{"id":160856,"date":"2022-05-11T05:00:18","date_gmt":"2022-05-11T12:00:18","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=160856"},"modified":"2022-05-10T17:56:37","modified_gmt":"2022-05-11T00:56:37","slug":"the-world-needs-ztna-2-0-for-todays-hybrid-workforce","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/05\/the-world-needs-ztna-2-0-for-todays-hybrid-workforce\/","title":{"rendered":"Why the World Needs ZTNA 2.0"},"content":{"rendered":"<p>Interest in Zero Trust has exploded recently, partly due to its catchy name and seemingly broad usage throughout the cyber security industry (Zero Trust washing?). But, there is also another more compelling reason for the rise in interest in Zero Trust \u2013 we really need it.<\/p>\n<p>When speaking with customers, many of them tell me they are struggling to get a handle on the risks associated with hybrid work and direct-to-app connectivity. The new reality is that our attack surfaces have expanded dramatically while cyberattacks continue to grow in volume and sophistication. The whack-a-mole approach of deploying a new tool for every type of application or threat makes security management and enforcement way too complex.<\/p>\n<p>Most organizations have discovered that old and clunky VPN-based solutions just don\u2019t cut it from a security and performance perspective. These legacy solutions have no concept of context and thus do not understand how to apply application, user or device-based, least privilege access. Instead, they give trusted access to entire network segments. In the world of hybrid work and cloud migration, legacy VPN is dead.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-zero-trust-network-access\">Zero Trust Network Access<\/a> (ZTNA) approaches emerged to address the challenges caused by legacy VPN. However, the first generation of products (which we call ZTNA 1.0) have proven more dangerous than helpful because of several critical limitations:<\/p>\n<ul>\n<li><strong>Too Much Access is Not Zero Trust \u2013 <\/strong>Supports only coarse-grained access controls while classifying applications based on L3\/L4 network constructs, such as IP address and port numbers. Thus, ZTNA 1.0 provides way too much access, especially for apps that use dynamic ports or IP addresses.<\/li>\n<li><strong>Allow and Ignore \u2013 <\/strong>Once access to an app is granted, that communication is then trusted forever. ZTNA 1.0 assumes that the user and the app will always behave in a trustworthy manner, which is a recipe for disaster.<\/li>\n<li><strong>Too Little Security \u2013<\/strong> Only supports a subset of private apps while unable to properly secure microservice-based, cloud-native apps \u2013 apps that use dynamic ports like voice and video apps, or server-initiated apps like Helpdesk and patching systems. Moreover, legacy ZTNA approaches completely ignore SaaS apps and have little to no visibility or control over data.<\/li>\n<\/ul>\n<p>Clearly, ZTNA 1.0 falls short on the promise of replacing legacy VPN. We need a different approach.<\/p>\n<h2><a id=\"post-160856-_pij5tq3slt9\"><\/a>Introducing ZTNA 2.0<\/h2>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6305811050112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>At Palo Alto Networks, we believe it\u2019s time to move towards a new approach we\u2019re calling ZTNA 2.0. Delivered from Prisma Access, ZTNA 2.0 is designed around an easy-to-use, unified security product. ZTNA 2.0 solves the shortcomings of ZTNA 1.0 by delivering the following:<\/p>\n<ul>\n<li><strong>Least Privilege Access <\/strong>\u2013 Achieved by identifying applications at layer 7, enabling precise access control at the app and sub-app levels, independent of network constructs like IP and port numbers.<\/li>\n<li><strong>Continuous Trust Verification<\/strong> \u2013 Once access to an app is granted, trust is continually assessed based on changes in device posture, user behavior and app behavior.<\/li>\n<li><strong>Continuous Security Inspection <\/strong>\u2013 Providing deep and ongoing inspection of all traffic, even for allowed connections, to prevent all threats including zero-day threats.<\/li>\n<li><strong>Protection of All Data <\/strong>\u2013 Providing consistent control of data across all apps used in the enterprise including private apps and SaaS, with a single DLP policy.<\/li>\n<li><strong>Security for All Apps<\/strong> \u2013 Safeguarding all applications used across the enterprise, including modern cloud-native apps, legacy private apps and SaaS apps. This includes apps that use dynamic ports and apps that leverage server-initiated connections.<\/li>\n<\/ul>\n<p>Today, work is no longer a place we go, but an activity we perform. At the height of the pandemic, many businesses focused on trying to scale their VPN infrastructure. When that didn\u2019t work, they quickly pivoted to the ZTNA 1.0 solution, only to discover it didn\u2019t live up to their expectations. ZTNA 2.0 is the necessary paradigm shift to overcome the existing limitations of ZTNA 1.0, and it is the right architecture to support your organization in the long term.<\/p>\n<p><a href=\"https:\/\/start.paloaltonetworks.com\/zero-trust-with-zero-exceptions\">Join me on June 15<\/a> where I\u2019ll be discussing in more depth how ZTNA 2.0 with Prisma Access can secure your hybrid workforce.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Customers are struggling to get a handle on the risks with hybrid work. ZTNA 2.0 is a unified security product that solves the shortcomings of ZTNA 1.0.<\/p>\n","protected":false},"author":3,"featured_media":160875,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6717],"tags":[7907,73,7135,8529],"coauthors":[1641],"class_list":["post-160856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-products-and-services","tag-hybrid-workforce","tag-zero-trust","tag-ztna","tag-ztna-2-0"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/05\/ztna-2.0-blog-image-4-400x300-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/160856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=160856"}],"version-history":[{"count":9,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/160856\/revisions"}],"predecessor-version":[{"id":160859,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/160856\/revisions\/160859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/160875"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=160856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=160856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=160856"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=160856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}