What is zero trust architecture?
With the growing sophistication of hackers and malware, as well as a new era of connected mobile users, billions of IoT devices and public cloud applications being used everywhere, the Zero Trust Architecture is a new reality for many organizations. Zero Trust means no trusted perimeter. Everything is primarily untrusted and a device or user only receives the least privileged access. Even after authentication or authorization in some cases. A Zero Trust Architecture is used to stop potential security breaches.
What is zero trust architecture?
In many ways, a zero trust architecture is exactly that - an architecture based on the principle that nothing can be trusted. Under this philosophy, no device, user or application attempting to interact with your architecture can be considered to be secure. Quite the opposite in fact, as your starting position is to see everything as a potential threat requiring verification.
‘Zero trust’ as a concept was first introduced by Forrester Research and is generally considered by organisations who want a high level of assurance when protecting sensitive data and responding to modern cyber threats.
The “never trust, always verify” principle
Security models conventionally operate on the assumption that all internal network activities can be trusted. However, traditional methods have done little to stem the flow of cyber attacks and insider threats, which means that a fresh approach is required. One such measure is to increase visibility into internal traffic and apply user context.
This can be achieved by using a next-generation firewall with decryption capabilities.
Security models are traditionally designed to protect the perimeter, leaving threats that enter the network uninspected, invisible and free to morph and move wherever they choose, often extracting valuable and sensitive business data.
Lateral movement security
The purpose of a zero trust architecture is to address lateral threat movement within a network by leveraging micro-segmentation and granular perimeters enforcement, based on data, user and location. This is also known as the “never trust, always verify” principle, determining zero trust.
The lateral movement represents the different techniques that attackers use to navigate through a network when searching for valuable assets and data. With traditional perimeter-based security, sub-perimeters are defined within networks by using a specific combination of rules. As an example, these rules may use the application traffic direction and context around a user to identify anomalies. When an anomaly occurs, the movement of a user or traffic direction is blocked. The spread of an attack within an organization is identified by the sub-perimeters.
The point of infiltration is most often not the target location of an attacker. This is why stopping lateral movement is a priority. Attackers that infiltrate an endpoint for example, often need to move laterally throughout the networking environment, in search of the data centre housing the targeted content.
How you define movement or access depends on the user and its defined appropriate or logical interactions and behaviour. Users from the marketing department for example, often have no access to sensitive financial files about the organisation, but would have access to CRM systems, marketing assets and content. Users from finance do have access to finance-related data sources, but not necessarily information from the human resources department or marketing department. This is why identifying who users are and whether their actions during a session are considered appropriate is so important, Which applications do they use or try to access? Are these sensible actions that fit with the user’s role and capabilities?
When these inspection points or junctions are not in place, it is close to impossible to identify and prevent unsanctioned access.
Developing a Zero Trust Architecture
- Gain visibility and context for all traffic – across user, device, location and application – by using zero trust in conjunction with zoning capabilities for visibility into internal traffic.
- Gain traffic visibility and context. Traffic needs to run through a next-generation firewall that has decryption capabilities. Next-Generation firewall protection acts as the ‘border control’ within your organisation and enables micro-segmentation of perimeters.
- Have the ability to monitor and verify traffic as it crosses between the different functions inside the network.
- Add Two Factor Authentication (2FA) or other verification methods such as biometric verification, that increase the ability to verify users.
- Implement a zero trust approach. This helps to identify business processes, data flows, users, data, and associated risks. It also helps to set policy rules which can be automatically updated based on associated risks, during every iteration.
- Learn more
NGFW Next-Generation Firewall solutions
Protect your network edge, data center, and cloud applications with next-generation physical, virtual, and containerized firewalls.
- Learn more
ZTNA Zero-Trust Network Access
Simple, automatic secure access that verifies who and what is on your network and secures application access no matter where users are located.
- Learn more
Network security solutions
Defend your network, data, and users with the fastest, most reliable cyber-attack protection available.
- Learn more
DDoS protection, prevention and mitigation have never been more critical.
- Learn more
Taking a holistic approach to DNS security.
Get in touch with our expertsOur team is ready for you
Do you want to know more about this topic? Leave a message or your number and we'll call you back. We are looking forward to helping you further.
Top five OT security threats
These OT Security threats provides an overview of critical and most common cyber threats to Operational Technology.
Multicloud Cloud security
How to protect your multicloud?
Protect your data across the multicloud and drive increased innovation and agility.
The 2 biggest network security threats this year
We dive deeper into what we believe are two of the most significant network security threats in 2021: DDoS and ransomware attacks.
The password problem
What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.
NGFW Palo Alto Networks
5 things you need to know about Palo Alto's PA-400 Series
The new PA-400 Series (NGFWs) are ideal for organisations in search of the lowest total cost of ownership (TCO), but wanting the best cybersecurity possible.
EDR NDR XDR MDR
EDR, NDR, XDR, MDR - Different concepts of Detection & Response
"Threat Detection & Response" is nowadays considered an indispensable means of securing corporate networks. We explain the difference between EDR, NDR, XDR and MDR.
Top 6 DDoS protection solutions that should be on your radar in 2021
Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS-attacks. These 6 should be on your radar in 2021! Find out more.
Cyber attacks Cloud security
Top cybersecurity threats to be aware of in 2021
Remote working, which is still the standard in 2021, brings new cybersecurity threats. These are the top threats of 2021.
Cyber attacks Security
Top cybersecurity companies to watch in 2021
We selected 6 top cybersecurity companies to watch in 2021, who have successfully differentiated themselves from other players in the market.
Double Trouble: Ransomware with Data Leak Extortion, Part 2
As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various criminal adversaries began innovating in this area. This includes collaboration between ransomware groups, auctioning leaked data and demanding not just one ransom for the ransomware decryptor but also a second ransom to ensure stolen data is deleted.
Top 5 best NGFW vendors of 2021
Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks continue to become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.
What to do against a ransomware attack?
As a company, you can already do a lot to counter ransomware attacks. One of the measures is the deployment of a Security Operations Center (SOC). Find out why and how!
Double Trouble: Ransomware with Data Leak Extortion, Part 1
As organizations improve their capabilities to rebound from ransomware attacks and security researchers continue to create decryptors for ransomware, there is less incentive for victims to pay the ransom in order to reclaim files. However, criminal actors have found a way to thwart these defensive measures.
Security survey says: Don’t wait until it’s broken to fix it
In the report, “Network security in the spotlight: Understanding why it can go wrong is key to making the right investment decisions”. The Register conducted a survey of network and security professionals examining what drives organizations to excel in the delivery of information security.
The importance of multi-factor authentication
Ethical hacker Victor Gevers reached news headlines this week as he managed to access president Donald Trump’s Twitter account for the second time.
Webinar: How CASB can protect your sensitive data
This is the last webinar in a serie of three cybertalk sessions. In this webinar Remco Hobo, Head of Cyber Security, explains how Cloud Access Security Broker (CASB) protects your sensitive data.
Webinar: Why DLP matters to your security strategy
This is the second webinar in a serie of three cybertalk sessions. In this webinar Sr. Solution Architect Cyber Security Kunal Biswas will simplify Data Loss Prevention (DLP).
SASE Juniper Networks
Implementing a SASE solution: it takes more than marketing
When implementing a SASE solution, there are important aspects to keep in mind according to Juniper. Having a cloud first mentality and a unique focus on user experience are key.
Webinar: Demystifying SASE
This is the first webinar in a serie of 3 cybertalk sessions. In this first webinar our Sr. Solution Architect Cyber Security will demystify SASE (Secure Access Service Edge).
Fortinet Recognized as a 2020 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure
Fortinet is named a 2020 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure for its best Secure SD-WAN solutions.
McAfee Named a 2020 Gartner Peer Insights Customers’ Choice for CASB
For the third year in a row, McAfee was named a 2020 Gartner Peer Insights Customers’ Choice for CASB with its MVISION Cloud solution.
The Industry’s Most Comprehensive SASE Just Got Better with CloudGenix
Palo Alto Networks bring Prisma Access and CloudGenix together, delivering one of the best SASE solutions
Top 5 Next-Generation NGFW Firewall Vendors 2020
Firewall technology has evolved significantly over the past decade. We review 5 of the best NGFW vendors for 2020, including advanced Next-Generation Firewall features to look for.
Building an Enterprise Grade SD-WAN
The next step in the evolution of connectivity services is having the best SD-WAN solution, where the underlying technology is not new, but rather the way in which it is managed is new.
5 reasons to consider a managed SOC service provider
When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.
Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce
Learn what six key factors can help ensure remote worker cybersecurity and how to adopt a remote workforce quickly.
How to manage your firewall operations
Enhance security, reduce service interruptions and automate day-to-day tasks through powerful firewall operations management capabilities and reporting.
Juniper Networks Network automation
Juniper Networks’ 2019 State of Network Automation Report
Discover the impact of network automation. This report reveals how today’s use of automation affects engineers, NetOps teams, and business.
5 ways to boost your cyber security in 2020
Finding the best cyber security solutions in 2020 starts by improving policies and strengthening existing security tools in use.
Security Managed services
Eight major benefits of having a Managed Security Services Provider (MSSP)
Managed Security Services Providers (MSSPs) provide structural security solutions against cyberattacks, including always up-to-date expertise in the latest cyber threats and appropriate solutions. Here's 8 benefits of the best MSSP to prevent cyberattacks and save costs.
Juniper Universal Services Framework for Security = Operational Consistency
Juniper announces the SPC3 security services card for MX240, MX480 and MX960 routers and Universal Services Framework.
Prevent lateral compromise with microsegmentation
Why network microsegmentation matters for network security and how it helps mitigate the spread of lateral compromise.
Why 5G Security and Interoperability must not be optional extras
Mobile Solutions Architect Ditri Trio elaborates on 5G Security and Interoperability challenges with existing 3G and 4G networks.
19 Cloud Security Best Practices for 2019
Mitigate risks to using any cloud service with these Cloud Security Best Practices. Cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy.
Rapid international expansion thanks to specialisation
Interview with Infradata Group CEO Nino Tomovski. About the international growth of Infradata Group, Cyber Security solutions and the importance of local expertise.
CrowdStrike Introduces Falcon Firewall Management for Cloud-Native Platform
Cloud-Native Falcon Firewall Management offers simple, cross-platform management of host/OS firewalls from the Falcon console, providing customers with enhanced protection from network threats.
The Dark Side of Governments: A Growing Threat of APT Groups
For most nation states, covert advanced persistent threat (APT) groups are an equally valuable tool that operate in the shadows, stealing data, disrupting operations, or destroying the infrastructure of targeted enemies.
Top 5 Network Security Solutions and Technologies
The 5 best Network security solutions and technologies that help define and guarantee business success. Unfortunately many enterprises do not know what network security solutions are essential to securing their network and data.
Endpoint security EDR
5 Endpoint Security Best Practices
Your Cyber Security strategy should include Endpoint Security, as it is one of the most critical components for network security. In this article, our experts sum up Endpoint Security best practices for the Enteprise.
Fortinet Wins SE Labs Best Network Security Appliance Award
Fortinet has been awarded the Best Network Security Appliance award from SE Labs – one of the most respected labs in the testing community. SE Labs has been testing FortiGate products for the past three years, and in addition to this accolade, have awarded a AAA rating to the FortiGate solution for the third year in a row.
Network security Enterprise networking
Top 5 Key Challenges for Network Security
We have compiled a list of key challenges regarding network security and cyberthreats, as numerous companies and governments are taking measures to ensure privacy and maintain security by preventing cyberattacks. Nevertheless, cybersecurity remains a constant and ongoing issue of considerable concern.
DDoS Attacks Growing Ever-More Sophisticated and Efficient
DDoS attacks in 2019 remain some of the most prevalent. Research of Forbes reports that there were 2,216 data breaches and more than 53,000 cyber security incidents in March 2018.
Mist Will Join Juniper Networks to Accelerate AI for IT Adoption
Five years ago, I had the good fortune of launching a new company with two luminaries in the networking space – Bob Friday and Brett Galloway. Together, we recognized that the world of IT was at an inflection point whereby the old, reactive way of delivering services needed to be replaced by a new model built on AI-driven automation and user insight.
Top 5 Endpoint Security Solutions of 2019
Here's the 5 best endpoint security solutions. Recent studies show that 30 percent of known breaches involved malware being installed on endpoints. Select an Endpoint Protection Selecting that fits your needs considering these vendors
Juniper Networks Acquires Mist Systems to Bring AI to IT
. With a shift from mere service management (ITSM) to strategic enabler, the very purpose of IT has changed. Where the past was about uptime in a largely static environment, the present is about user experience
Infradata delivers National Education Network security system to Poland
Infradata Polska will launch the NASK National Research Institute project for the delivery of the National Education Network (Ogólnopolska Sieć Edukacyjna, OSE) security infrastructure system. Infradata’s offer was selected in a tender. The project will ultimately cover 25.000 schools.
The 5 key IT security assessment types
Different IT Security Assessment types explained. Every day, digital attacks threaten the continuity of your business. Cybersecurity assessments accurately map out the threat.
Does size Matter? Capacity considerations when selecting a DDoS mitigation service
Internet pipes have gotten fatter in the last decade. We have gone from expensive 1 Mbps links to 1 Gbps links, which are available at a relatively low cost.
Cisco announces Wi-Fi 6 product portfolio
Cisco announced Wi-Fi 6 solutions and products for improved wireless connectivity this week. Besides the Wi-Fi 6 Access Points, Cisco also announced the Catalyst 9600 campus Core Switch purpose-built for cloud-scale networking.
Juniper Networks introduces SD-WAN as a Service solution
Juniper’s Contrail Service Orchestration now manages the full enterprise branch, campus and cloud SD-WAN, now adding branch security, LAN and Mist Learning WLAN
Establishing the Zero-Trust Cybersecurity Framework
The principle 'Zero-Trust' is one of the most integral security frameworks in recent times. Its crux lies in simplicity - a default deny for all flows and concept of minimal access. To effectively realize 'Zero Digital Trust' in your ecosystem here's what it entails.
Ransomware 'LockerGoga' wreaks havoc on Norway's Norsk Hydro
What is 'LockerGoga' ransomware and how did it infect Norway's Norsk Hydro? Read all about it in this blog.
Half of Top 12 Global Exploits Targeted IoT Devices
Fortinet announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras.
5G security: Challenges to overcome enabling new business models
As the world is about to start rolling out 5G networks, the question arises what the challenges will be to address 5G security and privacy concerns. In this blog René shares his thought on 5G security challenges and potential business benefits.
Juniper Networks expedites 5G Transformation for Service Providers
Juniper Networks continues to expand to address use cases across access, pre-aggregation and aggregation to assist in the transitions from 4G LTE to 5G. Includes ACX700 Universal Metro Routers, industry-first 400GbE native MACsec support and Triton Silicon-powered 14.4Tb line cards for the PTX10008
Palo Alto Networks
Palo Alto introduces 'fastest Next-Gen Firewall' with PA-7000 series
The Next Generation Firewall PA-7000 Series, enhanced with new network processing cards, offers threat prevention at speeds twice as fast as the nearest competitor,
Another coding example that turned into a malicious threat
Two days ago an example of bad code popped up in the security community when a programmer was reviewing 7Zip's code to see if it would suit his needs. 7Zip is a free open source software for compression and packing/unpacking of ZIP and GZIP formats.
What is zero touch provisioning and is it useful for me?
Zero Touch Provisioning or ZTP is a term that appears increasingly on the feature list of networking products. ZTP can be found in switches, wireless access points, (SD-WAN) routers, NFV-platforms and firewalls.
Global media company transforms network security with visibility and Network Access Control (NAC)
Infradata supports a leading media company to strengthen the security of the network through Network Access Control (NAC). With this security solution, the security policy for access to the entire network as well as endpoint security is greatly improved.
6 cybersecurity trends you need to know for 2019
With the continuous growth of new emerging technologies and innovative Cyber Security solutions being developed, we asked our Cyber Security experts: What are the 6 cyber security trends for 2019 to watch?
Arista to Demonstrate Any Cloud Networking for Kubernetes at KubeCon NA 2018
New solution uses Arista virtual and cEOS software instances to provide a uniform enterprise-class/cloud-grade routing platform with enhanced visibility and security features tied into OpenShift and Calico commercial enterprise platforms from Red Hat and Tigera.
Forcepoint Reveals Cyber Security Predictions for 2019
Forcepoint launched its Forcepoint Cyber Security Predictions 2019 Report . The report provides guidance on the sophisticated threats facing organizations in the months to come.
Symantec and Fortinet Partner to Deliver Cloud Security Service
Symantec and Fortinet announced an expansive partnership agreement today to provide customers with comprehensive and robust security solutions.
Pulse Secure expands Firewall Auto-provisioning and Behavioral Analytics for IIoT Security
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories.
Fortinet Introduces New Security Automation Capabilities on Amazon Web Services
Fortinet announced the expansion of its Fortinet Security Fabric offerings and new automation capabilities for AWS to provide streamlined and consistent security management for hybrid infrastructures.
Mirai: Not Just For IoT Anymore
Botmasters have taken the lessons from developing Internet of Things (IoT) malware and shifted their focus to targeting commodity Linux servers. Like many IoT devices, unpatched Linux servers linger on the network, and are being abused at scale by attackers sending exploits to every vulnerable server they can find.
2018 Holiday Season Mobile Malware Attacks Are Prevalent
Fortinet Threat Report Reveals Over One-quarter of Organizations Experienced a Mobile Malware Attack. Read more about the 2018 Cyber Security report by Fortinet here.
Dipping into the honeypot
Brute-forcing factory default usernames and passwords is a winning strategy for Internet of Things (IoT) botnet propagation. Research Analyst Matthew Bing dives into the details of IoT botnets.
The road to next level Data Loss Prevention
Data leaks happen constantly to many different organizations. We have examples of cases in which credit card data of hundreds of thousands of users was leaked, or disgruntled workers that copy sensitive data of the organization they want to leave, to later publish or sell that information in the external world, damaging users and businesses. There is no limit to the amount of data that can be leaked, nor to the amount of damage that can be done.
UK Government launches Code of Practice for IoT Security
The UK department for Digital, Culture, Media and Sport has launched a Code of Practice for consumer IoT security. The aim of the Code of Practice is to "support all parties involved in the development, manufacturing and retail of consumer IoT", as stated on the UK.gov website.
Why Mozilla Firefox's upcoming DoH update might be a mistake
"DoH does not solve a real problem. Contrary, it creates a problem." In his blog solution architect Hilmar Burghraaff dives into the potential risks of Mozilla moving DNS to HTTP over DNS.
Gartner and Forrester position Crowdstrike leader in endpoint security
Crowdstrike's cloud-delivered Endpoint protection solutions have been named a leader by Forrester and leads the visionary quadrant in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms.
Keep your network services up to date
DNS and IPAM are among the most fundamental pillars of network services. Networks are rapidly evolving, following trends in virtualisation, security, cloud, SDN, IPv6, and IoT.