Zero Trust Network Access (ZTNA)
In traditional enterprise networks, Virtual Private Network (VPN) solutions are implemented as a way of providing users access internal resources remotely. With the changes in the society after the COVID pandemic , an exponential number of users started working remotely, increasing the number of clients of that technology. The problem with VPNs is that they follow the network security model called Castle and Moat . In this model, clients cannot access resources if they are not connected to the VPN, but once they are within the network, they have full access to the data and applications, even if they do not use it for its daily work. This model presents a vulnerability, since if an attacker gain access to the network, it can use it as an attack vector to run cyber attacks such as Man-in-the-middle (MITM) or ransomware . Another common trend, is that many organisations are moving their workload to the Cloud. There is not a single 'castle' protect anymore. Therefore, protecting a...