New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

SDP solutions are true ZTNA solutions: They trust no one

New York Tech Editorial Team by New York Tech Editorial Team
March 2, 2022
in Cybersecurity
0
SDP solutions are true ZTNA solutions: They trust no one
Share on FacebookShare on Twitter

In this interview with Help Net Security, Alissa Knight, cybersecurity influencer and partner at Knight Ink, explains why organizations should switch to SDP as opposed to VPN, and how this approach can help boost their cybersecurity posture.

SDP VPN

As the pandemic forced companies to go remote, they increasingly relied on VPNs. How did this risky strategy impact them?

The fact of the matter is history has proven to us that VPNs are vulnerable to compromise – the VPNs themselves because of vulnerabilities in their code or traditional attacks like account takeover (ATO) when multifactor authentication isn’t enabled.

In addition, the pandemic forced companies to quickly issue VPN licenses to their entire workforce or, in the absence of VPNs in place, even deployed remote desktop protocol (RDP) servers, which is even worse. As a matter of fact, many of the breaches that made headlines since the start of the pandemic were largely due to RDP server usage, which is vulnerable to credential stuffing attacks (brute force attacks of passwords) from purchased password lists from dark web marketplaces.

In 2000, I published the first known vulnerability in hacking VPNs to open disclosure mailing lists, then published the second vulnerability in VPNs in 2001, which I spoke about at Blackhat Briefings that same year. Still, 21 years later, companies continue to rely on VPNs for secure remote access despite their vulnerabilities.

How is SDP an effective alternative to VPNs?

VPNs are not a true zero trust network access (ZTNA) solution. With VPNs, you must assume the device running the VPN client hasn’t been compromised, that split tunneling isn’t turned on, MFA hasn’t been compromised, and that the user’s password hasn’t been compromised. Furthermore, once you’re authenticated with the internal network behind the VPN, you typically have access to every host, printer, and networked node on that internal network.

Software defined perimeter (SDP) solutions are “true” ZTNA solutions where the device, infrastructure, user, and data aren’t trusted. Effectively enforcing “prove to me who you are, then prove to me that you SHOULD have access to the host or data you are requesting access to.” SDP solutions also don’t expose services to the outside world and implement what’s called software-defined microsegmentation.

Microsegmentation is taking a big flat network and “cutting” it up into communities of nodes where the administrator can define what hosts can talk to what and, more importantly, what users can talk to what. Just because you’re an authenticated node doesn’t necessarily mean you should be able to talk to any node on the network. SDP authenticates and authorizes everything and everyone.

Can SDP eliminate human error completely?

I don’t believe anything can completely eliminate human error, but many of the controls that SDP offers helps to “protect us from ourselves” that VPNs don’t offer. For example, some SDP solutions completely eliminate the user’s password and only rely on biometrics (facial recognition). This allows companies to no longer worry about account takeovers and enforces instead “something you are and something you have” since you must authenticate with your face using your cell phone. The password is finally going away!

Could you explain the process of the SDP approach?

Yes. SDP is quite simple. You have a client/agent that runs on a user’s host, which effectively helps enforce by policy what systems that user/host is allowed to talk to. This is the implementation of microsegmentation. Before software-defined microsegmentation, administrators used to do this at the switch level using VLANs (virtual local area networks) and VACLS (VLAN Access Control Lists).

It was entirely too cumbersome, which is why so many networks today are still flat (think the Target attack where the HVAC systems were on the same network as the point-of-sale systems). SDP handles all of the controls around who and what can talk to each other in addition to enforcing the authentication of users and devices along with the authorization for access.

How do you see SDPs evolving in the future?

I believe the future is the complete exodus away from hardware to software defined networking (SDN) – which is already here. I also believe it will help migrate organizations away from using passwords and relying only on MFA so account takeovers can finally be a thing of the past. I believe organizations are ready to eliminate the password in the enterprise but need the technology to help get them there.

As the vulnerability researcher who published the world’s first vulnerability in VPNs over twenty-two years ago, it’s unfathomable to think that VPNs are still in use today when more secure alternatives are available. Built on zero trust security principals, SDP solutions eliminate the ATO threat introduced by VPNs, RDP servers, and desktop sharing applications for secure remote access.

Credit: Source link

Previous Post

Lloyds enters “strategic partnership” with loyalty fintech Bink

Next Post

Singapore fintech IN Financial Technology acquires MyCash

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Singapore fintech IN Financial Technology acquires MyCash

Singapore fintech IN Financial Technology acquires MyCash

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

March 19, 2025
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025
Global Funeral Traditions Meet Technology

Global Funeral Traditions Meet Technology

March 9, 2025
Canditech website

Canditech is Revolutionizing Hiring With Their New Product

March 9, 2025

Recommended

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

March 19, 2025
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media