{"id":5691,"date":"2022-12-12T09:11:37","date_gmt":"2022-12-12T08:11:37","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=5691"},"modified":"2025-03-12T14:42:50","modified_gmt":"2025-03-12T14:42:50","slug":"zero-trust-access-protects-customer-data","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/it-it\/2022\/12\/products\/zero-trust-access-protects-customer-data\/","title":{"rendered":"Zero Trust Access Protects Customer Data"},"content":{"rendered":"<p>The Pandemic created a tectonic shift in the way most organizations operate, with many employees forced to work from home.\u00a0 This revealed many benefits for both parties that have turned remote working and hybrid workplaces into a productive and sustainable way of operating.\u00a0 This new normal, with a multitude of branch offices of one person, has also created some additional challenges and exposed many issues with remote access VPN.<\/p>\n<p>Fortunately, ZTNA enables remote workers to seamlessly and transparently access the applications, data, and systems they need to be productive, while simultaneously solving all the major issues with VPN: scalability, management, performance, and most importantly, security.<\/p>\n<p>Data security and privacy are critically important and justifiably regulated across most jurisdictions such as GDPR in Europe, the Data Protection Act in the UK, CCPA in the USA, PIPEDA in Canada,\u00a0 and the Privacy Act in Australia, to name just a few.<\/p>\n<p>Some jurisdictions like <a href=\"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Informationen-und-Empfehlungen\/Empfehlungen-nach-Angriffszielen\/Remote\/Home-Office\/home-office_node.html\" target=\"_blank\" rel=\"noopener\">Germany\u2019s Federal Office for Information Security<\/a> (BSI) and the <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/01\/M-22-09.pdf\" target=\"_blank\" rel=\"noopener\">United States Federal Government<\/a>, have taken data protection a step further, by mandating state-of-the-art cybersecurity standards using technologies like zero trust.<\/p>\n<p>Naturally, no organization can afford a data breach, but many are at a loss as to how best to protect against it.\u00a0 Where remote workers are involved, ZTNA is an essential first step as it offers many benefits over VPN:<\/p>\n<ul>\n<li>Unlike VPN, ZTNA doesn\u2019t offer implicit trust and broad access to internal networks. In fact, it works the opposite way, where users are ONLY allowed access to very specific resources while everything else is blocked. The remote device is not \u2018on the network\u2019 which means lateral movement is effectively gone.<\/li>\n<li>ZTNA can work clientless or integrated with an endpoint protection agent to offer better end-user security, and eliminate any potential vulnerabilities in old VPN client software.<\/li>\n<li>ZTNA makes your hosted networked applications completely invisible to the outside world, dramatically reducing your surface area of attack.<\/li>\n<li>ZTNA eliminates credential theft as a potential point of entry as multi-factor authentication is an integral part of the solution.<\/li>\n<\/ul>\n<p>And the best part is, ZTNA is much easier to scale and manage than remote-access VPN solutions.\u00a0 Check out what the BSI Group says about ZTNA in their <a href=\"https:\/\/www.bsigroup.com\/en-IE\/our-services\/digital-trust\/cybersecurity-information-resilience\/Resources\/Whitepapers\/zero-trust-network-access-paper\/thank-you\/\" target=\"_blank\" rel=\"noopener\">brief.<\/a><\/p>\n<p>Watch this video:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/732435497?h=0ef9a953df&amp;portrait=0\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Also, be sure to download our latest white paper: <a href=\"https:\/\/www.sophos.com\/en-us\/whitepaper\/advantages-of-ztna\" target=\"_blank\" rel=\"noopener\">The Top Six Advantages of ZTNA<\/a> to get more insights or visit <a href=\"https:\/\/sophos.com\/ztna\" target=\"_blank\" rel=\"noopener\">Sophos.com\/ztna<\/a> to learn more.<\/p>\n<p><strong>Sophos ZTNA as a Service<\/strong><\/p>\n<p>If you haven\u2019t already, <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/11\/04\/sophos-ztna-2-0-and-macos-early-access-programs-now-available\/\" target=\"_blank\" rel=\"noopener\">join our early access program for Sophos ZTNA as a Service<\/a> that makes ZTNA deployment easier than ever.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust Network Access has emerged at just the right time. It\u2019s the perfect solution, at the perfect time.<\/p>\n","protected":false},"author":19,"featured_media":3000004235,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[70],"tags":[],"coauthors":[44],"class_list":["post-5691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/12\/featured-image-sophos-ztna-partner-news-banner-black-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/posts\/5691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/comments?post=5691"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/posts\/5691\/revisions"}],"predecessor-version":[{"id":5700,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/posts\/5691\/revisions\/5700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/media?parent=5691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/categories?post=5691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/tags?post=5691"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/coauthors?post=5691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}