Introducing Zero Trust security

Issue 7 2021 Cyber Security

CIOs must shift their security approach from unconditional confidence in users to zero trust fundamentals. A zero-trust model relies on contextual awareness to adaptively grant access to authorised users using patterns based on identity, time and device posture.

Helen Kruger.

This approach tightens the reins on access security while giving users a choice of devices and apps. At the same time, they need to protect their users, apps and data with end-to-end contextual access. According to Cybersecurity Ventures, cybercrime will cost the world $6 trillion in 2021. Accenture points to internal attacks from malicious insiders as the most common attacks.

CIOs are now responsible for managing a larger attack surface than ever, thanks to end users relying on personal devices for work and accessing cloud apps and corporate resources from remote locations. But how can they deliver the access their employees need to do their best work while protecting the business from internal attacks?

Reduce the attack surface

Too often, businesses get stuck in an endless cycle of adding point products like SSL VPN, single sign-on and endpoint management to address new security use cases. This not only increases complexity, but also creates a fractured experience for end users.

Forrester reports that organisations pursuing zero trust can see significant benefits from choosing a single vendor. Citrix Workspace offers an end-to-end solution to implement zero trust principles, avoiding the gaps left from relying on assorted point solutions. Instead of trying to protect data and resources around the user, Citrix Workspace reduces your attack surface by protecting the user and the apps inside the workspace, where work actually gets done.

Enable remote access without VPN

Remote users need easy access to web applications but relying on traditional VPNs solutions can create significant security risks. If bad actors can gain access through the SSL VPN, they have free reign over an entire network. Businesses therefore need a contextual security solution to meet zero trust requirements while enabling BYOD and access to apps deployed in a cloud.

Citrix Workspace provides a secure space to work by enabling users to remotely access web applications deployed on premises using any device - without needing to access the entire network.

Total security

One small user mistake can cost millions. In fact, on average, a single data breach can total nearly $4 million. This makes it vital for a security strategy to address threats like malicious URLs being accessed, keyloggers, or screen-capturing malware for both managed and unmanaged devices.

A zero-trust approach requires more than strict enrolment policies for employee devices. Citrix Workspace with Citrix Secure Workspace Access goes beyond traditional single sign-on and multi-factor authentication to provide advanced, contextual access management tools for IT.

This includes the ability to disable printing, copying and pasting in certain scenarios, while Citrix Secure Browser isolates web traffic from the corporate network. Additionally, Citrix Endpoint Management keeps BYO, corporate and other managed devices secure by isolating and protecting apps and content accessed in the workspace.

Expand cloud security

Citrix Workspace equips IT with proactive app protection and security policies that let users access all their SaaS and business apps through the Citrix Workspace app. To further protect branch users, Citrix SD-WAN combines comprehensive, cloud-delivered security to provide employees with a great experience, using any app or device.

This masks users and infrastructure from cyber surveillance and encrypts all branch-to-branch egress traffic to prevent interception. By adding this architecture to the full-stack security of Citrix Workspace, one enables multi-layer security from a centralised location to all branches.

This is a simpler and lower-cost solution than installing multiple firewalls across the entire organisation.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber attackers used over 500 tools and tactics in 2022
Cyber Security News
The most common root causes of attacks were unpatched vulnerabilities and compromised credentials, while ransomware continues to be the most common ‘end game’ and attacker dwell time is shrinking – for better or worse.

Addressing the SCADA in the room
Industrial (Industry) Cyber Security
Few other sectors command the breadth of purpose-built and custom devices necessary to function, as the industrial and manufacturing industries. These unique devices create an uncommon risk that must be assessed and understood to fully protect against incoming attacks.

Recession or stress?
Cyber Security News
The economic landscape has seen many technology companies lay off vast numbers of employees, but for cybersecurity, the picture looks very different – a dynamic mixture of excitement, challenges and toxicity.

Vulnerabilities in industrial cellular routers’ cloud management platforms
Industrial (Industry) Cyber Security Security Services & Risk Management
Research from OTORIO, a provider of operational technology cyber and digital risk management solutions, unveils cyber risks in M2M protocols and asset registration that expose hundreds of thousands of devices and OT networks to attack

NEC XON appoints Armand Kruger as Head of Cybersecurity
News Cyber Security
NEC XON has announced the appointment of Armand Kruger as the Head of Cybersecurity. Kruger will oversee all cybersecurity offerings including cybersecurity strategy, programmes, and executive advisory.

Caesar Tonkin new head of cybersecurity business, Armata
News Cyber Security
Vivica Holdings has announced the appointment of cybersecurity expert Caesar Tonkin to head up its cybersecurity business Armata, which provides technology solutions and niche expertise needed to help businesses better protect themselves.

Surveillance-free surfing
News Cyber Security Products
Zoho has launched Ulaa, a privacy-centric browser built specifically to help users secure their personal data and activity by providing a browser solution that universally blocks tracking and website surveillance.

Troye and Arctic Wolf join forces
News Cyber Security Security Services & Risk Management
Troye has announced a strategic partnership with Arctic Wolf to enable Troye to provide customers with enhanced cybersecurity solutions and services that help protect their businesses from advanced cyber threats.

Relaxed home cybersecurity could render consumers accidental ‘inside actors’
Editor's Choice Cyber Security Smart Home Automation
Cisco security experts warn of snowball impact of relaxed approach to cybersecurity on personal devices, noting 60% of users primarily use their personal phone for work tasks and 76% have used unsecured public networks for work tasks.

VMware unveils new security capabilities
Cyber Security IT infrastructure Products
At the RSA Conference 2023, VMware unveiled enhanced features for its suite of security solutions to address the increasing sophistication and scale of cyberattacks and to deliver strong lateral security across multi-cloud environments.