Conventional security models operate on the assumption that everything already on the inside of an enterprise’s network can be trusted. They are designed to protect the perimeter of the network and allow threats inside the network to be free to morph and move wherever they choose. However, when considering the increasing sophistication of attacks and insider threats, new security measures need to be implemented that can stop a threat once inside.
Zero Trust is designed to address lateral threat movement within the network by leveraging micro-segmentation and granular perimeters enforcement based on user, data, and location. To gain traffic visibility and context, it needs to go through a next-generation firewall with decryption capabilities. The next-generation firewall enables micro-segmentation of perimeters, and acts as border control within your organization.
Verifying traffic as it crosses between different functions by using two-factor authentication and other methods is crucial. Leveraging a Zero Trust approach to identifying enterprise processes, users, data, and data flows means policy rules can be updated automatically based on associated risks with every iteration.
In November 2018, Forrester evaluated 14 different providers of the Zero Trust eXtended (ZTX) ecosystem and ranked them based on 15 different criteria grouped into three different buckets:
WEI works closely with two of the top performing clients in this study – Cisco and Illumio. If you’re considering implementing ZTX architecture within your own enterprise, hear what Forrester had to say about their offerings.
The Cisco name is well known in the security space, and its gravitas as a global entity in the network area has been established for decades. The company’s return to enabling security operations more strategically has coincided with the explosion of Zero Trust, and Cisco is doing a good job of establishing its presence here.
Interviewees typically noted the vendor’s strong capability in network security and configuration, but were also quick to note that legacy user interfaces and the spread of capabilities over such a vast functional expanse was at times confusing and hindering.
Following the cutoff date for this report and therefore excluded from the scores, Cisco completed its acquisition of Duo Security to expand on the Cisco approach to Zero Trust. Duo enables customers to verify user and device trust to more securely control access to applications.
A key factor for any Zero Trust enterprise or strategy is to know what assets and controls are in place and to be able to understand, with context, what transactions and threats are critical to the business. In this regard, Illumio shines. The technology provided by the vendor aligns well with enabling the establishment of Zero Trust for an organization, and its ability to provide the contextual insight of threat areas and workflows for both securi ty and continuity stand out in the space.
Users were quick to note the vendor’s strong capability in enabling micro-segmentation on the fly combined with its focus on visualization and usability, all key points in any Zero Trust system.
The market for Zero Trust architecture is growing as more security leaders see it as a way to address top challenges, and vendors are embracing it as a marketing tool for their capabilities and to guide their future road maps.
WEI is a trusted technology partner with a wide range of resources and services that will benefit enterprises looking to implement Zero Trust architecture or increase the scale of their existing program. For more information, contact us today.