尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Secure Access wherever you need
Q1 2023
2
© Fortinet Inc. All Rights Reserved.
ZTNA Business Drivers
Work From Anywhere (WFA) Cloud Journey
Improved User Experience
Ransomware Attacks
Flexible Administration
Reduced Attack Surface
Users Access unaffected
by Location
Applications unaffected
by Location
Granular Application
Access
3
© Fortinet Inc. All Rights Reserved.
User-based Security
Consistent Experience in
all locations
Automatic, Secure Tunnels
Single Sign-on (SSO) Support
Supporting Work From Anywhere
4
© Fortinet Inc. All Rights Reserved.
Supporting the Cloud Journey
Controlling access to hybrid cloud architecture
• Applications located anywhere
• Centrally managed across on-prem or remote
enforcement points
• User groups enable bulk configuration
• Granular modifications available
Private
Cloud
Public
Cloud
Data
Center
5
© Fortinet Inc. All Rights Reserved.
Encrypted
Communication
Application
Access
Posture
Check
User
Identity
Device
Trust
1
2
3
4
5
Granular Control to Applications
Reducing the Attack Surface
VISIBILITY
& CONTROL
Zero Trust
CONTINUOUS
ASSESSMENT
 Identify & Authenticate device
 Authorized device or BYOD?
 Approved for access? revoked?
1
 User identity should be verified
 Strong MFA
 Role-based access controls
2
 Adaptive and conditional access
 Security Compliance
 Device Vulnerabilities
3
 Verify Application Access
 Application Specific Access
 Application not available to internet
4
 End-to-end encryption
 Data protection
 All communication is logged
5
6
© Fortinet Inc. All Rights Reserved.
Focused on Remote Access
Cloud-based ZTNA Offerings
Policy
Public
Cloud
Private
Cloud
Data Center
Remote
Remote Users User verification prior to access App Connectors Complete
Connection
Branch
ZTNA
Service
App Connectors
App Connectors
Campus
7
© Fortinet Inc. All Rights Reserved.
VPN tunnel to Cloud for ZTNA
check
• Internet traffic out to cloud
1
SaaS
Apps
Public
Cloud Apps
Hosted Apps
(on Public IP)
Cloud-based ZTNA and On-Prem
ZTNA connection back to App
Connector for On-Prem
 Traffic flow up & down
2
Data Center
ZTNA
Cloud
Campus
App Connectors
User
8
© Fortinet Inc. All Rights Reserved.
Resources
Everywhere
Entities
Anywhere
Speed Operations, with
AI-powered Automation
Secure Any Application
Journey on Any Cloud
Users & Devices Networks Applications
Apps & data
live in many
locations
Users connect
from many
locations
Everything needs
to be secure &
compliant
Building block
service creation
Control and Protect
Everyone and Everything
on or off the Network
Speed Counter
Threats, with
Coordinated Protection
Zero Trust Architecture - Consistent Security Everywhere
Fortinet Technology Vision
9
© Fortinet Inc. All Rights Reserved.
Enforcing Zero Trust Access Across All Edges
Fortinet Universal ZTNA Architecture
APPLICATIONS CAN
BE ANYWHERE
ACCESS SPECIFIC APPLICATIONS
CONTINUOUS TRUST CHECK
USER CONTEXTUAL RULE SET
Data Center
Campus
Branch
Home
Travel
Cloud
SaaS
User
ZTNA
ZTNA
Application Gateway
User identity Policy Engine
USERS CAN BE
ANYWHERE
User Identity and Device
Posture ENFORCEMENT
10
© Fortinet Inc. All Rights Reserved.
Universal ZTNA Technical Architecture
Secure just enough
access
Continuous posture
re-evaluation
Fabric Sync
ZTNA Telemetry
Data
Centre 1
FortiSASE
FGT
Validate
Device
Verify
User
Device
Posture
Application
Access Only
Management
Plane
INTERNET
Agent
ZTNA Access
on-/off-net
ZTNA
Orchestrator
continious check & adaptive enforcement
Access Proxy
Access Proxy
11
© Fortinet Inc. All Rights Reserved.
Converged Architecture for a consistent user experience
Applying Zero Trust to Users and Devices Everywhere
SD-WAN
NGFW
SD-WAN
Network
SD-WAN
NGFW
Public Cloud
SaaS
Internet
Edge
Resources
Everywhere
Data Center
Devices
Users
OFFICE
Branch
Campus OT
WFH
Agent
Agentless
SD-WAN
On-Ramp
NGFW
SD-WAN
Hub
NGFW
ZTNA
ZTNA
ZTNA
ZTNA
REMOTE
Users
Agent
Agentless
Fortinet
Cloud
FortiSASE ZTNA
Central Management &
Digital Monitoring
12
© Fortinet Inc. All Rights Reserved.
VPN tunnel for SASE traffic
• Control for SaaS Apps
1
SaaS
Apps
Public
Cloud Apps
Hosted Apps
(on Public IP)
ZTNA and FortiSASE
Data Center 2
ZTNA Access to Data Center
Apps (split tunnel)
 ZTNA connections provisioned
from SASE
 Direct Connection to Application
 User & Device Verification
 Per-session Posture Check
 Continuous Re-Assessment
2
FortiClient Central Management
Data Center 1
Fortinet PoP
Remote
13
© Fortinet Inc. All Rights Reserved.
What’s it made of? Existing Fortinet security fabric products that many customers already have.
Fortinet ZTNA
CORE ELEMENTS
FortiOS performs access checks,
maintains user group/application
access table, proxies application
(FOS 7.0+)
FortiClient Central Management
configures the ZTNA agent;
FortiClient for the encrypted tunnel,
posture assessment
(FortiClient 7.0+)
Authentication Solution
FortiOS FortiClient/Central
Management
FortiAuthenticator
FortiToken
any 3rd party ID providers supported
by the Security Fabric
ZTNA Application Gateway
ZTNA Agent &
Policy Orchestration
FortiTrust Identity
14
© Fortinet Inc. All Rights Reserved.
• FOS-based ZTNA
• Leveraging existing investments in FortiGates (lower TCO)
• Complete WFA coverage, including campus
• Traffic traversing Industry-leading FortiGate technology
• Leverage SD-WAN, SD-Branch capabilities
• ZTNA Client also VPN client
• Transition to ZTNA simplified
• Shift to ZTNA at customer’s pace
• No Licenses Required
• Simply a feature in FOS & FortiClient to turn on!
Fortinet ZTNA advantages
Convergence of capabilities, Complete coverage, and Cost
Fortinet Championship Trophy
15
© Fortinet Inc. All Rights Reserved.
• Ongoing verification of users and devices
• Per session user identity checks
• Per session device posture checks (OS version, A/V status,
vulnerability assessment)
• More granular control
• Access granted only to specific application
• No more broad VPN access to the network
• Easier user experience
• Auto-initiates secure tunnel when user accesses applications
• Same experience on and off-net
The Evolution of (Remote) Access to Applications
Bringing Zero Trust principles to Remote Access
16
© Fortinet Inc. All Rights Reserved.
ZTNA Convergence Business Advantages
Allows migrating
without lock-in
Intgrated through
the fabric
CLOUD
INDEPENDENCE
Improves
security posture
and application
access
Future Proof –
NIST 800-207
COMPLIANCE
Integrates and
includes in-line
and API CASB
functions
CORRELATION MIGRATION
Can offer a hybrid SSLVPN
+ ZTNA approach to
provide a smooth migration
at the pace of the Customer
For example, may use
ZTNA for subset of apps,
and SASE
for others
17
© Fortinet Inc. All Rights Reserved.
ZTNA Convergence Business Advantages
Seamless
integration with
SASE to protect
remote
endpoints
and enforce
ZTNA
for SaaS apps
INTEGRATION
Possibility to
combine
ZTNA and
Endpoint
Management
OPTIMIZATION
Automated
provisioning
Automated
ZTNA encryption
(no button
for user to click)
AUTOMATION
18
© Fortinet Inc. All Rights Reserved.
Journey to SASE
Expanding SD-WAN / SD-Branch to add ZTNA and SASE
SD-WAN and
SD-Branch Deployed
Central / Cloud Managed
NGFW with Managed Switching,
Wireless and 5G Backup
Low TCO, highly-integrated single pane
management
ZTNA for Private
App Access
ZTNA Agent & Global Posture
Fabric-integrated, scalable & flexible
remote access
SASE to
Secure Remote Users
SASE
Location-independent perimeter firewall for
secure access
20
© Fortinet Inc. All Rights Reserved.
SASE
Public Cloud
Hosted SaaS
Zero
Trust Edge
FortiOS FortiOS
FortiOS FortiOS
SD-WAN
FortiCloud
Management Plane
FortiOS Everywhere
Native Integration
(SASE  SD-WAN)
Unified Policy
Unified Endpoint
Unified Posture
Remote User and Thin Branch On Prem
Single
Policy
Unified Endpoint
Management
ZTNA Posture
Database
Intent-based & ABAC
FortiOS Everywhere

More Related Content

What's hot

Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
Arpan Raval
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Zero Trust
Zero TrustZero Trust
Zero Trust
Boaz Shunami
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
Okta-Inc
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
Cheah Eng Soon
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
Bhushan Gurav
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
Virginia Fernandez
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 

What's hot (20)

Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 

Similar to 4_Session 1- Universal ZTNA.pptx

ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
gagip37481
 
Fortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideFortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative Guide
InstaSafe Technologies
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
rezkellahhichem
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ivanti
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
Mohit8780
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
Aruj Thirawat
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
ksholes
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
Nicolas su
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Technologies
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
Cristian Garcia G.
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
ImamBahrudin5
 
Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018
Meghan Weinreich
 
Cloudflare Access
Cloudflare AccessCloudflare Access
Cloudflare Access
Meghan Weinreich
 
App gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_accessApp gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_access
Cristian Garcia G.
 
Datasheet Forefront Unified Access Gateway
Datasheet Forefront Unified Access GatewayDatasheet Forefront Unified Access Gateway
Datasheet Forefront Unified Access Gateway
Microsoft Norge AS
 
Forefront Unified Access Gateway
Forefront Unified Access GatewayForefront Unified Access Gateway
Forefront Unified Access Gateway
Microsoft Norge AS
 
Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access Infrastructure
Emirates Computers
 
End point control
End point controlEnd point control
End point control
Lan & Wan Solutions
 
Securing Internal Applications with Cloudflare Access
Securing Internal Applications with Cloudflare AccessSecuring Internal Applications with Cloudflare Access
Securing Internal Applications with Cloudflare Access
Cloudflare
 

Similar to 4_Session 1- Universal ZTNA.pptx (20)

ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
 
Fortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideFortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative Guide
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018
 
Cloudflare Access
Cloudflare AccessCloudflare Access
Cloudflare Access
 
App gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_accessApp gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_access
 
Datasheet Forefront Unified Access Gateway
Datasheet Forefront Unified Access GatewayDatasheet Forefront Unified Access Gateway
Datasheet Forefront Unified Access Gateway
 
Forefront Unified Access Gateway
Forefront Unified Access GatewayForefront Unified Access Gateway
Forefront Unified Access Gateway
 
Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access Infrastructure
 
End point control
End point controlEnd point control
End point control
 
Securing Internal Applications with Cloudflare Access
Securing Internal Applications with Cloudflare AccessSecuring Internal Applications with Cloudflare Access
Securing Internal Applications with Cloudflare Access
 

Recently uploaded

Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device SecurityTrends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Lumiverse Solutions Pvt Ltd
 
japie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel_ ai windhoek june 2024.pptxjapie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel
 
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
adocd
 
40 questions/answer Azure Interview Questions
40 questions/answer Azure Interview Questions40 questions/answer Azure Interview Questions
40 questions/answer Azure Interview Questions
mohammedbouna1
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
rajesh344555
 
VVIP Call Girls Kolkata💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Se...
VVIP Call Girls Kolkata💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Se...VVIP Call Girls Kolkata💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Se...
VVIP Call Girls Kolkata💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Se...
graggunno
 
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
THE MOST
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
payalgupta2u
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
rajesh344555
 
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies''Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
APNIC
 
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts ServiceCall Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
DipikaKaurr
 
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort ServiceVVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
graggunno
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
manalishivani8
 
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
keshavtiwari584
 
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKIMeasuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
APNIC
 
Tesla Humanoid Robot - PPT in 11 Simple Slide
Tesla Humanoid Robot - PPT in 11 Simple SlideTesla Humanoid Robot - PPT in 11 Simple Slide
Tesla Humanoid Robot - PPT in 11 Simple Slide
abzjkr
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
manalishivani8
 
peru primero de la alianza con el pacifico
peru primero de la alianza con el pacificoperu primero de la alianza con el pacifico
peru primero de la alianza con el pacifico
FernandoGuevaraVentu2
 

Recently uploaded (20)

Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device SecurityTrends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
 
japie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel_ ai windhoek june 2024.pptxjapie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel_ ai windhoek june 2024.pptx
 
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
 
40 questions/answer Azure Interview Questions
40 questions/answer Azure Interview Questions40 questions/answer Azure Interview Questions
40 questions/answer Azure Interview Questions
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
 
VVIP Call Girls Kolkata💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Se...
VVIP Call Girls Kolkata💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Se...VVIP Call Girls Kolkata💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Se...
VVIP Call Girls Kolkata💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Se...
 
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
 
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies''Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
 
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts ServiceCall Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
 
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort ServiceVVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
 
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
 
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKIMeasuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
 
Tesla Humanoid Robot - PPT in 11 Simple Slide
Tesla Humanoid Robot - PPT in 11 Simple SlideTesla Humanoid Robot - PPT in 11 Simple Slide
Tesla Humanoid Robot - PPT in 11 Simple Slide
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
 
peru primero de la alianza con el pacifico
peru primero de la alianza con el pacificoperu primero de la alianza con el pacifico
peru primero de la alianza con el pacifico
 

4_Session 1- Universal ZTNA.pptx

  • 1. Secure Access wherever you need Q1 2023
  • 2. 2 © Fortinet Inc. All Rights Reserved. ZTNA Business Drivers Work From Anywhere (WFA) Cloud Journey Improved User Experience Ransomware Attacks Flexible Administration Reduced Attack Surface Users Access unaffected by Location Applications unaffected by Location Granular Application Access
  • 3. 3 © Fortinet Inc. All Rights Reserved. User-based Security Consistent Experience in all locations Automatic, Secure Tunnels Single Sign-on (SSO) Support Supporting Work From Anywhere
  • 4. 4 © Fortinet Inc. All Rights Reserved. Supporting the Cloud Journey Controlling access to hybrid cloud architecture • Applications located anywhere • Centrally managed across on-prem or remote enforcement points • User groups enable bulk configuration • Granular modifications available Private Cloud Public Cloud Data Center
  • 5. 5 © Fortinet Inc. All Rights Reserved. Encrypted Communication Application Access Posture Check User Identity Device Trust 1 2 3 4 5 Granular Control to Applications Reducing the Attack Surface VISIBILITY & CONTROL Zero Trust CONTINUOUS ASSESSMENT  Identify & Authenticate device  Authorized device or BYOD?  Approved for access? revoked? 1  User identity should be verified  Strong MFA  Role-based access controls 2  Adaptive and conditional access  Security Compliance  Device Vulnerabilities 3  Verify Application Access  Application Specific Access  Application not available to internet 4  End-to-end encryption  Data protection  All communication is logged 5
  • 6. 6 © Fortinet Inc. All Rights Reserved. Focused on Remote Access Cloud-based ZTNA Offerings Policy Public Cloud Private Cloud Data Center Remote Remote Users User verification prior to access App Connectors Complete Connection Branch ZTNA Service App Connectors App Connectors Campus
  • 7. 7 © Fortinet Inc. All Rights Reserved. VPN tunnel to Cloud for ZTNA check • Internet traffic out to cloud 1 SaaS Apps Public Cloud Apps Hosted Apps (on Public IP) Cloud-based ZTNA and On-Prem ZTNA connection back to App Connector for On-Prem  Traffic flow up & down 2 Data Center ZTNA Cloud Campus App Connectors User
  • 8. 8 © Fortinet Inc. All Rights Reserved. Resources Everywhere Entities Anywhere Speed Operations, with AI-powered Automation Secure Any Application Journey on Any Cloud Users & Devices Networks Applications Apps & data live in many locations Users connect from many locations Everything needs to be secure & compliant Building block service creation Control and Protect Everyone and Everything on or off the Network Speed Counter Threats, with Coordinated Protection Zero Trust Architecture - Consistent Security Everywhere Fortinet Technology Vision
  • 9. 9 © Fortinet Inc. All Rights Reserved. Enforcing Zero Trust Access Across All Edges Fortinet Universal ZTNA Architecture APPLICATIONS CAN BE ANYWHERE ACCESS SPECIFIC APPLICATIONS CONTINUOUS TRUST CHECK USER CONTEXTUAL RULE SET Data Center Campus Branch Home Travel Cloud SaaS User ZTNA ZTNA Application Gateway User identity Policy Engine USERS CAN BE ANYWHERE User Identity and Device Posture ENFORCEMENT
  • 10. 10 © Fortinet Inc. All Rights Reserved. Universal ZTNA Technical Architecture Secure just enough access Continuous posture re-evaluation Fabric Sync ZTNA Telemetry Data Centre 1 FortiSASE FGT Validate Device Verify User Device Posture Application Access Only Management Plane INTERNET Agent ZTNA Access on-/off-net ZTNA Orchestrator continious check & adaptive enforcement Access Proxy Access Proxy
  • 11. 11 © Fortinet Inc. All Rights Reserved. Converged Architecture for a consistent user experience Applying Zero Trust to Users and Devices Everywhere SD-WAN NGFW SD-WAN Network SD-WAN NGFW Public Cloud SaaS Internet Edge Resources Everywhere Data Center Devices Users OFFICE Branch Campus OT WFH Agent Agentless SD-WAN On-Ramp NGFW SD-WAN Hub NGFW ZTNA ZTNA ZTNA ZTNA REMOTE Users Agent Agentless Fortinet Cloud FortiSASE ZTNA Central Management & Digital Monitoring
  • 12. 12 © Fortinet Inc. All Rights Reserved. VPN tunnel for SASE traffic • Control for SaaS Apps 1 SaaS Apps Public Cloud Apps Hosted Apps (on Public IP) ZTNA and FortiSASE Data Center 2 ZTNA Access to Data Center Apps (split tunnel)  ZTNA connections provisioned from SASE  Direct Connection to Application  User & Device Verification  Per-session Posture Check  Continuous Re-Assessment 2 FortiClient Central Management Data Center 1 Fortinet PoP Remote
  • 13. 13 © Fortinet Inc. All Rights Reserved. What’s it made of? Existing Fortinet security fabric products that many customers already have. Fortinet ZTNA CORE ELEMENTS FortiOS performs access checks, maintains user group/application access table, proxies application (FOS 7.0+) FortiClient Central Management configures the ZTNA agent; FortiClient for the encrypted tunnel, posture assessment (FortiClient 7.0+) Authentication Solution FortiOS FortiClient/Central Management FortiAuthenticator FortiToken any 3rd party ID providers supported by the Security Fabric ZTNA Application Gateway ZTNA Agent & Policy Orchestration FortiTrust Identity
  • 14. 14 © Fortinet Inc. All Rights Reserved. • FOS-based ZTNA • Leveraging existing investments in FortiGates (lower TCO) • Complete WFA coverage, including campus • Traffic traversing Industry-leading FortiGate technology • Leverage SD-WAN, SD-Branch capabilities • ZTNA Client also VPN client • Transition to ZTNA simplified • Shift to ZTNA at customer’s pace • No Licenses Required • Simply a feature in FOS & FortiClient to turn on! Fortinet ZTNA advantages Convergence of capabilities, Complete coverage, and Cost Fortinet Championship Trophy
  • 15. 15 © Fortinet Inc. All Rights Reserved. • Ongoing verification of users and devices • Per session user identity checks • Per session device posture checks (OS version, A/V status, vulnerability assessment) • More granular control • Access granted only to specific application • No more broad VPN access to the network • Easier user experience • Auto-initiates secure tunnel when user accesses applications • Same experience on and off-net The Evolution of (Remote) Access to Applications Bringing Zero Trust principles to Remote Access
  • 16. 16 © Fortinet Inc. All Rights Reserved. ZTNA Convergence Business Advantages Allows migrating without lock-in Intgrated through the fabric CLOUD INDEPENDENCE Improves security posture and application access Future Proof – NIST 800-207 COMPLIANCE Integrates and includes in-line and API CASB functions CORRELATION MIGRATION Can offer a hybrid SSLVPN + ZTNA approach to provide a smooth migration at the pace of the Customer For example, may use ZTNA for subset of apps, and SASE for others
  • 17. 17 © Fortinet Inc. All Rights Reserved. ZTNA Convergence Business Advantages Seamless integration with SASE to protect remote endpoints and enforce ZTNA for SaaS apps INTEGRATION Possibility to combine ZTNA and Endpoint Management OPTIMIZATION Automated provisioning Automated ZTNA encryption (no button for user to click) AUTOMATION
  • 18. 18 © Fortinet Inc. All Rights Reserved. Journey to SASE Expanding SD-WAN / SD-Branch to add ZTNA and SASE SD-WAN and SD-Branch Deployed Central / Cloud Managed NGFW with Managed Switching, Wireless and 5G Backup Low TCO, highly-integrated single pane management ZTNA for Private App Access ZTNA Agent & Global Posture Fabric-integrated, scalable & flexible remote access SASE to Secure Remote Users SASE Location-independent perimeter firewall for secure access
  • 19.
  • 20. 20 © Fortinet Inc. All Rights Reserved. SASE Public Cloud Hosted SaaS Zero Trust Edge FortiOS FortiOS FortiOS FortiOS SD-WAN FortiCloud Management Plane FortiOS Everywhere Native Integration (SASE  SD-WAN) Unified Policy Unified Endpoint Unified Posture Remote User and Thin Branch On Prem Single Policy Unified Endpoint Management ZTNA Posture Database Intent-based & ABAC FortiOS Everywhere

Editor's Notes

  1. We consistently hear that organizations are looking at ZTNA to address one or more of these issues. The most common reason people are looking at ZTNA is to support work from anywhere (WFA) initiatives. As organizations emerge from pandemic shut downs, they are looking for way to provide safe access to employees who want to work in the office some days a week and some days in the home. They rolled out VPN access when they pushed everyone out of the office and now they are looking for a better solution for the long term. Some organizations are looking to ZTNA to help them reduce their risk profile, using the additional checks and segmentation to reduce the attack surface. Other organizations are concerned about their cloud journey as they shift applications to the cloud and how to maintain control over who has access to those applications. ZTNA can help with that, too.
  2. With respect to the cloud journey, with ZTNA, the IT department maintains granular access control to applications so applications can be moved to the cloud or even between clouds and users will be none the wise. The users will have no idea where the application is hosted as they will only be connecting to the ZTNA enforcement point (which they don’t even know where that is located), and the connection is then passed on to the application (once all the checks have been successfully passed).
  3. The result of these changes is that we have shifted from a network architecture where we work in one place and our applications are in the local data center; one where we can check people at the door and when they connect to the network and then trust them with unfettered access. We’ve shifted from a concentric model to a mesh architecture where we have users working in many locations as we are providing applications in many places. So it makes no sense for us to use the same trust models in this new architecture. We need to shift to an explicit trust model, where we verify a user and device prior to granting access to a resource. That’s the basics of zero trust. I heard someone describe the idea of zero trust as “treating the inside like the outside”. I think that is a good way to picture the result of deploying zero trust capabilities in that all connections, even internal ones, are evaluated as if they are coming from a remote user.
  4. To use Fortinet’s ZTNA capabilities, organizations need two elements: something running FortiOS, most likely a FortiGate, and our ZTNA agent which is part of FortiClient. ZTNA was introduced in our FOS 7.0 code, which was released in the Spring of 2021 so the FortiGates and FortiClient do need to be on 7.0 or later firmware. If your customer already has FortiGate and FortiClient - no license required for ZTNA. While and authentication solution required for ZTNA, it is not required to be a Fortinet solution. We do have an excellent solution in our FortiAuthenticator and FortiToken products, or our new FortiTrust Identity services, but Fortinet’s ZTNA will also work with any of the many 3rd party ID providers such as Azure AD, Okta, Ping, etc. In addition to the fact that our ZTNA agent is part of FortiClient – we should also note that VPN is part of FortiClient. The benefit here is that it allows you to roll out ZTNA to your customers at the pace (migrate to ZTNA one application at a time) that is right for them – and there are no significant architectural changes from their existing Fortinet VPN to Fortinet ZTNA. FortiGate is acting as either the ZTNA enforcement or the VPN concentrator = simplified Many ask: Will VPNs go away completely? Over time, application access will shift to ZTNA we expect that 80% of users will be using ZTNA However, there will be instances when a VPN will still be needed. There could be situation when a user needs to access a network resource - thus they will need a VPN ZTNA operates above the network – at the application layer – so, there’s no need for ZTNA to grant access to a segment of the network. And FortiClient is intelligent enough that it knows when to send traffic to ZNTA process and other to VPN – your customers could have both tunnels going and being routed at the same time.
  5. By delivering our ZTNA as part of our firewall, we gain many advantages to the cloud-only solutions on the market. The most important benefit is that by putting the ZTNA in firewall enables it to go wherever a firewall can be deployed. So you can have ZTNA coverage for remote workers as we as those in dense, campus settings, accessing on-prem applications. This really is Universal ZTNA. Second, because this is a firewall, the traffic going through ZTNA can have the full security stack applied to it. And because this is a FortiGate firewall, you also have the benefit of license-free SD-WAN and the application awareness for better user experiences. I also noted that our ZTNA agent is part of FortiClient, our VPN agent. This merged VPN and ZTNA agent makes it easy to transition from a VPN-based remote access to ZTNA application access. Applications can be moved over the ZTNA control one-at-a-time, in a very controlled fashion, ensuring that users get the access they need even as the security is improved. And finally, these ZTNA capabilities are free. They are included with FortiGate OS and with FortiClient. Existing users simply need to turn them on and new users have no extra licenses to purchase.
  6. So we see that ZTNA is how the access to applications is evolving. It is more than just a replacement for remote access via VPN, it is bringing the principles of zero trust to application access- ongoing verification of users and devices partnered with granted granular access, just enough access to do the job. And in a rare case, ZTNA is improving the security of the organization while also improving the user experience. With much of the security checks being done in background and with a consistent experience, it’s a win-win for users and security champions. Thank you for your time
  7. The result of these changes is that we have shifted from a network architecture where we work in one place and our applications are in the local data center; one where we can check people at the door and when they connect to the network and then trust them with unfettered access. We’ve shifted from a concentric model to a mesh architecture where we have users working in many locations as we are providing applications in many places. So it makes no sense for us to use the same trust models in this new architecture. We need to shift to an explicit trust model, where we verify a user and device prior to granting access to a resource. That’s the basics of zero trust. I heard someone describe the idea of zero trust as “treating the inside like the outside”. I think that is a good way to picture the result of deploying zero trust capabilities in that all connections, even internal ones, are evaluated as if they are coming from a remote user.
  8. The result of these changes is that we have shifted from a network architecture where we work in one place and our applications are in the local data center; one where we can check people at the door and when they connect to the network and then trust them with unfettered access. We’ve shifted from a concentric model to a mesh architecture where we have users working in many locations as we are providing applications in many places. So it makes no sense for us to use the same trust models in this new architecture. We need to shift to an explicit trust model, where we verify a user and device prior to granting access to a resource. That’s the basics of zero trust. I heard someone describe the idea of zero trust as “treating the inside like the outside”. I think that is a good way to picture the result of deploying zero trust capabilities in that all connections, even internal ones, are evaluated as if they are coming from a remote user.
  9. Starting point is an existing SD-WAN / SD-Branch setup NOTE, a single location NGFW can also be converted into an SDWAN Hub (so it’s supported) Add ZTNA for the most secure private app access, and reduce attack surface / chance of ransomware Enable SASE to secure remote user traffic, plus interconnect with any private apps not yet enable for ZTNA.
  10. As per the animation: Unified management plane handles endpoint on-boarding plus single / global posture database and unified policy Single policy and posture installed everywhere All components inter-connect natively (such as SASE and SDWAN)
  翻译: