The Fast Mode : Keeping Zero Trust Security Dynamic, Continuous, and Contextual The Fast Mode spoke to Bernard Debauche, Chief Product & Marketing at Systancia on the impact of traffic visibility on ZTNAZero Trust Network Access. The ZTNA is a name describing products that apply a “Zero Trust”, or lesser privilege, policy in the area of external access. The objective is to… More networks. Bernard joins us in a series of discussions with leading cybersecurity and networking vendors, assessing the evolution of ZTNA technologies, the roadmap for ZTNA deployments, the benefits of ZTNA for enterprise and telco networks, and the need for real-time traffic visibility technologies such as DPI for ZTNA.What do you consider are the core features (must have) of ZTNA?ZTNA is about enforcing the “zero-trust” in remote, i.e. network, access to organization’s IT assets. The same way a “secure by design” approach is not enough and does not free you from doing runtime evaluations, pentests, etc., “zero-trust” is not just a matter of access policies and the enforcement of these; it is also a matter of access infrastructure: does it have all the “zero-trust” characteristics required to ensure the security of the access. That is why our vision, at Systancia, is that ZTNA goes beyond “least privilege; JIT privilege; zero-standing privilege”: it must guarantee “least connection; JIT connection; zero-standing connection”. The connection to the application or resource must be enacted only at the time and for the duration of the use of the application/resource.[…] How has ZTNA evolved over the years?ZTNA evolves at the speed of the “zero-trust” maturity within the organization. As it is a kind of paradigm shift, it takes time, and maturity grows as organizations become increasingly conscious of the cyber risk as they make use of SaaS applications, accept access to their IT systems from third-party organizations (customers, suppliers, partners, service providers, etc.)[…]The change which makes the switch to ZTNA is either access from unmanaged devices (BYOD) (which accelerated at the COVID lockdown) or the access from third-party partners, anyway from unmanaged devices. […]Another trend is the convergence between ZTNA and remote PAMPrivileged Access Management. PAM is a technology for managing access and authentication of authorized users, usually information system administrators, to administrative resources or applications. The main objective is to secure… More. Many organizations leverage ZTNA for the access from business entities of their ecosystem: but often, these use cases regard access by uncontrolled staff to critical assets. Requirements for detailed traceability and audit trails, and sometime for session recording, arise then. That is why, at Systancia, we converged both (ZTNA and PAM) into a single SaaS platform, i.e. cyberelements.io.[…]We can also mention another evolution that we see in the market: the extension of the ZTNA application to OT systems – not only IT. Industrial organizations face more and more the need to provide access to their OT infrastructure to vendors, service providers, on-call/on-duty personnel, etc.[…]Read more on The Fast Mode