your internal resources so only those allowed to see them can do so? When do posture and authentication checks take place? Only at initial connection or continuously on a per session basis with credentials specific to a particular user without risk of sharing? Can you obtain awareness into user activity by fully auditing sessions from the user device to the applications without being hindered by proprietary infrastructure methods? If you use Certificate Authorities that issue certs and hardware-bound private keys with multi-year validity, what can be done to shrink this timescale and minimize risk exposure? While the security and architecture elements mentioned above are important, they don\u2019t represent the complete picture when developing a holistic strategy for remote, private application access. There are many examples of strong security processes that failed because they were too cumbersome for users or a nightmare for the IT team to deploy and maintain. Any viable ZTA solution must streamline the user experience and simplify the configuration and enforcement process for the IT team. Security is \u2018Job #1\u2019, but overworked employees with a high volume of complex security tools are more likely to make provisioning and configuration mistakes, get overwhelmed with disconnected alerts, and miss legitimate threats. Remote employees frustrated with slow multi-step access processes will look for short cuts and create additional risk for the organization. To ensure success, it\u2019s important to assess whether your planned or existing private access process meets the usability, manageability and flexibility requirements listed below. The solution has a unified console enabling configuration, visibility and management from one central dashboard. Remote and hybrid workers can securely access every type of application, regardless of port or protocol, including those that are session-initiated, peer-to-peer or multichannel in design. A single agent enables all private and internet access functions including digital experience monitoring functions. The solution eliminates the need for on-premises VPN infrastructure and management while delivering secure access to all private applications. The login process is user friendly with a frictionless, transparent method across multiple application types. The ability to handle both traditional HTTP2 traffic and newer, faster, and more secure HTTP3 methods with MASQUE and QUIC Cisco Secure Access: A modern approach to zero trust access Secure Access is Cisco\u2019s full-function Security Service Edge (SSE) solution and it goes far beyond traditional methods in multiple ways. With respect to resource access, our cloud-delivered platform overcomes the limitations of legacy ZTNA. Secure Access supports every factor listed in the above checklists and much more, to provide a unique level of Zero Trust Access (ZTA). Secure Access makes online activity better for users, easier for IT, and safer for everyone. Here are just a few examples: To protect your hybrid workforce, our ZTA architectural design has what we call \u2018proxy connections\u2019 that connect one user to one application: no more. If the user has access to several apps as once, each app connection has its own \u2018private tunnel\u2019. The result is true network isolation as they are completely independent. This eliminates resource discovery and potential lateral movement by rogue users. We implement per session user ID verification, authentication and rich device compliance posture checks with contextual insights considered. Cisco Secure Access delivers a broad set of converged, cloud-based security services. Unlike alternatives, our approach overcomes IT complexity through a unified console with every function, including ZTA, managed from one interface. A single agent simplifies deployment with reduced device overhead. One policy engine further eases implementation as once a policy is written, it can be efficiently used across all appropriate security modules. Hybrid workers get a frictionless process: once authenticated, they go straight to any desired application-with just one click. This capability will transparently and automatically connect them with least privileged concepts, preconfigured security policies and adaptable enforcement measures that the administrator controls. Connections are quicker and provide high throughput. Highly repetitive authentication steps are significantly reduced. With this type of comprehensive approach IT and security practitioners can truly modernize their remote access. Security is greatly enhanced, IT operations work is dramatically simplified, and hybrid worker satisfaction and productivity maximized. To obtain deeper insights into the technical requirements for true zero trust private access and to see how Cisco Secure Access with ZTA overcomes the limitations of ZTNA, view the Deep dive into a modern Zero Trust Access (ZTA) architecture webinar.\u00a0Also, visit the Cisco SSE Institute site for more information on ZTA and SSE. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: "}]]\u00a0\u00a0Move beyond ZTNA with Zero Trust Access to modernize remote user security\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-23T12:54:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am\",\"datePublished\":\"2024-02-23T12:54:07+00:00\",\"dateModified\":\"2024-02-23T12:54:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/\"},\"wordCount\":1284,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/\",\"name\":\"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif\",\"datePublished\":\"2024-02-23T12:54:07+00:00\",\"dateModified\":\"2024-02-23T12:54:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/","og_locale":"en_US","og_type":"article","og_title":"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am","og_description":"ZTNA hasn\u2019t delivered on the full promise of zero trust Zero Trust has been all the rage for several years; it states, \u201cnever trust, always verify\u201d and assumes every attempt to access the network or a\u2026 Read more on Cisco Blogs \u200b[[{\"value\":\" ZTNA hasn\u2019t delivered on the full promise of zero trust Zero Trust has been all the rage for several years; it states, \u201cnever trust, always verify\u201d and assumes every attempt to access the network or an application could be a threat. For the last several years, zero trust network access (ZTNA) has become the common term to describe this type of approach for securing remote users as they access private applications. While I applaud the progress that has been made, major challenges remain in the way vendors have addressed the problem and organizations have implemented solutions. To start with, the name itself is fundamentally flawed. Zero trust network access is based on the logical security philosophy of least privilege. Thus, the objective is to verify a set of identity, posture, and context related elements and then provide the appropriate access to the specific application or resource required\u2026not network level access. Most classic ZTNA solutions on the market today can\u2019t gracefully provide this level of granular control across the full spectrum of private applications. As a result, organizations have to maintain multiple remote access solutions and, in most scenarios, they still grant access at a much broader network or network segment level. \u00a0I believe it\u2019s time to drop the \u201cnetwork\u201d from ZTNA and focus on the original goal of least-privilege, zero trust access (ZTA). Classic ZTNA drawbacks With much in life, things are easier said than done and that concept applies to ZTNA and secure remote access. When I talk to IT executives about their current ZTNA deployments or planned initiatives there are a set of concerns and limitations that come up on a regular basis. As a group, they are looking for a cloud or hybrid solution that provides a better user experience, is easier for the IT team to deploy and maintain, and provides a flexible and granular level of security\u2026but many are falling short. With that in mind, I pulled together a list of considerations to help people assess where they are and where they want to be in this technology space. If you have deployed some form of ZTNA or are evaluating solutions in this area, ask yourself these questions to see if you can, or will be able to, meet the true promise of a true zero trust remote access environment. Is there a method to keep multiple, individual user to app sessions from piggybacking onto one tunnel and thus increasing the potential of a significant security breach? Does the reverse proxy utilize next-generation protocols with the ability to support per-connection, per-application, and per-device tunnels to ensure no direct resource access? How do you completely obfuscate your internal resources so only those allowed to see them can do so? When do posture and authentication checks take place? Only at initial connection or continuously on a per session basis with credentials specific to a particular user without risk of sharing? Can you obtain awareness into user activity by fully auditing sessions from the user device to the applications without being hindered by proprietary infrastructure methods? If you use Certificate Authorities that issue certs and hardware-bound private keys with multi-year validity, what can be done to shrink this timescale and minimize risk exposure? While the security and architecture elements mentioned above are important, they don\u2019t represent the complete picture when developing a holistic strategy for remote, private application access. There are many examples of strong security processes that failed because they were too cumbersome for users or a nightmare for the IT team to deploy and maintain. Any viable ZTA solution must streamline the user experience and simplify the configuration and enforcement process for the IT team. Security is \u2018Job #1\u2019, but overworked employees with a high volume of complex security tools are more likely to make provisioning and configuration mistakes, get overwhelmed with disconnected alerts, and miss legitimate threats. Remote employees frustrated with slow multi-step access processes will look for short cuts and create additional risk for the organization. To ensure success, it\u2019s important to assess whether your planned or existing private access process meets the usability, manageability and flexibility requirements listed below. The solution has a unified console enabling configuration, visibility and management from one central dashboard. Remote and hybrid workers can securely access every type of application, regardless of port or protocol, including those that are session-initiated, peer-to-peer or multichannel in design. A single agent enables all private and internet access functions including digital experience monitoring functions. The solution eliminates the need for on-premises VPN infrastructure and management while delivering secure access to all private applications. The login process is user friendly with a frictionless, transparent method across multiple application types. The ability to handle both traditional HTTP2 traffic and newer, faster, and more secure HTTP3 methods with MASQUE and QUIC Cisco Secure Access: A modern approach to zero trust access Secure Access is Cisco\u2019s full-function Security Service Edge (SSE) solution and it goes far beyond traditional methods in multiple ways. With respect to resource access, our cloud-delivered platform overcomes the limitations of legacy ZTNA. Secure Access supports every factor listed in the above checklists and much more, to provide a unique level of Zero Trust Access (ZTA). Secure Access makes online activity better for users, easier for IT, and safer for everyone. Here are just a few examples: To protect your hybrid workforce, our ZTA architectural design has what we call \u2018proxy connections\u2019 that connect one user to one application: no more. If the user has access to several apps as once, each app connection has its own \u2018private tunnel\u2019. The result is true network isolation as they are completely independent. This eliminates resource discovery and potential lateral movement by rogue users. We implement per session user ID verification, authentication and rich device compliance posture checks with contextual insights considered. Cisco Secure Access delivers a broad set of converged, cloud-based security services. Unlike alternatives, our approach overcomes IT complexity through a unified console with every function, including ZTA, managed from one interface. A single agent simplifies deployment with reduced device overhead. One policy engine further eases implementation as once a policy is written, it can be efficiently used across all appropriate security modules. Hybrid workers get a frictionless process: once authenticated, they go straight to any desired application-with just one click. This capability will transparently and automatically connect them with least privileged concepts, preconfigured security policies and adaptable enforcement measures that the administrator controls. Connections are quicker and provide high throughput. Highly repetitive authentication steps are significantly reduced. With this type of comprehensive approach IT and security practitioners can truly modernize their remote access. Security is greatly enhanced, IT operations work is dramatically simplified, and hybrid worker satisfaction and productivity maximized. To obtain deeper insights into the technical requirements for true zero trust private access and to see how Cisco Secure Access with ZTA overcomes the limitations of ZTNA, view the Deep dive into a modern Zero Trust Access (ZTA) architecture webinar.\u00a0Also, visit the Cisco SSE Institute site for more information on ZTA and SSE. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \"}]]\u00a0\u00a0Move beyond ZTNA with Zero Trust Access to modernize remote user security\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/","og_site_name":"JHC","article_published_time":"2024-02-23T12:54:07+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/"},"author":{"name":"","@id":""},"headline":"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am","datePublished":"2024-02-23T12:54:07+00:00","dateModified":"2024-02-23T12:54:07+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/"},"wordCount":1284,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/","url":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/","name":"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif","datePublished":"2024-02-23T12:54:07+00:00","dateModified":"2024-02-23T12:54:07+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16589317-hcPvZh.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/the-real-deal-about-ztna-and-zero-trust-access-jeff-scheaffer-on-february-23-2024-at-229-am\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"The Real Deal About ZTNA and Zero Trust Access Jeff Scheaffer on February 23, 2024 at 2:29 am"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2546"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2546\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2547"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}