End of an Era for VPN?

The legacy method of granting users access to applications in the enterprise is to extend the network perimeter to the client. This is achieved by routing the traffic between the client and the network edge in one secure tunnel. This approach poses a security risk as the user usually has full access to all network resources and applications.

The next problem with legacy VPNs is that it is based on Layer 3. This means your security policies are based on IP information, for example Access Control Lists (ACLs). ACLs are hard to manage and are not application centric.

Zscaler Private Access could disrupt the Virtual Private Network (VPN) market with a new approach on how to connect users to applications securely.  Zscaler Private Access (ZPA) is cloud service that can securely connect users to applications without extending the network perimeter and without routing.  The Zscaler Application (ZApp) client securely presents applications to the client, therefore removing the network complexities and security risk from legacy VPN technologies.

ZScaler has an interesting approach, they have moved the security model up the network stack from ISO Layer 3 to 7 and based the entire system on Domain Name Systems (DNS) instead of Internet Protocol (IP). This is more application centric approach and solved many challenges we have at Layer 3, like routing, IP overlap, Network Address Translation (NAT), 4to6 NAT, IP4 Scalability.  All these network headaches disappear and now I can control application access.

The granular application policy is also based on DNS, this policy can be dynamically applied to the end user.  This idea follows the Zero Trust Model, where you only grant user access to applications and systems they require and not to your entire network.  There is also a method of using wildcard domains if you don’t want follow the this model.

ZPA is using federation via Security Assertion Markup Language (SAML), so easy to integrate with your external IDP or internal Microsoft ADFS.  The SAML claims define the user application access policy, the claims are linked to an application name that consist of the domain name and port number in the simplest form.

Without going into a deep dive on how this is working, you could say this is more like a Proxy VPN based on an Software Defined Network (SDN) in the cloud, every TCP session and UDP stream is proxied multiple times. The ZScaler cloud will always find the best path to the application and dynamically create a one hop encrypted tunnel for each application, so you could call this Software Defined Security (SDS).

I believe this application centric technology will improve security, flexibility, scalability and most important simplify the complex legacy VPN solutions we often see in the enterprise.

I am looking forward to how this disruptive technology will change the current IT landscape, and how enterprises will start solving security challenges, like Internet of Things (IoT), company mergers, contractor access, and securing the end user device.

A World without the Security Perimeter

The Enterprise IT landscape is changing with the adoption of mobility and cloud services, and enterprises need to change their architecture to meet the growing needs of securing users from anywhere on any device.

Join in and be inspired by mobile security session at the Nordic Security Conference in Stockholm.

Nordic ITSecurity 2016 Program

The IT landscape has shifted dramatically and the corporate perimeter is disappearing. This is putting huge pressure on your traditional appliance-based security infrastructure, which was designed to protect servers in the corporate data center. In this cloud-centric, mobile-first world, how can you protect all your users, apps, and devices, wherever they are?

Tony Fergusson, IT Infrastructure Architect at MAN will illustrate how the MAN Diesel & Turbo team reinvented their security architecture using cloud based technologies and building security into the network to protect 15.000 users over 100 locations in 50 countries.

Christopher Hodson, Senior Director Office of the CISO at Zscaler will elaborate on why many IT organizations are choosing to adopt a cloud based approach to securely enable mobility, cloud applications and social media, while ensuring compliance and reducing risk.

• Protect users from advanced threats: why traditional security appliances are failing • How to embrace cloud with full visibility and control of Shadow IT and allow users to access their applications without network-layer visibility

• Getting real-time visibility and control: mine billions of user transactions in seconds to quickly identify gaps in security and ensure compliance with corporate policies

Tony Ferguson, IT Architect, Man Diesel & Turbo Christopher Hodson, Senior Director Office of the CISO, Zscaler 10:30 The Corporate perimeter is Disappearing, how to Protect Users Anytime & Anywhere

Tony Fergusson is an Infrastructure architect, working with many technologies within the Enterprise with a focus on the Security.   Tony has over 20 years of experience in the IT industry and has been recently focusing his efforts on how to secure the enterprise and the internet of things using emerging technologies like software defined networking and cloud security.