From inception, we built the Secure Global NetworkTM (SGN) Cloud Platform based on the principles of zero trust. We uniquely implement zero trust at the LAN, WAN, and within the SGN through a multi-layered approach that we unpack in more detail below. Throughout all our features and capabilities, zero trust is incorporated to continuously verify users and devices, limit user access to only necessary resources, and reduce the attack surface area.
The SGN Cloud Platform covers all four zero trust principles as defined by Forrester:
The philosophy behind zero trust, in short, is “Never Trust, Always Verify.” Zero trust in and of itself is not a technology, product, or tool. It’s a culture shift and a strategy where you eliminate implicit trust from your network, assume every connection starts from an unknown and potentially hostile device, segment employees, and limit access to only the data and systems that employees need to do their job. Zero trust addresses the challenges stemming from modern, distributed, and hyper-connected infrastructures.
The SGN Cloud Platform has two primary zero trust capabilities: Zero Trust Network Access (ZTNA) and LAN ZeroTrust (LZT). We explain each of these in detail below along with the associated security benefits and use cases.
ZTNA is a core component of our Secure Access Service Edge (SASE) module. ZTNA, as opposed to legacy solutions like firewalls or VPNs, provides secure access to applications and other resources. It leverages a deny by default design and integrates with identity to allow a user to only access specific applications or services. User identities determine which applications or services they can access. ZTNA prevents access from unverified devices and prevents lateral movement to other devices or systems on the network.
There are several different use cases with our ZTNA, including:
To provide more comprehensive security, we also developed LZT. LZT is a unique prevention and isolation technology for your internal networks. Essentially, LZT is a firewall for the LAN.
In a typical setup, networks assume devices connected internally behind a firewall are safe and allow traffic to flow freely. Ransomware and other cyberattacks bank on this assumption. Threat actors aim to infect one device and then spread laterally across the entire LAN to lock down and encrypt everything.
Our LZT reduces lateral movement with granular segmentation of internal networks. The capabilities enable you to:
In this blog, we focused on our Zero Trust features and capabilities. Zero Trust, including ZTNA, is a core component of our SASE module. As part of the Todyl Security Platform, we have several other capabilities such as our Managed Cloud SIEM (Security Information & Event Management), MXDR (Managed eXtended Detection and Response), Endpoint Security (EDR + NGAV), and Governance Risk & Compliance (GRC) modules that empower you to do even more. If you’d like to learn more about Todyl’s Zero Trust, or any other modules, request time with one of our platform specialists today.