Keepnet Labs Logo
Menu
Keepnet Labs > blog > black-hat-fireside-chat-replacing-vpns-with-ztna-that-leverages-wwii-battlefield-tactics

ZTNA Using WWII Tactics: The New VPN?

Access to a network with zero trust or ztna. Rajiv Pimplaskar, CEO of Dispersive, an advanced cloud cloaking technology provider. ZTNA has become an important part of new network security systems such as secure access service edge (SASE).

ZTNA Using WWII Tactics: The New VPN?

The development of virtual private networks is in full swing. Related to the topic: VPNs as an independent tool for consumers, VPNs for small businesses are rapidly becoming obsolete, at least when it comes to protecting corporate networks. VPNs are replaced by access to a network with zero trust or ztna. VPNs encrypt data streams and protect endpoints from unauthorized access, essentially requiring all network communications to pass through a secure channel. VPNs are checked once and that’s it. This was an effective approach dominated by local data centers. ZTNA, on the other hand, never trusts and always verifies. The user is constantly checked for each device and for each software application, and behavior is constantly analyzed to identify suspicious patterns. Guest Expert: Rajiv Pimplaskar, CEO of Dispersive, this new approach is needed – now software-defined resources deployed in hybrid and public clouds have become the rule of the day.

At Black Hat 2022, I had the opportunity to visit Rajiv Pimplaskar, CEO of Dispersive, an advanced cloud cloaking technology provider from Alpharetta, Georgia. We discussed how ZTNA has become an important part of new network security systems such as secure access service edge (SASE) and security service edge (SSE). We also talked about how Dispersive uses spread spectrum technology, based on the submarine warfare of the Second World War, to protect more effectively. modern corporate networks.

SHARE ON

twitter
linkedin
facebook

Schedule your 30-minute demo now

You'll learn how to:
tickAutomate behaviour-based security awareness training for employees to identify and report threats: phishing, vishing, smishing, quishing, MFA phishing, callback phishing!
tickAutomate phishing analysis by 187x and remove threats from inboxes 48x faster.
tickUse our AI-driven human-centric platform with Autopilot and Self-driving features to efficiently manage human cyber risks.
iso 27017 certificate
iso 27018 certificate
iso 27001 certificate
ukas 20382 certificate
Cylon certificate
Crown certificate
Gartner certificate
Tech Nation certificate