hero-background-color-red-orange-gradient
image
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_HERO
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_HERO
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_card_hero
Person holding a mobile phone while sitting at a table with a laptop and a cup of coffee
content
content-col-11

SASE and ZTNA: Empowering and protecting hybrid workforces

The widespread adoption of hybrid and remote work is changing the way enterprise organizations access and store data. In fact, U.S. organizations surveyed post-pandemic stated that nearly half (48%) of their employee base will continue to work from home at least part of the time.

As a result, companies are looking for new networking and security solutions that can protect their devices, data, apps and corporate information assets against cyberthreats without compromising network performance.

So, what’s the solution?

The answer lies in identity-driven security. Individualized access to corporate systems and devices has emerged as today’s solution to effectively protect your data, mitigate risk and ensure compliance with regulatory requirements.

Work from the office, at home or hybrid?

In the post-pandemic age, the question driving uncertainty and hesitation across organizations is, “Should we adopt an at-the-office, remote or hybrid work model?” The reality is that we live in unpredictable times—so why not all three?

COVID, the economy, the rise of automation and the progression of artificial intelligence are transforming the nature of work. By considering all three work models, enterprises can remain flexible during uncertain times, find the best solutions for their specific needs and stay competitive in an ever-changing business environment.

Additionally, being open to different work models offers numerous internal benefits for companies. Remote work allows for a larger pool of talent to be considered, as geographical location is no longer a barrier. This can also result in cost savings for both the employer and employee, as expenses such as commuting and office space are reduced.

The hybrid work model offers the best of both worlds, enabling employees to enjoy the flexibility of remote work while still having access to the resources and collaboration opportunities of a physical office. Hybrid work also allows for increased work-life balance and flexibility, which leads to a more satisfied and productive workforce.

https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY1
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY1
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY1
"Infographic titled ‘Where do I invest now, and still prepare for tomorrow?’ showing a flow from left to right: Executive section with icon and text: ‘Work is … Remote from anywhere, In the Office, All or both based on functional role.’ Influence section with icons for Apps, Data, and Security, plus Infrastructure and Requirements listed as: Anywhere application and data access, Consistently available security, Control and visibility. Hybrid Work section with icons for office building, person, and mobile device."
Figure 1: Reference diagram for hybrid work

Security risks of VPN access in a hybrid business environment

While the benefits of adopting hybrid or remote work may far outweigh the drawbacks, both models come with a host of security risks.

During the pandemic, when organizations rapidly shifted to hybrid or remote work, VPN solutions provided authenticated access to the corporate data center to give employees an in-office experience. While the approach worked, it was a stop-gap measure that yielded less than ideal situations.

Employees authenticated access to the entire corporate network rather than to specific information they had permissions to use, creating an attack vector vulnerability. Ransomware attacks increased by nearly 500%, making their way into the corporate data center from the employee device through the VPN.

With employees now accessing company networks and data from home or on the go, and with user devices being vulnerable to cyberattacks when used outside of the secure corporate network, placing identity at the center of your security strategy is paramount. By making identity the new security perimeter, companies can control access to their sensitive data and applications much more effectively.

https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY2
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY2
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY2
"Infographic showing a workflow from left to right: Influence section with icons for Apps, Data, Security, and Infrastructure. VPN Concentrator section with a cloud and lock icon, listing benefits: Same office resources, Secure anywhere access, Single Sign-on. Remote section with icons for video conferencing and mobile device, listing challenges: Slower access, Poor performance, Variable resource availability. Text at the bottom reads: ‘Outcome: Administrators and employees are tired, stressed, and frustrated."
Figure 2: Reference diagram for drawbacks of VPN concentrators providing authenticated access

Identity-driven security for hybrid workforces

Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) offer many advantages to enterprise organizations who want to secure their IT resources and support dynamic, distributed, anywhere-anytime access to those resources.

What is SASE?

SASE is a networking and security architecture that provides high-performing, secure and seamless access to resources, regardless of location or device, through a combination of optimized network connectivity, such as software-defined WAN, and cloud-based security functions.

One of the primary ways that SASE improves both networking and security is by integrating security functions, such as VPN and firewall, with cloud security services into a single solution delivered as a cloud service. This eliminates the need for multiple hops between different security solutions, which reduces latency and boosts the overall performance of the network.

https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY3
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY3
https://assets.lumen.com/is/image/Lumen/23-16_Lumen_SASEand-ZTNA_BODY3
"Side-by-side comparison maps of the United States labeled ‘Without SASE’ and ‘With SASE.’ Left map (‘Without SASE’) shows three connection lines from Seattle remote worker to NYC private data center, Chicago, and Microsoft data center for Office 365. Right map (‘With SASE’) shows Seattle remote worker connecting to a SASE point of presence (PoP), then a single line to Microsoft data center for Office 365 and NYC private data center."
Figure 3: Reference diagrams for networking with and without SASE

What is ZTNA?

As enterprise perimeters continue to evolve, and security risks can now originate from both inside and outside the network, ZTNA is a security model that assumes all network traffic is potentially malicious and restricts access to resources based on user identity, device health and context.

ZTNA (as part of SASE) helps provide individualized, identity-driven security for hybrid employees, no matter where they happen to be working, and here’s how:

SASE + ZTNA: Better together.

When SASE and ZTNA are integrated, they provide a powerful solution for granular access control to applications and data.

SASE provides a single platform for managing all access requests, regardless of where they come from, and provides secure access to applications and data across all network edges.

ZTNA enforces a zero-trust approach to security, meaning that all access requests are treated as untrusted and must be authenticated and authorized before access is granted.

SASE and ZTNA enable IT teams to deploy a seamless, comprehensive approach to security that minimizes risk, ensures compliance and simplifies management. This means that users can securely access the applications and data they need, from anywhere, at any time, without worrying about security risks.

By integrating SASE and ZTNA, enterprise organizations can benefit from:

These advantages are becoming increasingly important as organizations move toward a cloud-based, perimeter-less infrastructure that supports hybrid work models, where defense against increasingly sophisticated cyberattacks is crucial.

Unify (and simplify) your networking and security

Lumen® SASE Solutions plus ZTNA support hybrid enterprises with a single, cloud-delivered service that integrates networking and security for better management and control. Combined with the power of the Lumen network, SASE solutions optimize enterprise organizations for a distributed, cloud-first business environment by enabling them to unify disparate security policies, move security functions closer to PoP/Edge locations, lower latency and improve application performance.

Lumen helps enterprise organizations successfully navigate the challenges of the work-from-anywhere era by delivering on three key requirements:

  1. Maintaining productivity on any device, from virtually any location by providing the most direct route from the end-user to the applications and data they need.
  2. Simultaneously filtering and securing that access based on user credentials, application and data content, device used and network configuration.
  3. Achieving the visibility, control and flexibility to detect and respond to threats, and applying authorized access while placing limits on asset availability on a per use basis.

Partner with Lumen to successfully implement these crucial IT factors and experience a smooth transition to a hybrid work model for maximum ROI.

Sign up for our SASE Assessment to find out where you stand in your journey and receive a tailored adoption roadmap to match your business needs.

1Versa Networks and Sapio Research, Global Digital Transformation Survey: Experiences and Attitudes Towards a Post-COVID Workforce, 2021.
2Infosecurity Magazine, Ransomware Attacks Grew by 485% in 2020, 2021

Authors

Darren Wolner

Darren leads Lumen’s SASE, SD-WAN and Edge Gateway product portfolios. This includes setting vision, goals and agile initiatives that drive the product roadmap, enabling Lumen to innovate and align with market trends to meet the demands of our customers in the Enterprise, Mid-Market and Public Sectors. In this role, Darren leads a product team focused on delivering Software Defined Networking and cloud-based security solutions, including SD-WAN, Secure Web Gateway (SWG), Firewall-as-a-Service (FWaaS), Zero Trust Network Access (ZTNA), and Cloud Access Security Broker (CASB). He and his team enjoy helping our customers navigate their business transformation journey with fully managed, all-digital, on-demand experiences while helping them protect their environments from the largest and most recent cyber threats.

Mike Robles

A Senior Director of Product Management at Lumen Technologies, Mike has been involved with networking and communications product management, design and development for over 17 years. He has been with Lumen since 2010 via the Level 3 acquisition.

This content is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. Lumen does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user. This document represents Lumen’s products and offerings as of the date of issue. Services not available everywhere. Business customers only. Lumen may change or cancel products and services or substitute similar products and services at its sole discretion without notice. ©2023 Lumen Technologies. All Rights Reserved.

image
https://assets.lumen.com/is/image/Lumen/author-lumen-logo-image-300x300?Creativeid=5385390f-1392-48ac-81b8-7dbe7a378eaf
https://assets.lumen.com/is/image/Lumen/author-lumen-logo-image-300x300?Creativeid=5385390f-1392-48ac-81b8-7dbe7a378eaf
https://assets.lumen.com/is/image/Lumen/author-lumen-logo-image-300x300?Creativeid=5385390f-1392-48ac-81b8-7dbe7a378eaf
content
Author

Lumen

Lumen is a global communications services provider that ignites business growth by connecting people, data and apps—quickly, securely and effortlessly. Our networking, edge cloud, collaboration and cybersecurity solutions and managed services are designed to elevate your business and deliver the most user‑friendly, intuitive and productive technology environments.

image
https://assets.lumen.com/is/image/Lumen/img-blog-featured-resource-card-infrastructure?Creativeid=62542e86-56ff-40b1-82d1-bec474424a9c
https://assets.lumen.com/is/image/Lumen/img-blog-featured-resource-card-infrastructure?Creativeid=62542e86-56ff-40b1-82d1-bec474424a9c
https://assets.lumen.com/is/image/Lumen/img-blog-featured-resource-card-infrastructure?Creativeid=62542e86-56ff-40b1-82d1-bec474424a9c
Person wearing a dark blazer and white shirt standing in a modern office setting, holding a closed laptop. The background features a colorful abstract overlay and illustrated office elements, including desks, chairs, a computer monitor, and a yellow robotic arm on a workbench near large windows
content
VIDEO
Lumen® Wavelengths Solutions for AI
link
Watch video
https://players.brightcove.net/1186058296001/ObIoHMsRd_default/index.html?videoId=6378434612112
_self