Menlo Security Cloud Security Platform receives FedRAMP® Authorization

Extending Zero Trust to unmanaged devices

Unmanaged Devices

By taking a Zero Trust mindset to security, online threats are prevented from ever reaching users. Resulting in zero worry for you.

Why is it important to extend Zero Trust to unmanaged devices?

We live in a connected world where enterprises no longer operate in a silo. Running a business today requires close collaboration with external organizations – such as technology partners, suppliers, logistics companies and freelancers among others. Unfortunately, giving these collaborators access to your business systems and data massively extends the threat surface to entities that you have no control over – giving threat actors more avenues for accessing your critical systems.

Extending Zero Trust to unmanaged devices forces these entities to confirm their identity before and during connecting to your systems – preventing threat actors from gaining access to your network through these security gaps.

What’s a good example of this?

Think of an insurance agency working with a customer to file a claim. In addition to internal users, customers, the claimant, adjusters, auditors and a myriad of other stakeholders have to either provide information or access information in order for that claim to be processed accurately and in a timely manner.

Doing this manually over email, FTP or the phone is labor intensive, introduces the possibility of human errors and, frankly, takes a lot of time. Digital transformation over the past several years has streamlined the process by giving these stakeholders access to internal systems through a web-based portal. But, each of these connections provides an opportunity for an enterprising malicious actor that has already breached a partner’s system to spread throughout the insurance company’s network.

Zero Trust ensures that all entities – whether they belong to the insurance agency or not – continuously prove trustworthiness to access any system on the network. Extending Zero Trust to unmanaged devices enables this new collaborative way of working without adding security risk or IT overhead.

Why can’t existing security solutions protect unmanaged devices?

Traditional security tools were designed for the hub and spoke model where a few entities outside a hardened firewall connected to the network through a central control point. All traffic would flow back to the data center where it could be monitored and policies would be applied. Organizations just had to authenticate the entity at the first touch and then not have to worry about monitoring or securing east-west traffic.

However, as we have already established, we don’t live in that world anymore. Not only are internal users, applications, devices and data spread out, external entities spread around the world need access as well. The inability to continually authenticate and restrict access on a granular level is a major security gap that threat actors are using with a high degree of success.

Zero Trust Network Access

So, what is the right approach to extending Zero Trust protection to unmanaged devices?

A clientless approach managed from a central control point allows you to extend Zero Trust to unmanaged devices in a non-disruptive way. There’s no need to ask partners to install a software client or give up control over their own device. Yet, you gain complete visibility into who the entity asking for access really is and what they are doing. From there, you can provide granular access based on your existing Zero Trust policies.

Wait, wouldn’t intercepting traffic like this slow performance?

Yes, but only if you routed traffic through a static control point such as a VPN or on-premise firewall. Zero Trust Network Access (ZTNA) uses the public internet to gain this visibility and control – allowing you to continually monitor identity and behavior in order to assess trustworthiness throughout the entire engagement. And, because the cloud is ubiquitous, you can implement Zero Trust on a global scale wherever you do business without having to worry about latency or bandwidth constraints.

Can this Zero Trust approach be used to extend protection to other unmanaged devices–such as employees’ personal devices?

Yes, that is the beauty of a clientless, cloud native approach. You only need one security system to cover any type of device – whether they are corporate devices, your employees’ personal devices or a third-party entity. You don’t need to set up separate systems. A clientless approach through the cloud covers them all and provides a single management plane through which you can create, update and apply granular Zero Trust policies.

How can Menlo Security extend Zero Trust to unmanaged devices?

Menlo Security is built on an Isolation Core™ – providing a ubiquitous, abstracted layer in the cloud through which all traffic flows–even from unmanaged devices. Everything goes through this abstracted layer in the cloud, giving administrators unparalleled visibility and control into security without impacting the native user experience. In addition, Menlo starts with a clientless first approach, making it easier and more elegant for the IT staff to implement globally across managed and unmanaged devices.

Make the secure way to work the only way to work.

To talk to a Menlo Security expert, complete the form, or call us at (650) 695-0695.