Successfully Implement Zero Trust to Secure Hybrid Environments

This post was originally published on Network Computing

Zero Trust has become a standard approach for many organizations to secure network access for their remote workers. Based on the principle that no user, device, or application can be trusted by default, the security framework has seen rapid adoption.

However, the nature of work is changing in this post-pandemic era, and there has been a dramatic rise in hybrid work. Today, employees regularly work both in the office and remotely. Recent reports show that by the end of 2022, 53% of U.S. workers were engaging in this “hybrid” work model.

Unfortunately, current Zero Trust Network Access (ZTNA) models have yet to adapt to this changed reality. While they have proven to be valuable for protecting remote workers, this approach only covers part of the problem. Today’s ZTNA solutions for remote workers are cloud-delivered, and they typically become inactive when the user is onsite, thereby reverting to less secure, perimeter-based security approaches in the LAN. This presents a major challenge in today’s hybrid work world, where organizations would like to extend the security benefits of Zero Trust to all employees, not just their remote workers.

What is Zero Trust Network Access (ZTNA)?

In brief, the concept of Zero

Read the rest of this post, which was originally published on Network Computing.

Previous Post

Don’t just assume the edge network will be available – VMware

Next Post

How Data Dictates Formula One Race Car Designs