Image credit: Thinkhubstudio/Getty
Can’t you attend Transform 2022? Check out all the summit sessions in our on-demand library now! look here.
Protects modern distributed networks, including privately hosted web applications, software as a service (SaaS) application applications Programs and resources, as well as the devices used to access web applications, continue to elude businesses, leading to data breaches, ransomware attacks, and more.
Most technology stacks are not designed to treat devices, personal identities, and web access points as security perimeters. Businesses need to improve Secure Service Access (SSA) by rapidly adopting the latest solutions to close cybersecurity gaps and protect applications and the data they use.
SSA is more relevant than ever as it demonstrates how businesses need to modify their cybersecurity technology stack into a single integrated platform, replacing multiple A la carte product.
“As enterprises look to reduce their attack surface by enhancing their security capabilities, they are faced with a bewildering array of alternatives. GigaOm Senior Industry Analyst Ivan McPhee told us, While some vendors offer a single integrated platform that provides end-to-end secure service access, others are repackaging existing point products, developing common UIs for multiple solutions, or conforming to acronyms Trend. Startup Beats. “Decision makers should go beyond marketecture [a marketing approach that simplifies the creation of an organization’s product or service while simultaneously Stick to Marketing Requirements] Find a robust, flexible and fully integrated solution that meets the unique needs of their organization regardless of network architecture, cloud infrastructure or user location and device. “
MetaBeat will be on October 4th Gathering thought leaders in San Francisco to provide guidance on how Metaverse technologies are changing the way all industries communicate and do business, CA.
Every multi-point product in a cybersecurity technology stack is another point of failure or worse, cybercriminals can exploit this implicit trust to gain access to applications within hours Programs and Networks. GigaOm’s new report (by Ericom Software) is a comprehensive assessment of the SSA landscape and vendor solutions.
Enterprises need to move their technology stacks from data-centric and edge-centric repositioning to focus on user identities, which can be achieved through the adoption of SSA. This is good news for businesses pursuing a zero trust strategy based on considering human and machine identities as their organization’s secure perimeter
“As attacks evolve and new devices are added at scale, organizations should look for SSA solutions that combine AI/ML [artificial intelligence and machine learning]-driven security capabilities to detect and block new and sophisticated threats in real time through behavior-based signatureless attack prevention and automated policy recommendations,” McPhee said.
GigaOm’s report details how SSA first evolved into Cloud-native, and layered security capabilities.
Designed to meet an organization’s specific cybersecurity needs, regardless of network architecture, cloud infrastructure, user location, or device. GigaOm Consider Cato Networks, Cloudflare, Ericom Software, and ZScaler to be the leaders in SSA today, all providing the core technologies that support the Zero Trust framework.
“Vendors will point to The speed at which scenarios or acquired capabilities are integrated into their SSA platforms varies widely—smaller vendors are often able to do this faster,” McPhee said. “As vendors work to establish themselves as leaders in the field , looking for vendors who have both a strong SSA platform and a clear roadmap covering the next 12-18 months.
McPhee continued, advising businesses not to “…be content with solutions from existing vendors. With new entrants and exciting innovations emerging, explore all options before creating a shortlist based on current and future capabilities, integration-as-a-service capabilities and in-house skills. “
The radar chart of GigaOm is in Each vendor’s characteristics are depicted on two axes—maturity, innovation, and functional play compared to Platform Play—while the length of the arrows represents the predicted evolution of the solution over the next 12 to 18 years.
Challenge Unmanaged Devices
One of the most challenging aspects of CISO and CIO access security is Bring Your Own Device (BYOD) and Unmanaged Devices (e.g., third-party contractors, consultants, etc.) The rate at which employees and contractors use personal devices for professional activities continues to grow at a record rate due to the pandemic and the widespread acceptance of the virtual workforce.
For example, BYOD usage has increased by 58% during the COVID-19 pandemic. Gartner predicts that up to 70% of enterprise software interactions will occur on mobile devices this year.
The end result is that device endpoints, identities and threat surfaces are being created faster and more complex than enterprises can keep up. Web applications and SaaS applications – such as enterprise resources Planning (ERP) systems, collaboration platforms, and virtual meetings – are popular attack vectors, with cybercriminals first focusing on disrupting networks, launching ransomware, and stealing data.
Unfortunately Yes, the traditional security controls that businesses use to combat these threats—web application firewalls (WAFs) and reverse proxies—have been proven to protect data, networks, and devices.
Against the backdrop of security challenges, GigaOm highlighted the web application isolation capabilities of Ericom’s ZTEdge platform as an innovative approach to BYOD and unmanaged device access security.
How Web Application Isolation Works
Unlike traditional WAFs that protect network perimeters, Web Application Isolation uses Remote Browser Isolation (RBI) to isolate networks and applications from malware on user devices.
IT departments and cybersecurity teams use application isolation to apply granular user-level policies to control which applications each user can access and which applications they are allowed to on how to complete and operate the application.
For example, policies can control file upload/download permissions, malware scanning, DLP scanning, restrict cut and paste functionality (clipboard), and restrict users’ ability to enter data to text field. The solution also “masks” the application’s attack surface from potential attackers, providing protection against the OWASP Top 10 Web Application Security Risks.
Ericom’s Web Application Isolation Approach (WAI) ) leverages their expertise in Remote Browser Isolation (RBI) and years of experience assisting SMBs with implementing Zero Trust programs and frameworks.
Secure Web Applications with Zero Trust
Secure Web Applications with Zero Trust
Need to improve simplifying techniques Stack and remove conflicting point solutions and leave endpoints unprotected, especially the devices of users and contractors. GigaOm’s Security Services Access Radar shows where and how leading vendors are bringing greater innovation to market.
Among the many new developments in this area, Web Application Isolation has been shown to improve BYOD security through a simplified web-based approach that requires no agents or software on the device great potential for sex.
The Mission of VentureBeat