CS Jan-Feb 2024
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
zero trust<br />
NO COMPROMISE ON TRUST<br />
MACMON SECURE IS ADAMANT THAT NO DEVICE, NOR USER, SHOULD<br />
BE TRUSTED UNTIL SECURE AUTHENTICATION HAS TAKEN PLACE<br />
External network access to company<br />
resources is the new normal these days,<br />
says macmon secure. "Devices access<br />
cloud services, email applications and other<br />
potentially confidential company resources<br />
from anywhere and at any time. Separating<br />
cybersecurity efforts by technology is no<br />
longer a sustainable approach. Companies<br />
need to develop new integrated strategies<br />
that combine IT, OT and IoT security efforts<br />
and maximise the use of all the company's<br />
cybersecurity resources. Developing a<br />
comprehensive security strategy that<br />
addresses the current and emerging risks of<br />
digitalisation has never been more urgent."<br />
ZERO TRUST NETWORK ACCESS<br />
(ZTNA) - SECURITY CONCEPT FOR<br />
IT AND OT NETWORKS<br />
"The Zero Trust Network approach puts a stop<br />
to the damage of the growing number of<br />
cyberattacks and is based on the philosophy<br />
that neither a device nor a user should be<br />
trusted until secure authentication has taken<br />
place," the company adds. "The focus of<br />
ZTNA is on resources - and not on traditional<br />
perimeter security at the interface between<br />
a private or corporate network and a public<br />
network such as the internet. The 'new<br />
workers', or external service providers, access<br />
tools and company data from anywhere,<br />
using devices and apps. With ZTNA, it is<br />
possible to guarantee data security in the<br />
long term and meet modern network security<br />
requirements."<br />
OVERVIEW & CONTROL<br />
IMPROVE SECURITY<br />
ZTNA offers several advantages for<br />
companies that want to improve their<br />
network security. "ZTNA provides greater<br />
flexibility and scalability for organisations<br />
that need to adapt to changing<br />
business requirements and digital<br />
transformation. The concept of<br />
ZTNA is based on restriction and<br />
monitoring: Network Access Control<br />
(NAC) solutions only allow defined<br />
devices access to the network,<br />
regardless of whether they are<br />
iPads, laptops, medical or<br />
technical devices. IT administrators<br />
always know which<br />
devices are logged into the local<br />
network and can permanently<br />
identify and monitor them<br />
thanks to the complete<br />
network overview. Any<br />
device that has no<br />
business in the network is denied access from<br />
the outset.<br />
"With the increasing networking of<br />
production systems, which in some cases<br />
extends into the office world, the complexity<br />
and vulnerability of networks is increasing.<br />
With ZTNA, unauthorized use of systems in<br />
administration and production is therefore<br />
virtually impossible."<br />
A leading NAC solution should fulfil two<br />
requirements, states macmon secure: a<br />
complete overview of which devices are in<br />
the IT and OT network, and where they are<br />
located. "The type of device, such as clients,<br />
printers, production systems, ATMs, medical<br />
or technical devices, should not matter. This<br />
means that only authorised resources can be<br />
operated in the network. An efficient solution<br />
should also offer a simple deployment and<br />
maintenance, support of the industry<br />
standard 802.1X and seamless integration<br />
with a wide range of third-party security<br />
solutions. This significantly increases IT and<br />
OT network security."<br />
Comments Christian Bücker, pictured left,<br />
Global Product Line Software, macmon<br />
secure: "Our solution is regularly rated very<br />
positively in tests and has received several<br />
awards from international trade journals.<br />
Our clients come from public sector,<br />
healthcare, financial services, science,<br />
research, telecommunications, trade,<br />
industry, transport or logistics. The acquisition<br />
by Belden in 2022 puts us in a truly unique<br />
position, as we combine IT expertise with OT<br />
experience on many levels. We are part of<br />
Belden's Industrial Automation Solution,<br />
a global organisation headquartered in<br />
the Stuttgart region that includes leading<br />
network and connectivity brands."<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Jan</strong>/<strong>Feb</strong> <strong>2024</strong> computing security<br />
21