<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/john-armstrong/rss" /><link>https://www.ivanti.com/blog/authors/john-armstrong</link><item><guid isPermaLink="false">b0f7c4bb-5e8d-4699-b861-223d341655ee</guid><link>https://www.ivanti.com/blog/enterprise-vpn-enduring-security-value</link><atom:author><atom:name>John Armstrong</atom:name><atom:uri>https://www.ivanti.com/blog/authors/john-armstrong</atom:uri></atom:author><category>Security</category><title>Think SSE and SASE Make Enterprise VPNs Obsolete? Think Again</title><description>&lt;p&gt;New cybersecurity technologies and frameworks are always emerging, promising enhanced protection and streamlined operations. Among these, &lt;a href="https://www.ivanti.com/use-cases/cloud-access-security"&gt;Security Service Edge (SSE)&lt;/a&gt; and Secure Access Service Edge (SASE) have gained significant attention for their comprehensive approach to network security.&lt;/p&gt;

&lt;p&gt;But despite the advent of these sophisticated solutions, enterprise VPNs still hold enduring value for data and application security. Corporate enterprise VPNs can and should remain a &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;cornerstone of cybersecurity strategies&lt;/a&gt;, even alongside newer technologies.&lt;/p&gt;

&lt;h2&gt;The foundation of enterprise VPNs&lt;/h2&gt;

&lt;p&gt;Enterprise VPNs have been a staple in the &lt;a href="/resources/v/doc/ivi/2720/1d4f07f60f8c" target="_blank"&gt;cybersecurity toolkit&lt;/a&gt; for decades. They create a protected, encrypted tunnel for data transmission, seamlessly connecting remote users with corporate networks and keeping sensitive information safe from interception and unauthorized access. This fundamental capability addresses several critical security needs.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Secure remote access.&lt;/strong&gt; VPNs enable employees to access corporate resources from anywhere in the world. This is essential for remote work, where employees must have reliable and secure access to internal applications and data.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Anonymity and privacy.&lt;/strong&gt; VPNs mask the user's IP address, providing an additional layer of privacy that makes it difficult for malicious actors to track user activities or launch targeted attacks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Data encryption.&lt;/strong&gt; VPNs use robust encryption protocols, such as AES-256, to protect data in transit. Even if data is intercepted, it can't be deciphered without the encryption key.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;What about SSE and SASE?&lt;/h2&gt;

&lt;p&gt;SSE and SASE represent the next generation of network security solutions, integrating multiple security functions into a unified, cloud-delivered service. Architecturally, SSE is SASE minus SD-WAN capabilities. These frameworks offer several advantages.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;SASE combines wide-area networking (WAN) capabilities with security services, including secure web gateways (SWG), &lt;a href="https://www.ivanti.com/blog/ivanti-announces-lookout-casb-swg-partnership-for-ivanti-neurons-for-zero-trust-access"&gt;cloud access security brokers (CASB)&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;zero trust network access (ZTNA)&lt;/a&gt;. This combined approach ensures that all edges of the network are protected.&lt;/li&gt;
	&lt;li&gt;SSE and SASE are cloud-native, providing scalability and flexibility that are unavailable with traditional on-premises solutions.&lt;/li&gt;
	&lt;li&gt;These frameworks emphasize identity-based access controls, ensuring access to specific resources is limited to authenticated and authorized users.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;While SASE and SSE solutions offer significant security and network management benefits, their cost and complexity can be a barrier for all but the largest organizations. The need for specialized skills, high initial and ongoing investment, integration challenges and potential vendor lock-in are all factors that contribute to this complexity.&lt;/p&gt;

&lt;p&gt;For organizations with business goals that compel them to embark on that journey, a phased approach that combines traditional VPNs with elements of SSE or SASE can provide a more manageable hybrid strategy. This approach lets you gradually adopt new technologies while maintaining the stability, economics and familiarity of existing systems.&lt;/p&gt;

&lt;h2&gt;Addressing secure remote access needs economically&lt;/h2&gt;

&lt;p&gt;Despite the advanced capabilities of SSE and SASE, for most businesses, enterprise VPNs continue to offer unique benefits that make them indispensable. For small to medium enterprises (SMEs) in particular, VPNs provide a cost-effective solution for securing remote access without significant investment in new infrastructure.&lt;/p&gt;

&lt;p&gt;A key factor driving this growth is the increase in the number of workers outside of traditional workspaces. Research from McKinsey shows that hybrid work is here to stay, with office attendance remaining &lt;a href="https://www.mckinsey.com/industries/real-estate/our-insights/americans-are-embracing-flexible-work-and-they-want-more-of-it" rel="noopener" target="_blank"&gt;roughly 30 percent lower&lt;/a&gt; than it was before the pandemic.&lt;/p&gt;

&lt;p&gt;VPNs have a long track record of reliability and effectiveness, providing a solid foundation for any cybersecurity strategy. IT professionals understand them well, and they've been extensively tested in various environments. VPNs are compatible with a wide range of devices and operating systems and are easy to integrate into existing IT environments without requiring major changes to the network architecture. Their simplicity in configuration and management enables administrators to set up granular least-privilege access controls that restrict users to only the resources they need, minimizing the risk of unauthorized access and data breaches.&lt;/p&gt;

&lt;h2&gt;Enterprise VPNs and SASE: complementary technologies&lt;/h2&gt;

&lt;p&gt;Rather than viewing VPNs and newer technologies like SSE and SASE as mutually exclusive, it's more productive to consider how they can complement each other over the long term. For instance, an organization might use VPNs to secure remote access for employees while eventually using SASE for broader network security and management. This hybrid approach can provide the best of both worlds, ensuring consistent security across the entire network architecture.&lt;/p&gt;

&lt;p&gt;Modern VPN solutions are also highly adaptable and able to address an organization’s preferred deployment models, whether they be on-premises running on hardware, a hybrid of on-prem and virtual machines (VMs) or fully deployed as VMs in the cloud.&lt;/p&gt;

&lt;p&gt;As cybersecurity threats evolve, so will the technologies designed to combat them. While SSE and SASE represent significant advancements, VPN’s fundamental principles — secure, encrypted communication and anywhere remote access — remain as relevant and effective as ever. Future developments in VPN technology, such as the integration of quantum-resistant encryption algorithms and enhanced performance capabilities, will further solidify their role. New threats are constantly emerging, making it more critical than ever to keep VPNs updated with the latest software versions and patches to avoid potential business disruption.&lt;/p&gt;

&lt;p&gt;Enterprise VPNs have stood the test of time, providing reliable and secure data and application protection solutions. While newer frameworks like SSE and SASE offer more comprehensive security features, the enduring value of VPNs lies in their proven effectiveness, cost-efficiency, compatibility and ease of use. By leveraging the strengths of both traditional VPNs and modern security solutions, organizations can build a robust and resilient cybersecurity strategy that scales to meet their unique needs.&lt;/p&gt;

&lt;p&gt;In the end, the goal isn't to choose one solution over the other but to integrate the best features of each to create a comprehensive security posture. As technology continues to advance, &lt;a href="https://www.ivanti.com/products/connect-secure-vpn"&gt;enterprise VPNs&lt;/a&gt; will undoubtedly remain a critical component of the cybersecurity arsenal.&lt;/p&gt;
</description><pubDate>Tue, 11 Feb 2025 14:20:48 Z</pubDate></item><item><guid isPermaLink="false">cd094a87-97b1-4330-a359-a9c1b0d950de</guid><link>https://www.ivanti.com/blog/cloud-migration-benefits-risks</link><atom:author><atom:name>John Armstrong</atom:name><atom:uri>https://www.ivanti.com/blog/authors/john-armstrong</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><category>Service Management</category><title>Cloud Migration Benefits – and the Challenges to Overcome</title><description>&lt;p&gt;Cloud migration has become a strategic priority for many organizations. By moving data, applications and IT resources from on-premises infrastructure to a cloud-based environment, they can see multiple benefits. But cloud migration also comes with its own unique challenges.&lt;/p&gt;

&lt;p&gt;Gaining a deeper understanding of both the benefits and possible pitfalls of cloud computing is crucial before embarking on your cloud journey. Whether your goal is to reduce infrastructure expenses, improve time-to-market, or more easily scale your IT environment, these insights will empower you to make informed decisions and navigate the migration process with more confidence.&lt;/p&gt;

&lt;h2&gt;Benefits of cloud migration&lt;/h2&gt;

&lt;p&gt;We’ve said there are multiple advantages for an enterprise that makes this move, so here are some of the details.&lt;/p&gt;

&lt;h3&gt;Scalability&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Resource elasticity:&lt;/strong&gt; Cloud platforms offer elastic resources that can scale up or down based on demand. This enables businesses to handle diverse workloads without additional hardware investments.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Global reach:&lt;/strong&gt; Cloud services have a global reach. Businesses can deploy applications closer to their users, reducing latency and improving performance.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Cost efficiency&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Pay-as-you-go:&lt;/strong&gt; Cloud computing operates on a pay-as-you-go model where businesses only pay for the actual resources they use. This aligns perfectly with scalability and contrasts with traditional subscription models where customers pay a fixed fee on a regular schedule regardless of their actual usage.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Reduced or eliminated infrastucture costs:&lt;/strong&gt; Since organizations that move to the cloud no longer need to deploy extensive on-premises architecture to support operations, the costs of buying and maintaining those systems are minimized or eliminated.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Business continuity&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Backup solutions:&lt;/strong&gt; Cloud providers offer comprehensive disaster recovery solutions, ensuring business continuity in the event of infrastructure failures or other disruptions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;High availability:&lt;/strong&gt; Cloud platforms are designed for high availability, with multiple data centers and redundancy measures in place to minimize potential downtime.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Security&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Advanced protection:&lt;/strong&gt; Leading cloud service providers invest heavily in security capabilities in order to protect cloud-based applications and their users from cyber threats and vulnerabilities. These include access control, identity management, encryption and compliance across multi-cloud and hybrid-cloud environments.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Regular updates:&lt;/strong&gt; Cloud providers constantly update their security protocols to protect against emerging threats and ensure that businesses benefit from the latest security advancements.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Agility and innovation&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Innovative technologies:&lt;/strong&gt; Cloud platforms offer easier access to advanced technologies such as artificial intelligence, machine learning and big data analytics, enabling businesses to remain competitive.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Faster time-to-market:&lt;/strong&gt; Cloud services can support faster application deployment, reducing time to market. With fewer infrastructure barriers, businesses can rapidly respond to changing market conditions and competitive threats.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Collaboration and remote work&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;The Everywhere Workplace:&lt;/strong&gt; Cloud-based tools and services facilitate collaboration among teams, regardless of their physical location, enhancing productivity, efficiency and the overall &lt;a href="https://www.ivanti.com/blog/how-cloud-migration-helps-improve-employee-experience"&gt;employee experience&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Secure everywhere:&lt;/strong&gt; The cloud supports remote work by providing secure access from anywhere to necessary applications and data, which has become crucial in the modern work environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Cloud migration challenges&lt;/h2&gt;

&lt;p&gt;As just seen, once applications have been migrated to the cloud, there are numerous benefits. But cloud migration can pose certain challenges. Anticipating them can help IT teams prepare for any potential issues.&lt;/p&gt;

&lt;h3&gt;Data security and privacy&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Breach exposure:&lt;/strong&gt; Migrating applications and sensitive data containing &lt;a href="https://www.dol.gov/general/ppii#:~:text=Personal%20Identifiable%20Information%20(PII)%20is,either%20direct%20or%20indirect%20means." rel="noopener" target="_blank"&gt;personally identifiable information&lt;/a&gt; (PII) to the cloud might expose that data to potential security breaches, so ensuring robust encryption and access control is critical.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Maintaining compliance:&lt;/strong&gt; Ensuring compliance with industry regulations and standards can be challenging in a cloud environment. Regulated financial services, healthcare and e-commerce industries must choose a cloud provider that’s fully capable of supporting their specific compliance requirements.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Downtime and disruption&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Migration downtime:&lt;/strong&gt; The migration process can potentially cause downtime and disrupt business operations. Careful planning and a phased migration can help mitigate this risk.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Service interruptions&lt;/strong&gt;: Although rare, cloud service outages can occur and impact business operations. Having a contingency plan in place is essential. Organizations with zero tolerance for downtime should design for redundancy by utilizing two or more cloud service providers.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Cost overruns&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Uncontrolled usage and spend:&lt;/strong&gt; Even with a pay-as-you-go model, cloud costs can spiral out of control without proper management. So, it’s essential to implement cost management practices and constantly monitor usage.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Hidden costs:&lt;/strong&gt; Every cloud instance is unique. Beware of costs associated with data transfer, CPU, storage, memory and additional services that may not be initially apparent.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Vendor lock-in&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Single provider dependence:&lt;/strong&gt; Relying too heavily on a single cloud service provider may result in vendor lock-in, making it difficult to switch to an alternate provider or move back to on-premises.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Limited flexibility:&lt;/strong&gt; Vendor lock-in can limit flexibility, as the cost, capabilities and limitations of their chosen provider may constrain businesses.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Skill gaps&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Specialized skills:&lt;/strong&gt; Migrating to the cloud requires specialized IT skills and expertise. Investing in training for your team and hiring experienced professionals is crucial for a successful migration.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Change management:&lt;/strong&gt; Adapting to new cloud-based processes and tools can be challenging for employees at all levels. Effective change management strategies and pre-migration training are necessary to ensure a smooth transition.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Performance Issues&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Latency and bandwidth:&lt;/strong&gt; Although cloud resources are elastic, specific applications may experience latency and bandwidth issues, especially if the data centers are far from end user locations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Resource contention:&lt;/strong&gt; Over-subscribed cloud resources can lead to performance degradation if not properly managed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Summary: Planning can equal migration success&lt;/h2&gt;

&lt;p&gt;Cloud migration offers many benefits, including scalability, cost efficiency, &lt;a href="https://www.ivanti.com/blog/5-ways-to-secure-your-cloud-journey"&gt;enhanced security&lt;/a&gt;, employee flexibility and access to the latest technologies. On the flip side, it also may involve several challenges, including exposure to security breaches, potential downtime, cost management issues and the risk of vendor lock-in.&lt;/p&gt;

&lt;p&gt;But by &lt;em&gt;carefully planning&lt;/em&gt; the migration process, addressing potential pitfalls and leveraging the expertise of skilled professionals, organizations can successfully navigate their cloud migration journey and open new opportunities for growth.&lt;/p&gt;

&lt;p&gt;Learn how solutions like &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Ivanti Neurons for Zero Trust Access&lt;/a&gt; can protect enterprise cloud applications, data and devices from unauthorized access and threats. Team it with other cloud-enabled security solutions such as &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;Neurons for RBVM&lt;/a&gt; and &lt;a href="https://help.ivanti.com/ht/help/en_US/CLOUD/vNow/multi-factor-authentication.htm" target="_blank"&gt;Multi-Factor Authentication&lt;/a&gt; to empower your organization with secure anytime, anywhere access to business-critical apps and data.&lt;/p&gt;
</description><pubDate>Tue, 29 Oct 2024 16:11:40 Z</pubDate></item><item><guid isPermaLink="false">dd34a156-4410-47c9-8ebc-67601b6cd586</guid><link>https://www.ivanti.com/blog/nist-zero-trust</link><atom:author><atom:name>John Armstrong</atom:name><atom:uri>https://www.ivanti.com/blog/authors/john-armstrong</atom:uri></atom:author><category>Security</category><title>NIST and the Evolution of Zero Trust</title><description>&lt;p&gt;It’s important for every cybersecurity professional to understand the work of the &lt;a href="https://www.nist.gov/" rel="noopener" target="_blank"&gt;National Institute of Standards and Technology&lt;/a&gt; (NIST). That’s because it plays a pivotal role in shaping the cybersecurity landscape, particularly through its groundbreaking NIST zero trust efforts.&lt;/p&gt;

&lt;p&gt;Zero trust is a security paradigm that transforms the traditional approach to network security. Instead of assuming that everything (and everyone) inside an organization’s network is trustworthy, zero trust operates on the principle of “never trust, always verify.”&lt;/p&gt;

&lt;p&gt;Why does this matter? The NIST zero trust model directly responds to the evolving threat landscape, where cyberattacks are increasing in sophistication and frequency.&lt;/p&gt;

&lt;p&gt;Statistics underscore the critical nature of this situation. In their most recent annual data breach report, the &lt;a href="https://www.idtheftcenter.org/publication/2023-data-breach-report/" rel="noopener" target="_blank"&gt;Identity Theft Resource Center&lt;/a&gt; found the number of breaches in 2023 had jumped by 72% compared to the previous record set in 2021. The impact of this increase isn’t limited to medium and large enterprises: SMBs can be disproportionately damaged as they typically don’t have access to the same level of IT resources as bigger organizations.&lt;/p&gt;

&lt;h2&gt;Responding to an inadequate approach&lt;/h2&gt;

&lt;p&gt;The concept of zero trust emerged as a response to the limitations of traditional perimeter-based security models. The latter relied on the assumption that threats primarily originated from outside the network and that once entities were inside, they could be trusted.&lt;/p&gt;

&lt;p&gt;But perimeter security measures like firewalls and VPNs have proven deficient in the face of insider threats, advanced persistent threats (APTs) and the increasing mobility of users and devices. Recognizing these challenges, NIST began to explore and advocate for a more robust security framework.&lt;/p&gt;

&lt;p&gt;NIST’s involvement with zero trust is multifaceted, encompassing the development of guidelines, frameworks and collaborative initiatives. One of the foundational documents in this effort is &lt;a href="https://csrc.nist.gov/pubs/sp/800/207/final" rel="noopener" target="_blank"&gt;NIST Special Publication (SP) 800-207&lt;/a&gt;, titled "Zero Trust Architecture.”&lt;/p&gt;

&lt;p&gt;It lays out a comprehensive framework for implementing zero trust principles within an organization. It outlines the core components of a zero trust architecture, including identity verification, access control and continuous monitoring.&lt;/p&gt;

&lt;h2&gt;Key components of NIST SP 800–207&lt;/h2&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Identity verification&lt;/strong&gt; — NIST zero trust principles stress the importance of verifying the identity of users and devices before granting access to resources. Verification involves robust authentication mechanisms, such as multi-factor authentication (MFA), to ensure that only authorized entities can access sensitive data and systems.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Access controls&lt;/strong&gt; — Access to resources should be granted based on the principle of least privilege, meaning users and devices should only have the minimum level of access necessary to perform their functions. NIST provides guidelines for implementing role-based access controls (RBAC) and just-in-time access provisioning to minimize the attack surface.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Continuous monitoring&lt;/strong&gt; — NIST advocates continuous monitoring and real-time assessment of security postures. This involves using advanced analytics and machine learning to detect and respond to anomalies and potential threats. By continuously evaluating the trustworthiness of users and devices, organizations can dynamically adjust access controls and mitigate risks more effectively.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;The National Cybersecurity Center of Excellence (NCCoE) and practical implementations&lt;/h2&gt;

&lt;p&gt;NIST’s relationship with zero trust extends beyond the publication of guidelines. It actively collaborates with other government agencies, academic institutions and industry partners like Ivanti to advance the adoption of zero trust principles.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://www.nccoe.nist.gov/" rel="noopener" target="_blank"&gt;National Cybersecurity Center of Excellence (NCCoE)&lt;/a&gt;&amp;nbsp; is a collaborative hub where experts from industry, government and academia come together to address cybersecurity challenges and provide best practices and guidance. In the context of zero trust, the NCCoE has developed several projects and real-world use cases demonstrating how organizations can implement zero trust principles in their environments.&lt;/p&gt;

&lt;p&gt;These projects provide valuable insights and practical guidance for organizations striving to improve their security postures and seeking guidance on executing a zero trust strategy.&lt;/p&gt;

&lt;h2&gt;Ivanti’s role in NIST and NCCoE zero trust architecture&lt;/h2&gt;

&lt;p&gt;Ivanti actively works with the NIST and NCCoE on various initiatives, particularly the &lt;a href="https://www.nccoe.nist.gov/projects/implementing-zero-trust-architecture" rel="noopener" target="_blank"&gt;Implementing a Zero Trust Architecture (ZTA) project&lt;/a&gt;. NIST and industry partners like Ivanti have collaborated to build no less than 17 example ZTA solutions in the NIST NCCoE Lab to solve real-world zero trust use cases.&lt;/p&gt;

&lt;p&gt;Lessons learned from implementations and integrations can help your organization save time and resources. Detailed technical information on each build can serve as a valuable resource by supplying models your technology implementers can emulate.&lt;/p&gt;

&lt;p&gt;Ivanti offers a unique combination of solutions built around NIST zero trust principles to solve real-world use cases &amp;nbsp;including &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Ivanti Neurons for Zero Trust Access&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Ivanti Neurons for Modern Device Management&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/passwordless-authentication"&gt;Ivanti Zero Sign-On&lt;/a&gt;. These provide Policy Enforcement Points, Policy Decision Points and Policy Information Points in the overall zero trust architecture.&lt;/p&gt;

&lt;p&gt;Relevant components of these solutions are shown in the diagram below. Additional information on the architecture and use cases enabled by Ivanti can be found in the NIST SP 1800–35 Enterprise 1 Build.&lt;/p&gt;

&lt;p&gt;&lt;img alt="zero trust architecture" src="https://static.ivanti.com/sites/marketing/media/images/blog/2024/10/zero-trust-architecture.png"&gt;&lt;strong&gt;NIST NCCoE Enterprise 1 Zero Trust Architecture&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Continuous improvement and adaptation&lt;/h2&gt;

&lt;p&gt;The NIST zero trust architecture has the &lt;em&gt;principle of least privilege&lt;/em&gt; as a fundamental element. This dictates that users and devices should only have the minimum level of access necessary to perform their functions. By limiting access rights, organizations can reduce the attack surface and minimize the potential impact of a security breach. NIST zero trust guidelines provide practical recommendations for implementing least-privilege policies. Those include role-based access control and just-in-time access provisioning.&lt;/p&gt;

&lt;p&gt;NIST also recognizes that, while the cybersecurity landscape is constantly evolving, so must strategies to protect against emerging threats. As part of its commitment to continuous improvement, NIST regularly updates its guidelines and frameworks to reflect the latest advancements in technology and threat intelligence.&lt;/p&gt;

&lt;p&gt;This iterative approach ensures that organizations have access to the most current and effective strategies for implementing zero trust, underscoring NIST's adaptability and commitment to staying ahead of emerging threats.&lt;/p&gt;

&lt;h2&gt;Challenges and considerations in implementing NIST zero trust&lt;/h2&gt;

&lt;p&gt;While adopting NIST zero trust principles offers security benefits, it also poses challenges. Implementing a zero trust architecture requires a comprehensive understanding of an organization's assets, users and workflows. It also demands the integration of various security technologies and the establishment of robust identity and access management (IAM) systems.&lt;/p&gt;

&lt;p&gt;NIST recognizes these challenges and provides guidance for addressing them. For example, NIST SP 800–207 includes recommendations for conducting thorough asset inventories, mapping data flows and establishing clear policies and procedures for access control. NIST also stresses the importance of user education and awareness enabling employees to understand and adhere to NIST zero trust principles in order to strengthen overall security posture.&lt;/p&gt;

&lt;h2&gt;The future of zero trust&lt;/h2&gt;

&lt;p&gt;As &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;cyber threats continue to evolve&lt;/a&gt;, the importance of zero trust will only grow. NIST's ongoing and dedicated efforts to refine and promote zero trust principles will play a vital role in helping organizations stay ahead of these threats.&lt;/p&gt;

&lt;p&gt;By providing practical guidance, advocating for continuous improvement, fostering collaboration and partnering with cybersecurity industry leaders like Ivanti, NIST zero trust principles can provide the bedrock for a more secure and resilient digital ecosystem. And that, in turn, provides a real cause for optimism about the future of cybersecurity.&lt;/p&gt;

&lt;hr&gt;
&lt;p&gt;Read more about &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Ivanti’s Zero Trust Access solution&lt;/a&gt; and learn how you can adopt a robust security model built on continuous verification and least-privilege access.&lt;/p&gt;
</description><pubDate>Tue, 29 Oct 2024 15:39:14 Z</pubDate></item><item><guid isPermaLink="false">7f5710ef-8457-4b4c-be79-148d46b300a7</guid><link>https://www.ivanti.com/blog/5-ways-to-secure-your-cloud-journey</link><atom:author><atom:name>John Armstrong</atom:name><atom:uri>https://www.ivanti.com/blog/authors/john-armstrong</atom:uri></atom:author><category>Security</category><title>5 Ways to Secure Your Cloud Journey</title><description>&lt;p&gt;Embracing the cloud is crucial for organizations seeking flexible ways to store and manage applications and complex data without being tied to a local device and single location.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Cloud migration has many compelling benefits, including:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Saving costs by eliminating significant upfront investments in hardware.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Reducing ongoing maintenance costs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Supporting the pay-as-you-go SaaS model.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Empowering businesses to scale resources up or down based on demand.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Optimizing infrastructure spend.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Cloud benefits fueling adoption&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;For overburdened IT teams, cloud adoption enhances flexibility and agility, enabling faster deployment of applications and services. It also offers robust security features, automatic updates and disaster-recovery options, ensuring data integrity and business continuity. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;The cloud supports collaboration and remote work by providing access to data and applications from anywhere, fostering innovation and productivity. Enterprise cloud migration is expected to continue growing steadily through this year. According to IDC, &lt;a href="https://www.idc.com/getdoc.jsp?containerId=prUS52460024#:~:text=NEEDHAM%2C%20Mass.%2C%20July%2029,Public%20Cloud%20Services%20Spending%20Guide." rel="noopener" target="_blank"&gt;worldwide spending on public cloud services&lt;/a&gt; is forecast to reach $805 billion in 2024 and double by 2028.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Accelerated cloud adoption is driven by the increasing obsolescence of on-premises solutions and desire for improved security. This trend isn't limited to commercial enterprises. The U.S. government has implemented the Cloud Smart strategy to provide federal agencies with practical guidance to fully leverage cloud technologies while ensuring secure and efficient implementation. Additionally, Executive Order 14028 requires using secure cloud services, zero trust architecture, multifactor authentication and encryption to enhance cybersecurity. These initiatives are designed to modernize IT infrastructure, improve service delivery and ensure the security of federal data and systems.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Key drivers of cloud migrations&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Because of its scalability, flexibility and cost-effectiveness, the cloud is particularly well-suited for specific applications, including:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Web apps:&lt;/strong&gt; Cloud infrastructure supports dynamic scaling, making it ideal for web applications that experience variable traffic.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;SaaS and streaming services:&lt;/strong&gt; Ubiquitous platforms like Netflix and Spotify use the cloud to deliver on-demand content seamlessly to millions of users.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Collaboration tools:&lt;/strong&gt; Applications like Google Workspace and Microsoft 365 enable real-time collaboration and remote work.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Software development and testing:&lt;/strong&gt; Developers can quickly set up and tear down environments, facilitating agile development practices.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Disaster recovery:&lt;/strong&gt; Cloud-based disaster recovery solutions offer quick recovery times and cost savings compared to traditional methods.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Data storage and backup:&lt;/strong&gt; Cloud services offer reliable and scalable storage solutions, ensuring data is accessible and secure.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Big-data analytics:&lt;/strong&gt; The cloud provides access to the computational power needed to process and analyze large datasets efficiently.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Cloud migration security challenges and solutions&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Migrating to the cloud offers many benefits – but also comes with security considerations. Establishing a careful balance between security and accessibility in the cloud is essential for protecting business-critical applications and data while ensuring an optimal user experience.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Organizations can deploy these five strategies to balance robust security with accessibility requirements:&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1. Adopt a zero-trust approach to security&lt;/h3&gt;

&lt;p&gt;This model assumes that threats could be external and internal and requires strict verification&amp;nbsp;and continuous authentication&amp;nbsp;for every access request. With proper implementation, &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;zero trust&lt;/a&gt; can provide seamless access without compromising security.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;2. Use role-based access control&lt;/h3&gt;

&lt;p&gt;This limits access to cloud resources based on defined user roles, reduces the risk of unauthorized access and simplifies &lt;a href="https://www.ivanti.com/glossary/identity-and-access-management"&gt;access management&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3. Automate security processes&lt;/h3&gt;

&lt;p&gt;Automation consistently applies security policies for instant threat response. Automation also eliminates time-consuming and error-prone manual processes. This reduces the workload for security teams so they focus on more strategic tasks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;4. Implement multifactor authentication&lt;/h3&gt;

&lt;p&gt;MFA adds a layer of security by making users provide two or more verification factors to access protected cloud resources. Modern &lt;a href="https://www.ivanti.com/products/passwordless-authentication"&gt;MFA solutions&lt;/a&gt;, such as biometric authentication, can be fast and user-friendly.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;5. Deploy continuous monitoring and incident response&lt;/h3&gt;

&lt;p&gt;This helps security teams detect and respond to incidents in real time. Automated alerts and responses can mitigate threats and eliminate dwell time while reducing user disruption.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Despite its continued adoption, cloud computing may not be preferable to an on-premises solution for certain use cases. For example, industries with strict, highly specialized data security and compliance requirements, like banking and insurance, often favor on-premises solutions to maintain complete control over their data. Organizations requiring extremely low data latency, including those using supercomputing or specific bare-metal hardware, may also find on-premises solutions more practical. And when there are concerns about internet dependency, on-prem deployments are preferred since they are rarely disrupted by internet outages.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ultimately, the decision to migrate to the cloud depends on your specific needs and context. On-premises infrastructure and software may be your preference if you require physical control and isolation. However, if you need flexibility, scalability and secure “anywhere” deployment, cloud is the way to go.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Learn about cloud migration solutions&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Ivanti Neurons for Zero Trust Access (ZTA)&lt;/a&gt; integrates least privilege access, role-based access control, encryption, and user and entity behavior analytics for anomaly detection in a unified solution to protect enterprise cloud applications, data and devices from unauthorized access and malicious threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You can combine ZTA with other cloud-enabled security solutions on the Ivanti Neurons platform, including &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;Neurons for risk-based vulnerability management&lt;/a&gt; and &lt;a href="https://help.ivanti.com/ht/help/en_US/CLOUD/vNow/multi-factor-authentication.htm" target="_blank"&gt;multifactor authentication&lt;/a&gt;. Doing so provides your organization with secure access to private, cloud and SaaS apps anytime, anywhere.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 16 Sep 2024 13:57:41 Z</pubDate></item><item><guid isPermaLink="false">995a7e32-6cf1-4fe3-a1d7-c39e774d0130</guid><link>https://www.ivanti.com/blog/sdp-and-zero-trust-the-dynamic-duo-for-application-security</link><atom:author><atom:name>John Armstrong</atom:name><atom:uri>https://www.ivanti.com/blog/authors/john-armstrong</atom:uri></atom:author><category>Security</category><title>SDP and Zero Trust: The Dynamic Duo for Application Security</title><description>&lt;p&gt;Until relatively recently, enterprises relied on fixed perimeters using firewalls and VPNs to control access to networks and resources. Traditional network security assumed that everything within the network could be trusted, while external users were granted access with simple password protection.&lt;/p&gt;

&lt;p&gt;As cyber threats increased in frequency and sophistication along with the rise of phishing and ransomware attacks, this “moat and castle” approach and traditional security measures are no longer enough to protect users, devices and applications from vulnerabilities and breaches.&lt;/p&gt;

&lt;p&gt;Over the past decade, the rise of cloud computing, SaaS, IaaS and the decentralization of work environments have transformed network architectures and amplified security challenges. Today’s digital landscapes are borderless. That's where the superpowers of software-defined perimeter (SDP) and zero trust come in.&lt;/p&gt;

&lt;p&gt;While the &lt;a href="/resources/v/doc/ivi/2682/70b2768a4279" target="_blank"&gt;zero trust access (ZTA)&lt;/a&gt; model has become a well-known security framework, there’s still limited awareness that it shares common principles with SDP. With both methods, by default no access is granted. The doors are always locked, and authorization to access resources is only obtained if the context behind the request – such as user, identity, risk ratings and application sensitivity – can be validated.&lt;/p&gt;

&lt;p&gt;When combined, SDP and zero trust provide the most effective approach to application security in the modern cloud landscape. SDP establishes a barrier around applications, while zero trust verifies every user and device attempting to access those applications. Only SDP and ZTA can offer the scalability, flexibility and security on a cloud-native platform that organizations need to achieve that high level of protection.&lt;/p&gt;

&lt;h2&gt;What is zero trust?&lt;/h2&gt;

&lt;p&gt;Zero trust, a security model that assumes all users and devices are untrusted, has become a cornerstone of application security. By enforcing strict access controls based on identity, device and context, zero trust significantly reduces the risk of unauthorized access, data breaches and denial-of-service attacks.&lt;/p&gt;

&lt;p&gt;Implementing zero trust involves a combination of technologies and strategies, including SDPs, multi-factor authentication, least-privilege access, data encryption and continuous monitoring. SDPs establish dynamic security perimeters around applications, while zero trust minimizes the potential for lateral movement of attackers by verifying identities, endpoints and networks.&lt;/p&gt;

&lt;h2&gt;Zero trust benefits&lt;/h2&gt;

&lt;p&gt;Continuous monitoring provided by user and entity behavior analytics (UEBA) is a crucial part of zero trust, as it tracks user activity and detects anomalies that may indicate a security breach, allowing for immediate response and mitigation.&lt;/p&gt;

&lt;p&gt;Zero trust delivers a proactive and responsive security posture, ensuring that applications remain protected against evolving threats and unauthorized access. It emphasizes continuous verification of identity, context and behavior before granting access to resources.&lt;/p&gt;

&lt;p&gt;By adopting zero trust, organizations can confidently secure applications in the cloud where traditional perimeter-based security models built on hardware such as firewalls, routers and VPNs are no longer viable. Businesses thereby reduce security risks, safeguard sensitive data and critical assets, improve compliance and maintain a competitive advantage.&lt;/p&gt;

&lt;h2&gt;SDPs reduce attack surface&lt;/h2&gt;

&lt;p&gt;SDP is an ingenious approach to perimeter security and one of the best and most advanced ways to implement zero trust.&lt;/p&gt;

&lt;p&gt;SDP is based on the concept of micro-segmentation, which divides a network into smaller, distinct security zones. Each zone has its own set of security controls, and traffic among zones is continuously monitored. This allows organizations to define and enforce specific access controls for each zone, limiting the potential impact of a security breach and preventing threats from moving laterally. By confining unauthorized users to specific segments, SDP &lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;reduces the attack surface&lt;/a&gt; and helps protect sensitive data from exposure.&lt;/p&gt;

&lt;p&gt;The flexibility of SDP makes it applicable to a wide range of environments, including on-premises, cloud and hybrid infrastructures. SDP's ability to integrate with existing security infrastructure also simplifies deployment and management, enabling organizations to leverage existing investments to improve their security posture.&lt;/p&gt;

&lt;h2&gt;Value of combining zero trust and SDP&lt;/h2&gt;

&lt;p&gt;SDP improves the security posture of businesses facing the challenge of continuously adapting to expanding attack surfaces that are, in turn, increasingly more complex. Implementing zero trust along with SDP enables organizations to defend against new variations of attacks that are constantly emerging in existing perimeter-centric infrastructure and networking models.&lt;/p&gt;

&lt;p&gt;The combination of SDP and zero trust lets organizations establish a proactive and adaptive approach that enhances security posture by minimizing trust assumptions and enforcing strict controls. SDP fortifies the perimeter, while zero trust ensures only authorized users and devices can access applications. This multi-layered defense significantly reduces the risk of breaches and data exfiltration, providing organizations with enhanced protection.&lt;/p&gt;

&lt;h2&gt;Ivanti Neurons for ZTA with SDP can help&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Ivanti Neurons for Zero Trust Access (ZTA)&lt;/a&gt; empowers organizations to adopt a security model built on continuous verification and least-privilege access. The Ivanti zero trust secure architecture features a software-defined perimeter that ensures data integrity with isolated control and data planes.&lt;/p&gt;

&lt;p&gt;By dynamically assessing user identities, device posture and application access, Ivanti’s Zero Trust Access solution enforces granular access controls, granting authorized users access to only the resources they need. Integrated UEBA identifies anomalous user behavior, providing per-application micro-segmentation and preventing lateral-movement threats before they become a problem.&lt;/p&gt;

&lt;p&gt;Simplify and streamline your enterprise-wide application and network access management with the Ivanti Unified Client. Experience seamless integration of zero trust access, SDP, software gateways and behavior analytics – all within one comprehensive platform.&lt;/p&gt;

&lt;p&gt;Learn more by reading our Ivanti &lt;a href="/resources/v/doc/ivi/2682/70b2768a4279" target="_blank"&gt;Neurons for Zero Trust Access (ZTA) data sheet&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 07 Aug 2024 06:00:00 Z</pubDate></item></channel></rss>