Zero trust network access and segmentation to mitigate risk

Zero trust network access and segmentation to mitigate risk

Share post

Industry-first common solution for zero trust network access and zero trust segmentation to mitigate risk in hybrid infrastructures. With the new solution, Appgate and Illumio want to prevent and stop the spread of security breaches.

Appgate, the Zero Trust secure access company, and Illumio, Inc., the Zero Trust segmentation company, today announced the industry's first integrated Zero Trust Network Access (ZTNA) and Zero Trust segmentation solution (ZTS) on. This protects network connectivity and prevents the propagation of breaches across hybrid infrastructure and applications to make organizations more resilient to cyberattacks.

ZTNA solution combined with ZTS solution

The new solution integrates Appgate SDP, a leading ZTNA solution, with Illumio Core, a leading ZTS solution. This enables organizations to create Zero Trust Access Policies that adapt in real-time to changes in the application environment. If a framework parameter of a workload segmented with Illumio changes, Appgate SDP automatically recognizes this and makes the necessary adjustments automatically. In this way, user access is updated quickly and transparently to the right level without restricting a user. As a result, security teams do not have to write new security policies when IP addresses change, ultimately saving time and resources.

The ZTNA and ZTS cooperation offers the following advantages

  • Automated policy updates that save time and enable businesses to scale. Using metadata from Illumio, Appgate SDP automatically adjusts user permissions to allow access only to policy-authorized workloads.
  • Granular controls that prevent the propagation of security breaches. The solution ensures that access between users and specific application workloads occurs with the minimum privileges, across any combination of hybrid infrastructures, on-premises, in the data center or in the cloud.
  • Comprehensive Zero Trust security to make organizations more resilient to cyberattacks. ZTNA blocks attackers from accessing specific areas of the network, while ZTS blocks attackers from traversing the entire network—providing end-to-end Zero Trust controls and reducing risk.

"By working with Illumio, we can quickly bring to market a unique best-of-breed joint solution that leverages the collective strength of our proven Zero Trust security platforms," ​​said Tony Zirnoon, CISSP, Head of Strategic Alliances and Partnerships , Appgate. “The merger of Appgate SDP's North-South policies and Illumio Core's East-West policies creates a unified set of identity-aware, contextual access policies to accelerate the advancement of Zero Trust and seamlessly secure hybrid enterprise architectures.”

Connected companies are more vulnerable

In the hybrid world of work, organizations are more connected and vulnerable to attacks — 76 percent of organizations have experienced a ransomware attack in the past two years. The industry now assumes that security breaches are inevitable. Therefore, it develops policies that proactively contain cyber attacks and thus minimize their impact (ie Zero Trust). ZTNA and ZTS are two essential pillars of any Zero Trust strategy and are now available as a joint solution for the first time.

More at Illumio.com

 


About Illumio

Illumio, the leader in zero-trust segmentation, stops attacks and ransomware from propagating through the hybrid attack surface. The Illumio ZTS platform visualizes all traffic between workloads, devices, and the web, automatically sets granular segmentation policies to control data flow, and isolates high-value assets and vulnerable systems proactively or in response to active attacks.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more