20.12.2023 Views

CS Jan-Feb 2024

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

zero trust<br />

NO COMPROMISE ON TRUST<br />

MACMON SECURE IS ADAMANT THAT NO DEVICE, NOR USER, SHOULD<br />

BE TRUSTED UNTIL SECURE AUTHENTICATION HAS TAKEN PLACE<br />

External network access to company<br />

resources is the new normal these days,<br />

says macmon secure. "Devices access<br />

cloud services, email applications and other<br />

potentially confidential company resources<br />

from anywhere and at any time. Separating<br />

cybersecurity efforts by technology is no<br />

longer a sustainable approach. Companies<br />

need to develop new integrated strategies<br />

that combine IT, OT and IoT security efforts<br />

and maximise the use of all the company's<br />

cybersecurity resources. Developing a<br />

comprehensive security strategy that<br />

addresses the current and emerging risks of<br />

digitalisation has never been more urgent."<br />

ZERO TRUST NETWORK ACCESS<br />

(ZTNA) - SECURITY CONCEPT FOR<br />

IT AND OT NETWORKS<br />

"The Zero Trust Network approach puts a stop<br />

to the damage of the growing number of<br />

cyberattacks and is based on the philosophy<br />

that neither a device nor a user should be<br />

trusted until secure authentication has taken<br />

place," the company adds. "The focus of<br />

ZTNA is on resources - and not on traditional<br />

perimeter security at the interface between<br />

a private or corporate network and a public<br />

network such as the internet. The 'new<br />

workers', or external service providers, access<br />

tools and company data from anywhere,<br />

using devices and apps. With ZTNA, it is<br />

possible to guarantee data security in the<br />

long term and meet modern network security<br />

requirements."<br />

OVERVIEW & CONTROL<br />

IMPROVE SECURITY<br />

ZTNA offers several advantages for<br />

companies that want to improve their<br />

network security. "ZTNA provides greater<br />

flexibility and scalability for organisations<br />

that need to adapt to changing<br />

business requirements and digital<br />

transformation. The concept of<br />

ZTNA is based on restriction and<br />

monitoring: Network Access Control<br />

(NAC) solutions only allow defined<br />

devices access to the network,<br />

regardless of whether they are<br />

iPads, laptops, medical or<br />

technical devices. IT administrators<br />

always know which<br />

devices are logged into the local<br />

network and can permanently<br />

identify and monitor them<br />

thanks to the complete<br />

network overview. Any<br />

device that has no<br />

business in the network is denied access from<br />

the outset.<br />

"With the increasing networking of<br />

production systems, which in some cases<br />

extends into the office world, the complexity<br />

and vulnerability of networks is increasing.<br />

With ZTNA, unauthorized use of systems in<br />

administration and production is therefore<br />

virtually impossible."<br />

A leading NAC solution should fulfil two<br />

requirements, states macmon secure: a<br />

complete overview of which devices are in<br />

the IT and OT network, and where they are<br />

located. "The type of device, such as clients,<br />

printers, production systems, ATMs, medical<br />

or technical devices, should not matter. This<br />

means that only authorised resources can be<br />

operated in the network. An efficient solution<br />

should also offer a simple deployment and<br />

maintenance, support of the industry<br />

standard 802.1X and seamless integration<br />

with a wide range of third-party security<br />

solutions. This significantly increases IT and<br />

OT network security."<br />

Comments Christian Bücker, pictured left,<br />

Global Product Line Software, macmon<br />

secure: "Our solution is regularly rated very<br />

positively in tests and has received several<br />

awards from international trade journals.<br />

Our clients come from public sector,<br />

healthcare, financial services, science,<br />

research, telecommunications, trade,<br />

industry, transport or logistics. The acquisition<br />

by Belden in 2022 puts us in a truly unique<br />

position, as we combine IT expertise with OT<br />

experience on many levels. We are part of<br />

Belden's Industrial Automation Solution,<br />

a global organisation headquartered in<br />

the Stuttgart region that includes leading<br />

network and connectivity brands."<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Jan</strong>/<strong>Feb</strong> <strong>2024</strong> computing security<br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!