SOFTWARE SECURITY

Palo Alto Networks Calls on Cybersecurity Industry to Adopt ZTNA 2.0 -- Zero Trust with Zero Exceptions

Palo Alto Networks | May 12, 2022

Palo Alto Networks
Palo Alto Networks , the global cybersecurity leader, today urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0) — the foundation for a new era of secure access. ZTNA was developed as a replacement for virtual private networks (VPNs) when it became clear that most VPNs did not adequately scale and were overly permissive, but the first-generation ZTNA products (ZTNA 1.0) are too trusting and can put customers at significant risk. ZTNA 2.0 solves these problems by removing implicit trust to help ensure organizations are properly secured.

"This is a critical time for cybersecurity. We are in an era of unprecedented cyberattacks, and the past two years have dramatically changed work — for many, work is now an activity, not a place. This means that securing employees and the applications they need is both harder and more important. Zero trust has been embraced as the solution — and it is absolutely the right approach! Unfortunately, not every solution with Zero Trust in its name can be trusted. ZTNA 1.0 — for example — falls short."

Nir Zuk, founder and chief technology officer at Palo Alto Networks

For modern organizations where hybrid work and distributed applications are the norm, ZTNA 1.0 has several limitations. It is overly permissive in granting access to applications because it can't control access to sub-applications or particular functions. Additionally, there is no monitoring of changes in user, application or device behavior, and it can't detect or prevent malware or lateral movement across connections. ZTNA 1.0 also cannot protect all enterprise data.

ZTNA 2.0-capable products, such as Palo Alto Networks Prisma® Access, help organizations meet the security challenges of modern applications, threats and the hybrid workforce. ZTNA 2.0 incorporates the following key principles:

  • Least-privileged access — enables precise access control at the application and sub-application levels, independent of network constructs like IP addresses and port numbers.
  • Continuous trust verification — after access to an application is granted, continuous trust assessment is ongoing based on changes in device posture, user behavior and application behavior.
  • Continuous security inspection — uses deep and ongoing inspection of all application traffic, even for allowed connections to help prevent threats, including zero-day threats.
  • Protection of all data — provides consistent control of data across all applications, including private applications and SaaS applications, with a single data loss prevention (DLP) policy.
  • Security for all applications — consistently secures all types of applications used across the enterprise, including modern cloud native applications, legacy private applications and SaaS applications.

In a new report, John Grady, ESG senior analyst, said: "[F]irst-generation/ZTNA 1.0 solutions fall short in many ways on delivering on the promise of true zero trust. In fact, they grant more access than is desired. What's more, once access is granted in ZTNA 1.0 solutions, the connection is implicitly trusted forever, allowing a handy exploit route for sophisticated threats and/or malicious actions and behavior." Grady also said, "It is time to embrace a new approach to ZTNA, one that has been designed from the ground up to meet the specific challenges of modern applications, threats, and a hybrid workforce."

"Securing today's hybrid workforce, with an increase in cloud and mobile technologies and evolving requirements, can be complicated," said Jerry Chapman, engineering fellow, Optiv. "Rethinking Zero Trust is essential for modern, hybrid organizations to prevent threats. Together with Palo Alto Networks, we're advising our customers to incorporate ZTNA 2.0 principles like continuous review of identity and connection across their domains to stay secure."

New Prisma Access Capabilities
Palo Alto Networks Prisma Access is the industry's only solution that meets today's ZTNA 2.0 requirements. Prisma Access protects all application traffic with best-in-class capabilities while securing both access and data.

New additions to Prisma Access announced today add the following capabilities:

  • ZTNA connector — simplifies the process of onboarding cloud native and traditional applications into the service, helping make ZTNA 2.0 easier to deploy and more secure.
  • The industry's only unified SASE product — providing a common policy framework and data model for all SASE capabilities, managed from a single cloud management console.
  • Self-serve autonomous digital experience management (ADEM) — helps proactively notify users of issues that require prompt attention and provides them with guidance on how to remediate.

Availability
Prisma Access is generally available today with full support for ZTNA 2.0. The new ZTNA connector, unified SASE, and self-service ADEM will be available in the next 90 days.

About Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

Spotlight

Today's threat environment dictates that basic MDM solutions should be supplemented with robust security controls to help secure and protect sensitive data from being distributed to unauthorized third parties, either inadvertently or maliciously.

Spotlight

Today's threat environment dictates that basic MDM solutions should be supplemented with robust security controls to help secure and protect sensitive data from being distributed to unauthorized third parties, either inadvertently or maliciously.

Related News

SOFTWARE SECURITY

WhiteSource Rebrands as Mend

Mend | May 30, 2022

WhiteSource, a pioneer in application security, has rebranded to Mend. Within the Mend Application Security Platform, the business is also delivering the industry's first automatic remediation for custom code security concerns, as well as integrating Mend Supply Chain Defender (previously WhiteSource Diffend) in its JFrog Artifactory plugin. Mend protects all parts of your program by automating repair, prevention, and protection from issue to solution, rather than just detection and proposed solutions. With revenue increasing by 800% in the previous three years and enterprise net retention reaching 127% in 2021, the firm recruited 350 new clients in the last year. Mend has over 1,000 clients, including more than 25% of the Fortune 100, and is committed to spending its most recent investment ($75 million series D announced in April 2021) on general development as it extends outside the Software Composition Analysis (SCA) industry. This includes the purchase of Diffend in April 2021, as well as the acquisitions of SAST companies Xanitizer and DefenseCode in February of this year. The Mend Application Security Platform is the result of strategic acquisitions and the company's unique automated remediation capabilities. The platform is the first to automatically detect and correct application security gaps including both open source and bespoke code, combining automated remediation for static application security testing (SAST) with Mend's current capacity to do so for software composition analysis (SCA). "Attackers are increasingly targeting applications as the weakest link to go after organizations, and at the same time, pressure to deliver software faster has never been higher. Organizations face undeniable tension to do both, better. Mend breaks the tradeoff between security and development delivery timelines by providing a solution that automates the reduction of the software attack surface while removing most of the burden of application security, allowing development teams to deliver quality, secure code, faster." Rami Sass, Co-founder and CEO of Mend Josh Johnson, Manager of Solutions Architecture, Defy Security said that "Whether open-source or proprietary code, the application security industry has mostly focused on vulnerability detection and management. Mend has an interesting approach of automating the remediation of code vulnerabilities. While the company is announcing this new name, as a partner of Mend, we are excited for it to further its commitment to solving code-based security challenges with automated-remediation. Defy Security looks forward to seeing Mend extend automation for closing security gaps."

Read More

INFOSEC PROJECT MANAGEMENT

CyberCube Partners With Kroll to Launch Response Service

CyberCube | May 31, 2022

CyberCube, a supplier of cyber risk analytics, has developed CAERS, a new cyber incident response service for customers of the company's SaaS products. CyberCube will collaborate with Kroll, the premier supplier of data, technology, and insights linked to risk, governance, and growth, to offer CyberCube's customers information and assistance on important cyber aggregation events via the Cyber Aggregation Event Response Service (CAERS). Kroll will deliver frontline risk information derived from thousands of incident response cases handled each year. Following a large cyber disaster, the CAERS team will provide the most recent information to CyberCube's customers, while CyberCube's SaaS tools, including Broker Manager, Account Manager, and Portfolio Manager, will aid in the reaction to any developing cyber calamity. “With cyber events becoming increasingly common, the speed and accuracy with which organisations respond to them is critical. That’s why we’ve launched this response service, specifically tailored to CyberCube’s growing client base. The pressure on our clients during a major cyberattack can be extreme. With CAERS, our team—comprising data scientists, actuaries, engineers, economists and cyber security experts—will become an extension of our clients’ teams, providing the updates they need and sharing both our expertise and data.” Darren Thomson, CyberCube’s Head of Cyber Intelligence Services Benedetto Demonte, Chief Operating Officer for Kroll’s Cyber Risk practice, said: “We’re pleased to be contributing to CAERS because effective incident response depends on the most current and relevant threat intelligence available. In our most recent Threat Landscape Report, we saw a 356% growth in the number of attacks quarter-on-quarter where the infection vector was a zero-day or freshly announced software exploit. Ransomware groups have also been found to be leveraging newly announced vulnerabilities just days after release. It is only with access to frontline intelligence that firms can prioritize resources, mitigate the risk of a cyberattack and react appropriately if the worst happens.”

Read More

DATA SECURITY

QuSecure Partners with DataBridge Sites

DataBridge Sites | June 15, 2022

QuSecure, Inc., a pioneer in post-quantum cybersecurity (PQC), announced today a collaboration with DataBridge Sites, a cutting-edge data center provider that serves off-site business critical IT environments, to demonstrate its Quantum-as-a-Service (QaaS) orchestration platform QuProtect. QuProtect is the industry's first end-to-end post-quantum cybersecurity software-based solution that uses quantum secure channels to safeguard encrypted communications and data with quantum resilience. As an outcome of the collaboration, QuProtect is the first and only PQC solution provided as a live service in a data center. Business, IT, and security executives may quickly learn more about a successful PQC implementation by offering an accessible and tangible example of advanced PQC at datacenters like DataBridge. According to Shor's algorithm, any quantum computer with sufficient power would ultimately overcome all present global encryption. As a result, in order to secure data and communications, all business and government bodies must update to quantum-resistant equipment. Furthermore, data stolen now can be decoded in the future by a quantum computer, thus major enterprises must begin the strategic and information collecting stages of transitioning their cybersecurity to assure quantum resilience. The QuSecure/Databridge collaboration offers a technique for demonstrating quantum resilience. “Our team is very excited to now be home to the QuSecure environment, which is the first PQC software that is currently live in a data center. Our company sees the quantum computing industry as a rapid growth area that can be used widespread through the commercial and federal marketplace. QuSecure’s unique offering will add to our ecosystem of service providers for clients to utilize.” Mike Lozupone, DataBridge Sites director of business development He further added, “DataBridge sees this partnership as being mutually beneficial, and we feel fortunate to work with companies like QuSecure as their business continues to grow. We expect new customers to be driven to our facility to benefit from the combination of QuSecure’s quantum security offerings and the infrastructure scale and physical security provided by DataBridge Sites.” QuProtect delivers quantum-resistant cryptography at any time, on any device. QuProtect employs an end-to-end, quantum-security-as-a-service (QSaaS) architecture that addresses the most vulnerable aspects of the digital ecosystem by combining zero-trust, next-generation post-quantum cryptography, quantum-strength keys, high availability, simple deployment, and active defense into a detailed and coherent cybersecurity suite. The end-to-end method is built around the full data lifecycle, including data storage, communication, and consumption. Skip Sanzeri, QuSecure Founder and COO said that “DataBridge is a world-class organization, and we are pleased to partner with them to provide the first instance of post-quantum cybersecurity available in a data center. The quantum threat, or Q-Day, is coming at us rapidly, and in May the White House published two initiatives to actively build U.S. quantum computing and post-quantum cybersecurity programs. Our partnership with DataBridge is another big step along the way to National Security in line with the White House memos.” QuProtect is the most sophisticated PQC solution in the market, offering quantum-resilience for many of today's key use cases such as network, IoT, edge devices, and satellite communications. QuProtect may be hosted on-premises or in the cloud, giving the most suitable solution to the post-quantum dilemma and addressing today's complicated compliance concerns, such as BYOD and work-from-home regulations. PQC can be implemented across all network devices with minimum interruption to existing systems, defending against present and future quantum assaults that might irrevocably destroy industries and infrastructures in the government and commercial sectors.

Read More