{"id":163649,"date":"2022-06-15T10:16:03","date_gmt":"2022-06-15T17:16:03","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=163649"},"modified":"2022-06-15T10:16:03","modified_gmt":"2022-06-15T17:16:03","slug":"ztna-1-0-cant-secure-all-apps","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/06\/ztna-1-0-cant-secure-all-apps\/","title":{"rendered":"ZTNA 1.0 Has an App Problem \u2014 It Can\u2019t Secure All Apps"},"content":{"rendered":"<h3><a id=\"post-163649-_v8b3cp7bycli\"><\/a>ZTNA 2.0 Protects All Enterprise Applications, Including Private Apps, Cloud Apps and SaaS<\/h3>\n<p><em>This is the final post of \u201c<\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ztna-straight-talk\/\"><em>ZTNA Straight Talk,<\/em><\/a><em>\u201d a 5-part series where we take a closer look at the five tenets of ZTNA 2.0, the new standard for securing access.<\/em><\/p>\n<p>It\u2019s no secret that the modern workforce relies on a plethora of applications to conduct practically all of their work. From video conferencing to document collaboration, instant messaging and CRM, the list goes on and on. Regardless of where these apps are hosted, workers require seamless, high-performance access to all of them.<\/p>\n<p>Security practitioners are tasked with keeping users, assets, apps and data safe. The promise of <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-zero-trust-network-access-ztna\">Zero Trust Network Access<\/a> (ZTNA) \u2013 providing access for a user to an application rather than broad access to a network \u2013 is supposed to help alleviate the challenges of achieving this. However, as we discussed previously, the implementation of ZTNA 1.0 has fundamental flaws. In addition to those mentioned previously, ZTNA 1.0 fails to enable consistent security because it only works with a subset of applications that the enterprise relies on.<\/p>\n<h2><a id=\"post-163649-_3ag5y2xisia1\"><\/a>ZTNA 1.0 Is Unable to Secure All Apps<\/h2>\n<p>The vision of consistent, fine-grained access to all applications can\u2019t be achieved with ZTNA 1.0. That\u2019s because ZTNA 1.0 solutions don\u2019t secure all apps. They don\u2019t support cloud-based apps or other apps that use dynamic ports or server-initiated applications \u2013 like support help desk apps that employ server-initiated connections to remote devices. ZTNA 1.0 solutions don\u2019t support SaaS apps, either.<\/p>\n<p>Modern, cloud-native apps are often comprised of many containers of microservices, often using dynamic IP addresses and port numbers. Implementing ZTNA 1.0 for this type of application is a recipe for disaster. ZTNA 1.0 becomes completely ineffective for these sorts of app constructs because it provides access to a broad range of IPs and ports, exposing the organization to additional risk and defeating the point of Zero Trust.<\/p>\n<p>As more and more organizations continue on their cloud journey and run their businesses on cloud-native applications, ZTNA 1.0 will become obsolete.<\/p>\n<h2><a id=\"post-163649-_z0d31rjifdn8\"><\/a>ZTNA 2.0 Provides Consistent Security for All Apps<\/h2>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6307568396112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<p>While legacy ZTNA solutions only address a fraction of enterprise apps, <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-zero-trust-network-access-2-0\">ZTNA 2.0<\/a> will secure all apps, regardless of where they\u2019re hosted. It can be a modern cloud-native microservices-based application that doesn\u2019t get restricted by IPs and ports, a SaaS app, a traditional private app or legacy app.<\/p>\n<p>ZTNA 2.0, delivered by <a href=\"https:\/\/www.paloaltonetworks.com\/sase\/access\">Prisma Access<\/a>, provides superior security while delivering uncompromised performance and exceptional user experiences, all from a single unified approach. It is purpose-built on a truly <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/sase\/elevating-sase-availability-with-multi-cloud-redundancy-on-prisma-access\/\">cloud-native architecture<\/a> to secure today\u2019s digital enterprises at cloud scale, providing uncompromised performance backed by leading SLAs that deliver exceptional user experience. Being completely software-based and hardware neutral, auto-scaling allows Prisma Access to keep up with changing hybrid workforce and evolving business demands without requiring manual interactions or processes.<\/p>\n<h2><a id=\"post-163649-_lowwz99l66r\"><\/a>ZTNA 2.0 Is Zero Trust with Zero Exceptions<\/h2>\n<p>Pursuing a true Zero Trust posture is a journey, and providing consistent security and control across all apps, regardless of where they are hosted or accessed from is an important step. That\u2019s why securing all apps used in the enterprise, including modern apps and SaaS, is a core pillar of ZTNA 2.0.<\/p>\n<p>Watch our special <a href=\"https:\/\/start.paloaltonetworks.com\/zero-trust-with-zero-exceptions\">launch event<\/a> where we discuss innovations and best practices for securing the hybrid workforce with ZTNA 2.0 and Prisma Access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While legacy ZTNA 1.0 solutions only address a fraction of enterprise apps, ZTNA 2.0 will secure all apps consistently, regardless of where they\u2019re hosted.<\/p>\n","protected":false},"author":723,"featured_media":163650,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6717],"tags":[644,8529,8541],"coauthors":[7209],"class_list":["post-163649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-products-and-services","tag-application-security","tag-ztna-2-0","tag-ztna-straight-talk","sase_category-product-features"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/Tablet-Scrolling.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=163649"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163649\/revisions"}],"predecessor-version":[{"id":163665,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163649\/revisions\/163665"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/163650"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=163649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=163649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=163649"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=163649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}