Try all of the on-demand periods from the Clever Safety Summit here.

Citing the safety, scale and velocity benefits of deploying zero-trust community entry 2.0 (ZTNA) in multicloud environments, Palo Alto Networks’ Ignite ’22 keynotes and breakouts declare the brand new normal is gaining momentum.

“The entire intelligence that goes behind zero belief is definitely within the cloud, which implies that when you operationalize us (Palo Alto Networks) in a single place or one kind issue, the subsequent one is very easy,” Lee Klarich, chief product officer for Palo Alto Networks, stated throughout his keynote “Out-Innovating the Attackers” at Ignite ’22 final week.

ZTNA 2.0 is a brand new business normal proposed by Palo Alto Networks earlier this 12 months, based mostly on their perception that the prevailing zero-trust normal is simply too trusting, permitting for implicit belief gaps to occur on persistent connections.

Safety leaders who’re advocates of ZTNA 2.0 say there must be extra stringent enforcement of least-privileged entry from the third to the seventh layer of the OSI Mannequin. Advocates level to the dearth of real-time belief verification throughout the higher layers of the mannequin.


Clever Safety Summit On-Demand

Study the essential function of AI & ML in cybersecurity and business particular case research. Watch on-demand periods in the present day.

Watch Here

With greater than 61,000 energetic firewall clients in accordance with their Q1, FY 2023 quarterly outcomes presentation, Palo Alto Networks is ideally positioned to advertise a brand new zero-trust normal that capitalizes on steady monitoring and their experience in analyzing real-time community visitors.

Stage-setting expectations on ZTNA 2.0

It’s essential to maintain the broader strategic initiatives of a corporation in thoughts when assessing ZTNA, ZTNA 2.0, and nil belief basically. Zero-trust frameworks are simplest after they assist, strengthen and defend new digital enterprise initiatives and safe digital organizations. Investing in cybersecurity and nil belief is a enterprise resolution integral to the longer term progress of any group. Getting it proper means tailoring zero belief to a enterprise’s distinctive safety and threat administration wants. 

VentureBeat spoke with a number of IT leaders at Ignite ‘22 who stated they’ve applied Palo Alto Networks’ Prisma Cloud and are pursuing ZTNA 2.0 report progress. Most of them cope with multicloud and hybrid cloud infrastructure challenges that the mix of Prisma Cloud and ZTNA 2.0 assist remedy.

None, nonetheless, think about ZTNA 2.0 the one-and-done answer to their zero-trust framework goals. Slightly, they want Prisma Cloud and ZTNA 2.0 to unravel advanced multicloud and hybrid cloud safety challenges that demand scale and velocity. 

SASE, multicloud deployments assist ZTNA 2.0 adoption

Palo Alto Networks contends that ZTNA 2.0 additionally permits customers entry to community sources from anyplace by way of secured entry service edge (SASE), simplifies the necessity for conventional community perimeter controls, and that cloud-based deployment helps velocity up implementation instances. The corporate additionally claims that ZTNA 2.0 is best fitted to integrating with identification entry administration (IAM), privileged entry administration (PAM), multifactor authentication (MFA), and different safety applied sciences all on a single platform.

That’s according to one of many key messages to clients at Ignite ’22: That Palo Alto Networks must be their vendor associate for consolidating their tech stacks.

Palo Alto Networks’ Prisma Cloud is core to their ZTNA 2.0 technique on the utility degree. Supply: Palo Alto Networks 2021 Analyst Day Presentation.

Palo Alto Networks additionally contends that its cloud platform method to ZTNA 2.0 simplifies zero belief by offering constant least privileged entry and steady monitoring throughout each identification and endpoint, or as Klarich stated in his keynote, kind elements.

“So when you consider this method, what it means is you get the identical safety outcomes,” stated Klarich. “You get constant safety operations and administration. It’s optimizing the end-user expertise as a result of the customers get the identical expertise, regardless of the place they’re working from, which, after all, is much more essential in the present day than ever earlier than.”

Klarich additionally defined in his keynote how zero-trust cloud structure combines the corporate’s third and fourth era {hardware} structure advances to supply efficiency positive aspects frequently. Palo Alto Networks sees ZTNA 2.0 as greater than a framework; it’s their ecosystem for future progress the place their {hardware}, software program and cloud advances mix to ship larger worth than every part offered alone.

Lee Klarich’s keynote defined Palo Alto Networks’ imaginative and prescient of ZTNA 2.0 as a cloud-delivered safety platform that integrates user-ID, App-ID, Gadget-ID, and steady safety, supported by {hardware} and software program next-generation firewalls and SASE. Supply: Ignite ’22 Convention.

Why ZTNA 2.0 is gaining multicloud momentum

The commonest cause that clients say they undertake ZTNA 2.0 is to achieve larger visibility and management throughout a number of hyperscalers and cloud platforms whereas guaranteeing a constant safety coverage and safety posture. The Palo Alto clients that VentureBeat interviewed at Ignite ’22 stated their organizations adopted zero belief to enhance compliance and threat administration, improve course of agility, and consolidate their legacy tech stacks.

Interviews and surveys validate that getting integration proper with ZTNA 2.0 is difficult, as is the method of implementing it as a framework throughout large-scale, distributed organizations. CISOs that VentureBeat spoke with at Ignite ’22 say it may be difficult to construct a whole zero-trust framework with only one vendor, particularly relating to endpoint safety.

As David Holmes, Forrester senior analyst, writes in The Forrester New Wave: Zero Belief Community Entry, Q3 2021, Palo Alto Networks “nonetheless wants to enhance endpoint providing, together with cell. Clients say the cell expertise Prisma Entry nonetheless wants enchancment, they usually report some technical challenges with the endpoint software program for desktops and laptops.” 

Integration utilizing APIs is likely one of the most difficult facets of implementing ZTNA 2.0 based mostly on buyer interviews at Ignite ’22. 

Regardless of the various promoted advantages of ZTNA 2.0, getting implementations streamlined to ship outcomes might be difficult, in accordance with a latest survey and conversations with clients at Encourage ’22. Supply: Palo Alto Community’s 2022 What’s Next in Cyber survey

What clients are saying about Prism Cloud and ZTNA 2.0

General, clients that VentureBeat spoke with are optimistic about their experiences with Prisma Cloud and ZTNA 2.0. One IT director advised VentureBeat that overcoming the challenges of integrating Prisma Cloud with different apps and instruments within the safety tech stack was probably the most difficult piece. Nevertheless, SASE was additionally core to their ZTNA 2.0 technique, and the implementation of that throughout distant workplaces went easily.

Different IT leaders advised VentureBeat that Prisma Cloud is automating the tens of millions of safety updates per day in comparison with counting on patch prep and deployment automation. This alleviates the necessity to keep the infrastructure with time-consuming processes and guide procedures.

One CISO that VentureBeat spoke with says the subscription mannequin for Prisma Entry might be difficult, and it’s finest to get assist for those who’re a first-time buyer attempting to determine it out. She additionally suggested that IT leaders watch out troubleshooting Prisma Entry as a result of it’s straightforward to unintentionally create a service interruption. Additionally, the CISO stated, Okta integration might be difficult, and Border Gateway Protocol (BGP) queries have been identified to bathroom down if API integrations aren’t optimized.

The underside line is that Palo Alto Networks is succeeding with its consolidation technique of promoting ZTNA 2.0 inside its buyer base, emphasizing the safety, scale and velocity of Prisma Cloud because the deployment technique.

CISOs and IT administrators are after extra granular entry insurance policies that may be custom-made to suit the wants of particular customers, teams and gadgets, giving them larger management over who can entry what sources. They’re additionally after simplified entry, improved usability, and simpler compliance reporting throughout their multicloud infrastructure.

Source link