KEEPNET LABS > Blog > Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tactics

Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tactics

Access to a network with zero trust or ztna. Rajiv Pimplaskar, CEO of Dispersive, an advanced cloud cloaking technology provider. ZTNA has become an important part of new network security systems such as secure access service edge (SASE).

Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tactics

The development of virtual private networks is in full swing. Related to the topic: VPNs as an independent tool for consumers, VPNs for small businesses are rapidly becoming obsolete, at least when it comes to protecting corporate networks. VPNs are replaced by access to a network with zero trust or ztna. VPNs encrypt data streams and protect endpoints from unauthorized access, essentially requiring all network communications to pass through a secure channel. VPNs are checked once and that’s it. This was an effective approach dominated by local data centers. ZTNA, on the other hand, never trusts and always verifies. The user is constantly checked for each device and for each software application, and behavior is constantly analyzed to identify suspicious patterns. Guest Expert: Rajiv Pimplaskar, CEO of Dispersive, this new approach is needed – now software-defined resources deployed in hybrid and public clouds have become the rule of the day.

At Black Hat 2022, I had the opportunity to visit Rajiv Pimplaskar, CEO of Dispersive, an advanced cloud cloaking technology provider from Alpharetta, Georgia. We discussed how ZTNA has become an important part of new network security systems such as secure access service edge (SASE) and security service edge (SSE). We also talked about how Dispersive uses spread spectrum technology, based on the submarine warfare of the Second World War, to protect more effectively. modern corporate networks.

Join
Our Newsletter

Sign up to learn about the latest threats, hacking methods, and news.