More Related Content Similar to Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access (20) More from Enterprise Management Associates (20) Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access1. | @ema_research
Moving Beyond Remote
Access: Discover the Power
of Zero Trust Network Access
Tim Roddy
Vice President of Marketing
Open Systems
Shamus McGillicuddy
Vice President of Research, Network Infrastructure
and Operations
Enterprise Management Associates (EMA)
smcgillicuddy@enterprisemanagement.com
2. | @ema_research 2
Watch the On-Demand Webinar
• Moving Beyond Remote Access: Discover the Power of Zero Trust
Network Access On-Demand Webinar:
https://info.enterprisemanagement.com/zero-trust-network-access-
webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
3. | @ema_research
| @ema_research
Featured Speakers
Shamus is a Vice President of Research at Enterprise
Management Associates (EMA), where he leads the
network infrastructure and operations practice. He
has nearly two decades of experience in the IT
industry. His research focuses on all aspects of
managing enterprise networks, including network
automation, AIOps-driven network operations, multi-
cloud networking, and WAN transformation.
Tim brings over 25 years of go-to-market strategy,
marketing, and partner expertise in cybersecurity,
software, cloud, and SaaS, including 15 years of
executive and leadership positions at iboss, Fidelis
Cybersecurity, McAfee, and Secure Computing. As
Vice President of Marketing for Open Systems, Tim is
responsible for global marketing strategy, branding,
messaging, communications, demand generation,
analyst relations, and partner marketing.
© 2023 Enterprise Management Associates, Inc. 3
Shamus McGillicuddy
Vice President of Research
EMA
Tim Roddy
Vice President of Marketing
Open Systems
5. | @ema_research
| @ema_research
Hybrid Work
© 2023 Enterprise Management Associates, Inc. 5
85% of IT orgs:
Pandemic permanently expanded remote/hybrid work
19% Pre-pandemic 50% Post-pandemic
Remote workforce in the average enterprise
“After the pandemic, we expect about 70% of
people to go into the office only two or three days
a week. Another 15% will never go back.”
Network engineer
Fortune 500 insurance company
VPN challenges with hybrid work
• Scalability
• Network performance
• Security risk
Top root causes of home office
user complaints
1. Home Wi-Fi 29.8%
2. VPN concentrator 29.5%
3. WAN edge device (modem,
router) 29.5%
6. | @ema_research
| @ema_research
Multi-Cloud Networks
© 2023 Enterprise Management Associates, Inc. 6
88% of companies will be multi-cloud by 2024
47% will have three or more providers
“There is no one tool that can identify all of our
[cloud-based] VPN clusters and draw a picture to
show us our weaker management controls and
where our weaker policies need to be adjusted.”
Security operations manager
$4 billion media company
VPN challenges with multi-cloud
• Hub-and-spoke networks are history
• Concentrators in data centers add
latency
• VPN services from cloud providers
are bandwidth limited
Security risk is the #1 pain point in multi-cloud networks
Only 12% report no difficulty with consistently managing
network security policies across providers
7. | @ema_research
| @ema_research
41% of network teams:
zero trust security is shaping our overall
operational strategies
Mainstreaming of Zero Trust
© 2023 Enterprise Management Associates, Inc. 7
IT operations agility
Improved GRC
Breach prevention/containment
Reduced attack surface
Unauthorized access mitigation
Increased business agility/innovation
Cloud enablement
Business benefits that IT orgs expect from zero trust
40%
35%
34%
31%
28%
26%
23%
69% of orgs engaged with zero trust:
we have replaced or plan to replace our
legacy remote access solutions
9. | @ema_research
| @ema_research
Challenges to Zero Trust Initiatives
© 2023 Enterprise Management Associates, Inc. 9
Silo Conflicts in Detail:
68% of enterprises report zero trust
prompts closer collaboration
between NetOps and SecOps groups
“[Zero trust] is going to be highly collaborative, and I see us having issues
there. Security will come to us and say, ‘We want to do X.’ Okay, great.
What does that mean? We’re not sure. And who is going to pay for it?”
Budget 32%
Project complexity 31%
Skills gaps 31%
Conflicts between NetOps and SecOps 29%
Fragmented zero trust solutions 27%
Top 5 Issues
1
2
3
4
5
IT director
Fortune 500 health care company
10. | @ema_research
| @ema_research
Challenge users to reauthenticate based on
policies, observed activity 56%
Continuous monitoring of network activity 44%
Multi-variable authentication policy design (ID,
device, security status, etc.) 43%
Ability to authenticate every device, user, and
application connection 39%
Risk reduction via granular segmentation 34%
Cloud-based remote access solution
(PoPs close to users and apps)
Centralized management of policy design/enforcement
Adaptive, multi-variable authentication
Least-privilege access – access what you need and
nothing more via segmentation
Continuous monitoring and reauthentication mechanism
EMA Research:
IT expectations for zero trust solutions
ZTNA Defined
ZTNA: What You Need Know
© 2023 Enterprise Management Associates, Inc. 10
1
2
3
4
5
11. | @ema_research
| @ema_research
ZTNA Platform Requirements
© 2023 Enterprise Management Associates, Inc. 11
Performance/Scalability
Access visibility and analytics
Hybrid multi-cloud support
User and endpoint compliance
Deployment flexibility
User experience
NetOps pros ranked their top requirements for ZTNA solutions
1
2
3
4
5
6
12. | @ema_research
The Future of ZTNA: SASE
EMA Research: Top SASE priorities
Cloud-based network security
ZTNA/remote access
Secure access service edge is a unified platform for:
• Software-defined WAN
• Secure service edge (SWG, CASB, FWaaS)
• ZTNA
1
2
© 2023 Enterprise Management Associates, Inc. 12
| @ema_research
13. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 13
OPEN SYSTEMS
Zero Trust Network
Access
Connect any user to any app, from anywhere
Tim Roddy
June 28, 2023
14. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 14
The Challenges and the Solution
Public Cloud
Today’s Challenges
Internet
Remote Users SaaS Apps
Data
Systems
& Servers
Applicatio
ns
On-prem Environment
On-site Users
Apps Data
Systems /
Servers
ISP
Prod
Public Cloud
Our Approach
Internet
Remote Users SaaS Apps
Data
Systems
& Servers
Applicatio
ns
On-prem Environment
On-site Users
Apps Data
Systems /
Servers
ISP
LAN FW
ZTNA
OT FW
ZTNA
SD-WAN
Backbone
SSE
Regional Hub
ZTNA
CASB
SWG FWaaS
SWG
15. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 15
Security Service Edge (SSE)
Public Cloud
Internet
Remote Users SaaS Apps
Data
Systems
& Servers
Applicatio
ns
On-prem Environment
On-site Users
Apps Data
Systems /
Servers
ISP
OT & IIoT
SSE
Regional Hub
SWG
ZTNA
CASB
SSE – the one and single entry point for your
users
• Protected Internet access with SWG
• Controlled access to corporate apps, systems,
and server with ZTNA
• Controlled SaaS access with CASB
Central policy enforced for all
Consistent user experience
16. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 16
Open Systems Security Service Edge (SSE)
SDPaaS
Virtual SDP
Physical SDP
SD-WAN SSE • 3 deployment options
to match your
environment and
requirements
• Evolves with you in
your digital
transformation
journey
Hardware in your premises VM in your cloud tenant Open Systems PoPs
17. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 17
17
Open Systems Benefits
Public Cloud
Internet
Remote Users SaaS Apps
Data
Systems
& Servers
Applicatio
ns
On-prem Environment
On-site Users
Apps Data
Systems /
Servers
ISP
LAN FW
ZTNA
OT FW
ZTNA
SSE
Regional Hub
ZTNA
CASB
SWG FWaaS
SWG
Benefits
Simplified and standardized
Flexible deployment options
TCO reduction
One security policy enforced
Consistent user experience
Secure connectivity really made simple
SD-WAN
Backbone
18. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 18
Users, Devices
Open Systems ZTNA – Never Trust, Always Verify
Overall Definition
Zero trust network access (ZTNA) is a security architecture where only traffic from authenticated and authorized users, endpoints, and
applications is granted access to other users, endpoints, and applications.
Any Device
Any Location
Any User
Identity Device
Headquarter / Data Center
IaaS, SaaS
Any User
Any Device
Any Location
User Context-based Access Control
Continuous Validation
Zero Trust Any Corporate Application
Anywhere
Apps
ZTNA
Other
Context
Endpoint
Verification
Risk Location Time
On-premises
Apps, Desktops, Servers
Files
Data
Servers
Legacy Applications
Corporate Applications
Remote Apps & VDI
19. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 19
Open Systems by the numbers
Years of innovating
for customers
30
Delivering services
in 180+ countries
180+
Years average
customer tenure
7.5
Customers
130+ Users
1.5M+
Net promoter score
63
Enterprise
retention rate
97%
“With Open Systems’
help we can securely
manage a global
network of 170 sites
with 2 full-time
employees only.”
Alex Henneberg
IT Network Engineer & Project Manager
CLAAS
20. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 20
• Download our Quick Guide to ZTNA
• https://go.open-systems.com/ztna-guide or
Learn more about ZTNA
20