DevelopersDevSecOpsFeaturedLet's TalkSecurityVideo

Improving Cybersecurity With Zero Trust Network Access 2.0 | Palo Alto Networks


Over the past two years, we have seen a transformation in the work model, with businesses adopting flexible or hybrid work models because of the pandemic. This has driven digital transformation to handle these new needs by connecting users to applications. However, this has also led to an increased risk of cyber attacks. In response to this, many organizations have adopted the Zero Trust model for the hybrid work architect for multi-cloud and digital.

In this episode of TFiR Let’s Talk, Swapnil Bhartiya sits down with Kumar Ramachandran, Senior Vice President of SASE Products, Palo Alto Networks, to discuss Zero Trust Network Access (ZTNA) 2.0 and how it is different from Zero Trust Network Access 1.0. He also goes into detail about some of the current security trends we are seeing and the growing number of threats.

Ramachandran says, “Today, at Palo Alto Networks, we see and stop about 224 billion threats every single day. When you think about the scale at which the threat actors are operating, what becomes very clear is that traditional methods of applying security are not sufficient so you need to have a new way.”

Key highlights from this video interview are:

  • The WFH and hybrid work models have changed the way people need to be connected to do their work. However, it has also increased the surface area for cyber attacks. Many organizations have since looked to adopt Zero Trust to mitigate these risks. Ramachandran explains how Zero Trust can be defined and what led it to be adopted.
  • Ramachandran believes there are three key principles that make up ZTNA 2.0, the principle of least privilege access, the principle of continuous trust verification as well as deep security and data protection. He goes into detail about these principles.
  • People can often think that Zero Trust is a new concept but ZTNA 1.0 was invented in the 2010s. However, it was not designed for a post-pandemic world with the need to consistently provide security and user experience when the user is anywhere in the world. Ramachandran explains some of the limitations of ZTNA 1.0 that led to the need for 2.0.
  • With smart home devices and laptops being used for both private and work life, how we access enterprise applications have also changed and with it, the security risks have grown. Ramachandran discusses the magnitude of the threats and why there is a need for new methods and solutions to tackle the scale of this challenge.
  • Having awareness around security versus putting them into action has been a long-standing issue. Ramachandran believes that awareness and understanding of security are very high; however, if people are not trained then they can be a weak link. He explains the problems with the human component of security and how data science is helping.
  • Edge computing means that applications are running closer to users but this presents security challenges. Ramachandran discusses the importance of having 5G natively built into the networks. He explains how edge computers are about teaming together great user experiences with security and how their ZTNA 2.0 product is doing this.

Connect with Kumar Ramachandran (LinkedIn, Twitter)

Learn more about Palo Alto Networks (Twitter)

The summary of the show is written by Emily Nicholls.

Read Transcript

Don't miss out great stories, subscribe to our newsletter.

Axis Security Announces Atmos 2022 Summer Release To Help Better Protect Enterprise Attack Surface

Previous article

Securing The Budget And Resources Is The Most Difficult Step In A Modernization Project: Report

Next article
Login/Sign up