Security that Accelerates Business

Security that Accelerates Business

One of the best things about a useful security product, is that it not only secures the environment but also accelerates business. Zscaler Private Access is an example of such a product. Customers buy it for the security, but love it for everything else it allows. Let me explain:

One of the ways ZPA delivers security is by cloaking applications inside the Zscaler cloud, the Zero Trust Exchange (ZTE). To access an application, a user uses DNS (it all starts with DNS) and is pointed to Zscaler where they must authenticate, their device must be up to snuff (running EDR of minimum version X, OS version Y, etc). Once all of that is verified, application access is extended through a proxy inside the ZTE. The end user never knows the application's IP address, but only sees a Carrier Grade NAT (CGNAT) address which the ZTE extends to the user. In other words, the application's network details are cloaked behind the ZTE. Cool security, huh? The reconn stage of threats falls flat on its face. Wait. It gets better...

What if you are trying to move application A from a datacenter to a colo, or from a data center to the cloud? Traditionally, one would leverage virtual networking to extend the infrastructure to the new location, then vMotion the app (in the case of DC to Colo), or do other unnatural network tricks, tunnels, and other means of extending the infrastructure. All of this requires timely, delicate planning to ensure connectivity, occasional network infrastructure upgrades to allow for jumbo frames, etc. Well, if that app lies behind the ZTE cloak, you can simply bring up the application in the new location with whatever IP addressing is desired at the same time as the application is running in the old location. Now, users in the AppA_Test_User group can be directed to the new instance of the app by policy while users in the App_A user group can be directed to the old app. This allows for testing and cutover in a far more efficient and expedient manner.

For more information, see this white paper discussing the DC to AWS use case.

要查看或添加评论,请登录

Maria Teigeiro, CISSP的更多文章

  • It's 2024. Do You Know Where Your Data Is?

    It's 2024. Do You Know Where Your Data Is?

    I recently read that "Approximately 35% of companies use AI". I would like to ammend that to say "are purposefully…

  • Islands of Data - Best of Breed in the Age of AI

    Islands of Data - Best of Breed in the Age of AI

    The "best of Breed" design principle has been a school of thought which suggested that by combining a myriad of…

    1 条评论
  • Balancing Sphere of Control vs Fault Domain

    Balancing Sphere of Control vs Fault Domain

    Today, we had a lesson in the balance of sphere of control vs fault domain as Crowdstrike issued a defective content…

    2 条评论
  • It Is Time For Security Through Simplicity

    It Is Time For Security Through Simplicity

    Almost 20 years ago, Cisco advocated for a "defense in depth" model for security. The idea was that optimal security…

  • Data Is the Fuel of AI

    Data Is the Fuel of AI

    We are in the dawn of the Age of AI. LLMs are proliferating and chips are powerful enough to run AI engines.

    2 条评论
  • Kevlar Halter Tops (Buying Data for AI)

    Kevlar Halter Tops (Buying Data for AI)

    Within 60 days, 2 out of the 5 SIEM leaders in Gartner's SIEM MQ (representing a total of 23 of the SIEM marketshare)…

    4 条评论
  • Security for Change, not Performance

    Security for Change, not Performance

    The latest notice of exploitation of critical infrastructure comes with an irresponsible set of actions: Change all…

    1 条评论
  • LLM/AI: Deja Vu

    LLM/AI: Deja Vu

    When you're as old as I am, you get to see that history does indeed repeat itself, no matter how new the technology. In…

    1 条评论
  • Deception + Black Holes = Cleanliness

    Deception + Black Holes = Cleanliness

    After my last post talking about how the time has come to put deception technology (previously known as honey pots) to…

  • Honey Pots: An Idea Whose Time Has Come

    Honey Pots: An Idea Whose Time Has Come

    Honey pots as a security concept have been around for decades. I first saw the idea of using a dedicate resource to…

    7 条评论

社区洞察

其他会员也浏览了