SlideShare a Scribd company logo
1 of 20
Download to read offline
| @ema_research
Moving Beyond Remote
Access: Discover the Power
of Zero Trust Network Access
Tim Roddy
Vice President of Marketing
Open Systems
Shamus McGillicuddy
Vice President of Research, Network Infrastructure
and Operations
Enterprise Management Associates (EMA)
smcgillicuddy@enterprisemanagement.com
| @ema_research 2
Watch the On-Demand Webinar
• Moving Beyond Remote Access: Discover the Power of Zero Trust
Network Access On-Demand Webinar:
https://info.enterprisemanagement.com/zero-trust-network-access-
webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
| @ema_research
| @ema_research
Featured Speakers
Shamus is a Vice President of Research at Enterprise
Management Associates (EMA), where he leads the
network infrastructure and operations practice. He
has nearly two decades of experience in the IT
industry. His research focuses on all aspects of
managing enterprise networks, including network
automation, AIOps-driven network operations, multi-
cloud networking, and WAN transformation.
Tim brings over 25 years of go-to-market strategy,
marketing, and partner expertise in cybersecurity,
software, cloud, and SaaS, including 15 years of
executive and leadership positions at iboss, Fidelis
Cybersecurity, McAfee, and Secure Computing. As
Vice President of Marketing for Open Systems, Tim is
responsible for global marketing strategy, branding,
messaging, communications, demand generation,
analyst relations, and partner marketing.
© 2023 Enterprise Management Associates, Inc. 3
Shamus McGillicuddy
Vice President of Research
EMA
Tim Roddy
Vice President of Marketing
Open Systems
| @ema_research
Factors That Drive
VPN to ZTNA
Migration
| @ema_research
| @ema_research
Hybrid Work
© 2023 Enterprise Management Associates, Inc. 5
85% of IT orgs:
Pandemic permanently expanded remote/hybrid work
19% Pre-pandemic 50% Post-pandemic
Remote workforce in the average enterprise
“After the pandemic, we expect about 70% of
people to go into the office only two or three days
a week. Another 15% will never go back.”
Network engineer
Fortune 500 insurance company
VPN challenges with hybrid work
• Scalability
• Network performance
• Security risk
Top root causes of home office
user complaints
1. Home Wi-Fi 29.8%
2. VPN concentrator 29.5%
3. WAN edge device (modem,
router) 29.5%
| @ema_research
| @ema_research
Multi-Cloud Networks
© 2023 Enterprise Management Associates, Inc. 6
88% of companies will be multi-cloud by 2024
47% will have three or more providers
“There is no one tool that can identify all of our
[cloud-based] VPN clusters and draw a picture to
show us our weaker management controls and
where our weaker policies need to be adjusted.”
Security operations manager
$4 billion media company
VPN challenges with multi-cloud
• Hub-and-spoke networks are history
• Concentrators in data centers add
latency
• VPN services from cloud providers
are bandwidth limited
Security risk is the #1 pain point in multi-cloud networks
Only 12% report no difficulty with consistently managing
network security policies across providers
| @ema_research
| @ema_research
41% of network teams:
zero trust security is shaping our overall
operational strategies
Mainstreaming of Zero Trust
© 2023 Enterprise Management Associates, Inc. 7
IT operations agility
Improved GRC
Breach prevention/containment
Reduced attack surface
Unauthorized access mitigation
Increased business agility/innovation
Cloud enablement
Business benefits that IT orgs expect from zero trust
40%
35%
34%
31%
28%
26%
23%
69% of orgs engaged with zero trust:
we have replaced or plan to replace our
legacy remote access solutions
| @ema_research
Understanding and
Succeeding With
ZTNA
| @ema_research
| @ema_research
Challenges to Zero Trust Initiatives
© 2023 Enterprise Management Associates, Inc. 9
Silo Conflicts in Detail:
68% of enterprises report zero trust
prompts closer collaboration
between NetOps and SecOps groups
“[Zero trust] is going to be highly collaborative, and I see us having issues
there. Security will come to us and say, ‘We want to do X.’ Okay, great.
What does that mean? We’re not sure. And who is going to pay for it?”
Budget 32%
Project complexity 31%
Skills gaps 31%
Conflicts between NetOps and SecOps 29%
Fragmented zero trust solutions 27%
Top 5 Issues
1
2
3
4
5
IT director
Fortune 500 health care company
| @ema_research
| @ema_research
Challenge users to reauthenticate based on
policies, observed activity 56%
Continuous monitoring of network activity 44%
Multi-variable authentication policy design (ID,
device, security status, etc.) 43%
Ability to authenticate every device, user, and
application connection 39%
Risk reduction via granular segmentation 34%
Cloud-based remote access solution
(PoPs close to users and apps)
Centralized management of policy design/enforcement
Adaptive, multi-variable authentication
Least-privilege access – access what you need and
nothing more via segmentation
Continuous monitoring and reauthentication mechanism
EMA Research:
IT expectations for zero trust solutions
ZTNA Defined
ZTNA: What You Need Know
© 2023 Enterprise Management Associates, Inc. 10
1
2
3
4
5
| @ema_research
| @ema_research
ZTNA Platform Requirements
© 2023 Enterprise Management Associates, Inc. 11
Performance/Scalability
Access visibility and analytics
Hybrid multi-cloud support
User and endpoint compliance
Deployment flexibility
User experience
NetOps pros ranked their top requirements for ZTNA solutions
1
2
3
4
5
6
| @ema_research
The Future of ZTNA: SASE
EMA Research: Top SASE priorities
Cloud-based network security
ZTNA/remote access
Secure access service edge is a unified platform for:
• Software-defined WAN
• Secure service edge (SWG, CASB, FWaaS)
• ZTNA
1
2
© 2023 Enterprise Management Associates, Inc. 12
| @ema_research
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 13
OPEN SYSTEMS
Zero Trust Network
Access
Connect any user to any app, from anywhere
Tim Roddy
June 28, 2023
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 14
The Challenges and the Solution
Public Cloud
Today’s Challenges
Internet
Remote Users SaaS Apps
Data
Systems
& Servers
Applicatio
ns
On-prem Environment
On-site Users
Apps Data
Systems /
Servers
ISP
Prod
Public Cloud
Our Approach
Internet
Remote Users SaaS Apps
Data
Systems
& Servers
Applicatio
ns
On-prem Environment
On-site Users
Apps Data
Systems /
Servers
ISP
LAN FW
ZTNA
OT FW
ZTNA
SD-WAN
Backbone
SSE
Regional Hub
ZTNA
CASB
SWG FWaaS
SWG
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 15
Security Service Edge (SSE)
Public Cloud
Internet
Remote Users SaaS Apps
Data
Systems
& Servers
Applicatio
ns
On-prem Environment
On-site Users
Apps Data
Systems /
Servers
ISP
OT & IIoT
SSE
Regional Hub
SWG
ZTNA
CASB
SSE – the one and single entry point for your
users
• Protected Internet access with SWG
• Controlled access to corporate apps, systems,
and server with ZTNA
• Controlled SaaS access with CASB
Central policy enforced for all
Consistent user experience
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 16
Open Systems Security Service Edge (SSE)
SDPaaS
Virtual SDP
Physical SDP
SD-WAN SSE • 3 deployment options
to match your
environment and
requirements
• Evolves with you in
your digital
transformation
journey
Hardware in your premises VM in your cloud tenant Open Systems PoPs
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 17
17
Open Systems Benefits
Public Cloud
Internet
Remote Users SaaS Apps
Data
Systems
& Servers
Applicatio
ns
On-prem Environment
On-site Users
Apps Data
Systems /
Servers
ISP
LAN FW
ZTNA
OT FW
ZTNA
SSE
Regional Hub
ZTNA
CASB
SWG FWaaS
SWG
Benefits
Simplified and standardized
Flexible deployment options
TCO reduction
One security policy enforced
Consistent user experience
Secure connectivity really made simple
SD-WAN
Backbone
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 18
Users, Devices
Open Systems ZTNA – Never Trust, Always Verify
Overall Definition
Zero trust network access (ZTNA) is a security architecture where only traffic from authenticated and authorized users, endpoints, and
applications is granted access to other users, endpoints, and applications.
Any Device
Any Location
Any User
Identity Device
Headquarter / Data Center
IaaS, SaaS
Any User
Any Device
Any Location
User Context-based Access Control
Continuous Validation
Zero Trust Any Corporate Application
Anywhere
Apps
ZTNA
Other
Context
Endpoint
Verification
Risk Location Time
On-premises
Apps, Desktops, Servers
Files
Data
Servers
Legacy Applications
Corporate Applications
Remote Apps & VDI
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 19
Open Systems by the numbers
Years of innovating
for customers
30
Delivering services
in 180+ countries
180+
Years average
customer tenure
7.5
Customers
130+ Users
1.5M+
Net promoter score
63
Enterprise
retention rate
97%
“With Open Systems’
help we can securely
manage a global
network of 170 sites
with 2 full-time
employees only.”
Alex Henneberg
IT Network Engineer & Project Manager
CLAAS
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 20
• Download our Quick Guide to ZTNA
• https://go.open-systems.com/ztna-guide or
Learn more about ZTNA
20

More Related Content

Similar to Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access

cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Sergiy Pitel
 

Similar to Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access (20)

NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market
 
Building a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network AutomationBuilding a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network Automation
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 

More from Enterprise Management Associates

More from Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
AI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network ManagementAI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network Management
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access

  • 1. | @ema_research Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access Tim Roddy Vice President of Marketing Open Systems Shamus McGillicuddy Vice President of Research, Network Infrastructure and Operations Enterprise Management Associates (EMA) smcgillicuddy@enterprisemanagement.com
  • 2. | @ema_research 2 Watch the On-Demand Webinar • Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access On-Demand Webinar: https://info.enterprisemanagement.com/zero-trust-network-access- webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch © 2023 Enterprise Management Associates, Inc.
  • 3. | @ema_research | @ema_research Featured Speakers Shamus is a Vice President of Research at Enterprise Management Associates (EMA), where he leads the network infrastructure and operations practice. He has nearly two decades of experience in the IT industry. His research focuses on all aspects of managing enterprise networks, including network automation, AIOps-driven network operations, multi- cloud networking, and WAN transformation. Tim brings over 25 years of go-to-market strategy, marketing, and partner expertise in cybersecurity, software, cloud, and SaaS, including 15 years of executive and leadership positions at iboss, Fidelis Cybersecurity, McAfee, and Secure Computing. As Vice President of Marketing for Open Systems, Tim is responsible for global marketing strategy, branding, messaging, communications, demand generation, analyst relations, and partner marketing. © 2023 Enterprise Management Associates, Inc. 3 Shamus McGillicuddy Vice President of Research EMA Tim Roddy Vice President of Marketing Open Systems
  • 4. | @ema_research Factors That Drive VPN to ZTNA Migration
  • 5. | @ema_research | @ema_research Hybrid Work © 2023 Enterprise Management Associates, Inc. 5 85% of IT orgs: Pandemic permanently expanded remote/hybrid work 19% Pre-pandemic 50% Post-pandemic Remote workforce in the average enterprise “After the pandemic, we expect about 70% of people to go into the office only two or three days a week. Another 15% will never go back.” Network engineer Fortune 500 insurance company VPN challenges with hybrid work • Scalability • Network performance • Security risk Top root causes of home office user complaints 1. Home Wi-Fi 29.8% 2. VPN concentrator 29.5% 3. WAN edge device (modem, router) 29.5%
  • 6. | @ema_research | @ema_research Multi-Cloud Networks © 2023 Enterprise Management Associates, Inc. 6 88% of companies will be multi-cloud by 2024 47% will have three or more providers “There is no one tool that can identify all of our [cloud-based] VPN clusters and draw a picture to show us our weaker management controls and where our weaker policies need to be adjusted.” Security operations manager $4 billion media company VPN challenges with multi-cloud • Hub-and-spoke networks are history • Concentrators in data centers add latency • VPN services from cloud providers are bandwidth limited Security risk is the #1 pain point in multi-cloud networks Only 12% report no difficulty with consistently managing network security policies across providers
  • 7. | @ema_research | @ema_research 41% of network teams: zero trust security is shaping our overall operational strategies Mainstreaming of Zero Trust © 2023 Enterprise Management Associates, Inc. 7 IT operations agility Improved GRC Breach prevention/containment Reduced attack surface Unauthorized access mitigation Increased business agility/innovation Cloud enablement Business benefits that IT orgs expect from zero trust 40% 35% 34% 31% 28% 26% 23% 69% of orgs engaged with zero trust: we have replaced or plan to replace our legacy remote access solutions
  • 9. | @ema_research | @ema_research Challenges to Zero Trust Initiatives © 2023 Enterprise Management Associates, Inc. 9 Silo Conflicts in Detail: 68% of enterprises report zero trust prompts closer collaboration between NetOps and SecOps groups “[Zero trust] is going to be highly collaborative, and I see us having issues there. Security will come to us and say, ‘We want to do X.’ Okay, great. What does that mean? We’re not sure. And who is going to pay for it?” Budget 32% Project complexity 31% Skills gaps 31% Conflicts between NetOps and SecOps 29% Fragmented zero trust solutions 27% Top 5 Issues 1 2 3 4 5 IT director Fortune 500 health care company
  • 10. | @ema_research | @ema_research Challenge users to reauthenticate based on policies, observed activity 56% Continuous monitoring of network activity 44% Multi-variable authentication policy design (ID, device, security status, etc.) 43% Ability to authenticate every device, user, and application connection 39% Risk reduction via granular segmentation 34% Cloud-based remote access solution (PoPs close to users and apps) Centralized management of policy design/enforcement Adaptive, multi-variable authentication Least-privilege access – access what you need and nothing more via segmentation Continuous monitoring and reauthentication mechanism EMA Research: IT expectations for zero trust solutions ZTNA Defined ZTNA: What You Need Know © 2023 Enterprise Management Associates, Inc. 10 1 2 3 4 5
  • 11. | @ema_research | @ema_research ZTNA Platform Requirements © 2023 Enterprise Management Associates, Inc. 11 Performance/Scalability Access visibility and analytics Hybrid multi-cloud support User and endpoint compliance Deployment flexibility User experience NetOps pros ranked their top requirements for ZTNA solutions 1 2 3 4 5 6
  • 12. | @ema_research The Future of ZTNA: SASE EMA Research: Top SASE priorities Cloud-based network security ZTNA/remote access Secure access service edge is a unified platform for: • Software-defined WAN • Secure service edge (SWG, CASB, FWaaS) • ZTNA 1 2 © 2023 Enterprise Management Associates, Inc. 12 | @ema_research
  • 13. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 13 OPEN SYSTEMS Zero Trust Network Access Connect any user to any app, from anywhere Tim Roddy June 28, 2023
  • 14. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 14 The Challenges and the Solution Public Cloud Today’s Challenges Internet Remote Users SaaS Apps Data Systems & Servers Applicatio ns On-prem Environment On-site Users Apps Data Systems / Servers ISP Prod Public Cloud Our Approach Internet Remote Users SaaS Apps Data Systems & Servers Applicatio ns On-prem Environment On-site Users Apps Data Systems / Servers ISP LAN FW ZTNA OT FW ZTNA SD-WAN Backbone SSE Regional Hub ZTNA CASB SWG FWaaS SWG
  • 15. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 15 Security Service Edge (SSE) Public Cloud Internet Remote Users SaaS Apps Data Systems & Servers Applicatio ns On-prem Environment On-site Users Apps Data Systems / Servers ISP OT & IIoT SSE Regional Hub SWG ZTNA CASB SSE – the one and single entry point for your users • Protected Internet access with SWG • Controlled access to corporate apps, systems, and server with ZTNA • Controlled SaaS access with CASB Central policy enforced for all Consistent user experience
  • 16. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 16 Open Systems Security Service Edge (SSE) SDPaaS Virtual SDP Physical SDP SD-WAN SSE • 3 deployment options to match your environment and requirements • Evolves with you in your digital transformation journey Hardware in your premises VM in your cloud tenant Open Systems PoPs
  • 17. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 17 17 Open Systems Benefits Public Cloud Internet Remote Users SaaS Apps Data Systems & Servers Applicatio ns On-prem Environment On-site Users Apps Data Systems / Servers ISP LAN FW ZTNA OT FW ZTNA SSE Regional Hub ZTNA CASB SWG FWaaS SWG Benefits Simplified and standardized Flexible deployment options TCO reduction One security policy enforced Consistent user experience Secure connectivity really made simple SD-WAN Backbone
  • 18. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 18 Users, Devices Open Systems ZTNA – Never Trust, Always Verify Overall Definition Zero trust network access (ZTNA) is a security architecture where only traffic from authenticated and authorized users, endpoints, and applications is granted access to other users, endpoints, and applications. Any Device Any Location Any User Identity Device Headquarter / Data Center IaaS, SaaS Any User Any Device Any Location User Context-based Access Control Continuous Validation Zero Trust Any Corporate Application Anywhere Apps ZTNA Other Context Endpoint Verification Risk Location Time On-premises Apps, Desktops, Servers Files Data Servers Legacy Applications Corporate Applications Remote Apps & VDI
  • 19. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 19 Open Systems by the numbers Years of innovating for customers 30 Delivering services in 180+ countries 180+ Years average customer tenure 7.5 Customers 130+ Users 1.5M+ Net promoter score 63 Enterprise retention rate 97% “With Open Systems’ help we can securely manage a global network of 170 sites with 2 full-time employees only.” Alex Henneberg IT Network Engineer & Project Manager CLAAS
  • 20. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 20 • Download our Quick Guide to ZTNA • https://go.open-systems.com/ztna-guide or Learn more about ZTNA 20