https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

MSSP Insider


Shutterstock

zero trust security

Leveraging Partner Expertise to Build a Zero-Trust Strategy

  • Written by Jon Bove
  • June 9, 2021
Keep building partner trust, but apply the principle of least privilege to networks for security.

… the knowledge and resources necessary to help their clients build out both zero trust access (ZTA) and zero trust network access (ZTNA) policies.

Establishing the Foundation of Zero Trust

The foundation of any zero trust strategy is knowing and controlling who and what is on the network. This starts with role-based access controls (RBAC) and granting authenticated users an appropriate level of access, a practice in which many organizations already engage, to some degree. Aligning RBAC with a zero trust model requires that organizations establish a least-access policy that restricts users to the minimum level of network access required for their role, removing any ability to access or even see other parts of the network.

Beyond this, ZTA also involves managing the devices that are used to connect to the network, such as laptops, tablets and smart devices. However, organizations are now adding nonuser Internet of Things (IoT) devices to their networks, including printers, heating and ventilation systems, secure doorways, inventory control systems, point of sale (POS) devices or industrial IoT (IIoT). Unlike traditional devices, many of these new technologies lack usernames and passwords that identify them. Therefore, these “headless” devices require a network access control (NAC) solution designed to discover, authenticate and control their access to network resources. NAC policies can apply the zero-trust principle of least access to devices, ensuring that they have only the network access they need to perform their role and nothing more.

Partners engaged in mapping their clients’ networks can help establish ZTA. They are often the ones who have the greatest knowledge of the network, user and devices. Ultimately, this makes them a trusted reseller because they are already the most trusted adviser.

Zero Trust Network Access: Securing the Applications

Today’s businesses increasingly run on applications, demonstrating a need for ZTNA, which controls application access no matter where the user or the application resides. The user may be on a corporate network, home office or somewhere else, and the application may live in a corporate data center, private cloud or on the public internet.

With the dynamic nature of today’s networks, zero trust network access offers the security, granular control and user experience necessary to securely connect a remote workforce. Cybercriminals can exploit VPNs by compromising the endpoint device because the underlying assumption is that the VPN connection comes with trust. That trust extends to the part of the network to which it connects, explaining why threat actors redirected their efforts to exploit vulnerable home networks.

ZTNA takes the approach that no user or device can be trusted to access anything, including applications, until proven trustworthy. This extends the zero trust model beyond access to the network, ultimately reducing the attack surface by hiding applications from the public internet.

For partners, ZTNA poses an opportunity. Having been deeply involved with their customers’ network mapping and policy, they know the application access points. By creating a punch list of new projects, they can use their position as a trusted adviser to help deliver a zero-trust security approach.

Trust No One When Building a Security Framework

Most security measures organizations have in place primarily apply to traditional networks. However, expanding network edges, ubiquitous IoT devices, converged environments and mobile users change the meaning of trust. Zero trust enables organizations to consistently implement security across distributed and dynamic environments because it verifies every user and device before granting limited access. ZTA and ZTNA focus on understanding who and what access networks and applications, regardless of where the users, devices, data and applications are located.

At the end of the day, the only trust that still exists is between partners and their clients. Partners’ deep knowledge of client networks and policies makes them uniquely situated to establish ZTA and ZTNA for enhanced security.

Jon Bove is the vice president of channel sales at Fortinet. He and his team are responsible for strategizing, promoting and driving the channel sales strategy for partners in the United States. A 17-year veteran of the technology industry, Bove has held progressively responsible sales, sales leadership and channel leadership positions. Follow @Fortinet on Twitter or Bove on LinkedIn.

  • Page 1
  • Page 2
Tags: MSPs Best Practices Business Models IoT MSSP Insider SDN/SD-WAN Security

Most Recent


  • Why DevOps Teams Need Security Skills and How Shift Left Tools Help
    Developers need cloud-native security skills and tools to build secure code from the start to mitigate risks.
  • Kim Zetter at Black Hat
    Black Hat USA: No Excuses for Cyberattacks to Catch Critical Infrastructure Off Guard
    Critical infrastructure remains just as vulnerable as it was years ago.
  • Partner Program Changes
    Partner Program Updates: Microsoft, TD Synnex, AppSmart, Cisco, Verizon
    Verizon is pushing channel integration big-time, and Microsoft appointed a chief partner officer.
  • Nutanix Layoffs Coming, Analysts Point to 'Significant Overspending'
    It was “long overdue,” one analyst said.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Twenty, 20
    The CF List: 20 Endpoint Detection and Response (EDR) Providers You Should Know
  • Cybersecurity Roundup
    Cybereason Research Shows Why It's Never a Good Idea to Pay Ransom
  • Cowbell
    Cowbell Cyber Adds MSSPs to Connect Partner Program
  • College classroom
    Community College Ransomware Attack Wreaks Havoc

Upcoming Events

View all

MSP Summit

September 13, 2022 - September 16, 2022

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Galleries

View all

Partner Program Updates: Microsoft, TD Synnex, AppSmart, Cisco, Verizon

August 11, 2022

Channel Futures and Channel Partners Ready Trio of Powerhouse Summits

August 11, 2022

Black Hat USA: Former CISA Director Says Cybercrime to Get a Lot Worse Before Better

August 11, 2022

Industry Perspectives

View all

How to Take Shared Responsibility for Securing Cloud

August 11, 2022

Seize the Application Modernization Opportunity

August 2, 2022

A Growth Mindset: Your Organization’s Strategic Differentiator

August 1, 2022

Webinars

View all

Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack

August 23, 2022

Why it is Important to Upgrade Aging Servers and How to use Live Optics to Upgrade Efficiently

August 25, 2022

Executives at Home are Not Alright: An Intro to Digital Executive Protection

September 8, 2022

White Papers

View all

Work Goes Remote – (and Other Top ITOps Trends)

May 25, 2022

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

Channel Futures TV

View all

ThreatLocker Preaches Zero Trust, Addresses Industry Competition

ScienceLogic Debuts New Partner Portal

August 9, 2022

Vonage a ‘Single Communications Stack Provider’ for Partners, Customers

June 27, 2022

IBM, Partners and the $1 Trillion Hybrid Cloud Opportunity

June 26, 2022

Twitter

ChannelFutures

Boost privacy by design with #shiftleft mindset and add #security to cloud deployments from start, says… twitter.com/i/web/status/1…

August 12, 2022
ChannelFutures

Say sayonara to contract renewals - @KaseyaCorp responds to mounting customer concerns with significant changes.… twitter.com/i/web/status/1…

August 11, 2022
ChannelFutures

.@Kyndryl, @Five9 partnership will focus on cloud-based #contactcenter solutions. dlvr.it/SWTFPx https://t.co/WGQedUjSB1

August 11, 2022
ChannelFutures

How cloud providers and customers can work together to safely share and secure responsibility in the cloud. @Cisco… twitter.com/i/web/status/1…

August 11, 2022
ChannelFutures

See the latest updates from @verizonbusiness, @GetNerdio, @AppSmartcom, @CiscoPartners and other companies.… twitter.com/i/web/status/1…

August 11, 2022
ChannelFutures

.@nutanix said to lay off 4% of workforce by October, as company cites macroeconomic issues. dlvr.it/SWSMDN https://t.co/w6JeqkI7r6

August 11, 2022
ChannelFutures

#BHUSA Day 1 with Chris Krebs, @cybereason, @keepersecurity, @BreachQuest, @awscloud and @splunk. #cybersecurity… twitter.com/i/web/status/1…

August 11, 2022
ChannelFutures

Have you registered for the @MSP_Summit yet? It’s just about a month away, so don’t wait. Here’s a sneak preview of… twitter.com/i/web/status/1…

August 11, 2022

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X