Zero Trust: Best Practices for Securing
the Remote Workforce
Wladimir Araujo
Senior Director, Product Management
Excess Access Privileges
To what extent do you believe users in your organization have access privileges beyond what they
require?
2021 CybersecurityInsiders
& Ivanti Zero Trust Report
Identity Access and Zero Trust Priorities
Which of the following identity access/zero trust controls do you prioritize for investment in your
organization within the next 12 months?
2021 CybersecurityInsiders
& Ivanti Zero Trust Report
Eliminate “Inside-Outside”distinction
DetectBreaches in real-time
Hollow-out of DMZ, Get Visibility Compliance &
Governance across Clouds
Avoid fragmented Policy islands across Hybrid
& Multi-Vendor environments
Easier Consumption,faster provisioning
Data Center
Private Cloud
Employees, Guests, Contractors, Admins
BYOD/Corporate Devices
Network and IoT Devices
Infrastructure
Apps & Data
Apps & Data
End-user Multi-Cloud
Application Access
Power-user
Infrastructure Access
Network or IoT Device
Access
CIOs, I&O and SecOps Seeking To Leverage IT Convergence
Copyright © 2021 Ivanti. All rights reserved.
From VPN to Zero Trust Access Control
Evolving our value proposition to an integrated Zero Trust Access Experience
Consolidate Bespoke Secure
Access Solutions
Complete Visibility, Reduce
Operational & Security Risks
Simplify Administration and
End User Experience
MOBILE ACCESS
APPLICATION ACCESS
CLOUD ACCESS
NETWORK ACCESS
• Flat network ➔ lateral movement allowed
• User-based access controls ➔ all apps
• Named VPN gateway ➔ user needs to select
The ZTNA Paradigm
• Micro-segmented network ➔ no lateral movement
• User + application + location access controls ➔ specific apps
• Dark network ➔ system selects gateway for user
Tunnel
The VPN Paradigm
vpn.acme.com
Apps
Apps
Apps
Tunnel
Apps
Apps
Apps
The Ivanti Neurons for Zero-Trust
Access
• Authenticate and authorize
users and devices before
any access and throughput
the entire session
• Only the specific application,
data, or service that should
be accessedcan be
accessed
• Both Controller and
Gateways are invisible from
unenrolled, unauthenticated,
unencrypted devices
• All backend services,
applications, and data are
also invisible
BYOD/Corp Device
NZTA Controller
Once enrolled, End-user has seamless Appaccess experience
User,Device Identity & Access Controls,via MTLS
E2E Advanced Secure Data Transfer,via MTLS
Continuous Risk & Threat Assessment,via MTLS
Unified Client Platform
IAM
Apps
Apps
NZTA
NZTA
Enterprise Security with Ivanti Neurons for ZTA (nZTA)
Benefits of Ivanti Neurons for ZTA (nZTA)
Multi-Cloud Zero Trust Access
▪ Eliminates distinction between on-premises, SaaS, and different clouds
▪ End-to-end Security with reduced attack surface
▪ Global, granular security and access policies
Increase Productivity & Security
▪ Quickly deploy applications that can be securely accessed
▪ Enable collaboration between different organizations without
compromising security
▪ HA and always up to date with security patches
Visibility and Advanced Analytics
▪ Centralized visibility
▪ Insights into users, devices, applications, and gateways
▪ Automated responses to undesired behavior
Flexible Consumption
▪ Deploy as many gateways as needed
▪ Unified client for ZTA/VPN/NAC
▪ Scale up quickly to support more users/sites
Proprietary & Confidential
9
nZTA Controller
Control Plane
Data Plane
Pulse
Clients
nZTA
Gateway
Copyright © 2021 Ivanti. All rights reserved.
Co-existence and Unified Security
• Seamless among PCS, PPS and nZTA
• The entire portfolio can co-exist with each other
• nZTA uses the same Pulse Client that end users are
accustomed to using
• Users can connect to existing PPS (for on-prem access),
PCS (for remote access), and nZTA - all at the same time!
• Customer can start their Zero Trust journey at their own pace
without service disruption
• Coexists with other VPN services as well
PCS UN-CONNECTED
PPS UN-
CONNECTED
nZTA
UN-
CONNECTED
CONNECTED
CONNECTED
CONNECTED
Copyright © 2021 Ivanti. All rights reserved.
▪ Risk and trust assessment tracks:
▪ Access methods
▪ Access times
▪ Geo-location
▪ User Risk Score with 30-day context
▪ Action taken may include:
▪ Disconnecting and disabling user
▪ Reducing privileges
11
Continuous Adaptive Risk and Trust Assessment (CARTA)
Copyright © 2021 Ivanti. All rights reserved.
▪ User and Entity Behavior Analytics (UEBA) and anomaly detection and mitigation
▪ Industry leading Device Compliance Checker microservice
▪ Significantly reduces attack surface and breaches from inside/outside
12
UEBA and Threat Detection and Response
Copyright © 2021 Ivanti. All rights reserved.
Segment the Network Define Fine Grained Policies Integrate to Automate
Segment the network based
on applications or application
domains to minimize lateral
movement
Deploy a gateway (or cluster
of) for each segment
Create application access
policies as granular as
possible/feasible
• For each application,
define the required device
compliance level
Define user groups that have
access to each application
Assign users to the groups
they really need
Export events to SIEM for
aggregate analysis
Leverage anomaly detection
to narrow investigation focus
Integrate with Neurons for
Healing for automatic device
non-compliance remediation
ZTA Deployment Best Practices
Copyright © 2021 Ivanti. All rights reserved.
To learn more, please visit:
www.ivanti.com/solutions/zero-trust-security

More Related Content

PPTX
Introduction to Azure monitor
PDF
Microsoft Zero Trust
PPTX
4_Session 1- Universal ZTNA.pptx
PDF
Microsoft Azure Security Overview
PPSX
Zero-Trust SASE DevSecOps
PDF
Navigating Zero Trust Presentation Slides
PDF
APISecurity_OWASP_MitigationGuide
PPTX
What is Zero Trust
Introduction to Azure monitor
Microsoft Zero Trust
4_Session 1- Universal ZTNA.pptx
Microsoft Azure Security Overview
Zero-Trust SASE DevSecOps
Navigating Zero Trust Presentation Slides
APISecurity_OWASP_MitigationGuide
What is Zero Trust

What's hot (20)

PDF
Azure Security Overview
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Azure role based access control (rbac)
PPTX
Splunk Phantom SOAR Roundtable
PDF
Privileged Access Management
PDF
Single Sign-On Best Practices
PDF
DevSecOps - The big picture
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
security-reference-architecture.pdf
PPT
OWASP Top Ten
PPTX
DevOps in Salesforce AppCloud
PPSX
Next-Gen security operation center
PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
PPTX
Zero trust deck 2020
PPTX
Secure your app with keycloak
PDF
Working with MS Endpoint Manager
PPTX
Developing an IAM Roadmap that Fits Your Business
PPTX
Dynatrace
PPTX
SOC Architecture Workshop - Part 1
PPTX
Building secure applications with keycloak
Azure Security Overview
Optimizing Security Operations: 5 Keys to Success
Azure role based access control (rbac)
Splunk Phantom SOAR Roundtable
Privileged Access Management
Single Sign-On Best Practices
DevSecOps - The big picture
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
security-reference-architecture.pdf
OWASP Top Ten
DevOps in Salesforce AppCloud
Next-Gen security operation center
Identity and Access Management (IAM): Benefits and Best Practices 
Zero trust deck 2020
Secure your app with keycloak
Working with MS Endpoint Manager
Developing an IAM Roadmap that Fits Your Business
Dynatrace
SOC Architecture Workshop - Part 1
Building secure applications with keycloak
Ad

Similar to Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the Remote Workforce (20)

PPTX
Zero Trust: Redefining Security in the Digital Age
PPTX
Zero Trust Network Access
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
Navigating the Zero Trust Journey for Today's Everywhere Workplace
DOCX
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
DOCX
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
PDF
A new Frontier in Cybersecurity - ZTNA.pdf
PPTX
COSAC 2021 presentation - AWS Zero Trust
PPT
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
PPTX
Zero trust model for cloud computing.pptx
PDF
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
PPTX
Zero Trust and Data Security
PDF
Fortinet ZTNA - Um contexto de sua Implementação
PDF
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
PPTX
The Importance of Zero Trust Security in Modern.pptx
PPTX
ZERO-TRUST ARCHITECHTURE IN CYBER SECURITY
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PDF
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
PPTX
ivanti-swapout_967754 presentation decks
PDF
Moving to an endpoint centric zero trust security model
Zero Trust: Redefining Security in the Digital Age
Zero Trust Network Access
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
Market Guide for Zero Trust Network AccessPublished 29 Apri.docx
A new Frontier in Cybersecurity - ZTNA.pdf
COSAC 2021 presentation - AWS Zero Trust
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Zero trust model for cloud computing.pptx
ZTNA(7.2 CONFIG AND LAB TEST FORTINET 2022
Zero Trust and Data Security
Fortinet ZTNA - Um contexto de sua Implementação
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
The Importance of Zero Trust Security in Modern.pptx
ZERO-TRUST ARCHITECHTURE IN CYBER SECURITY
BATbern48_How Zero Trust can help your organisation keep safe.pdf
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
ivanti-swapout_967754 presentation decks
Moving to an endpoint centric zero trust security model
Ad

More from Ivanti (20)

PDF
August Patch Tuesday
PDF
Français Patch Tuesday - Juillet
PDF
July Patch Tuesday
PDF
Français Patch Tuesday - Juin
PDF
June Patch Tuesday
PDF
Français Patch Tuesday - Mai
PDF
May Patch Tuesday
PDF
Français Patch Tuesday - Avril
PDF
April Patch Tuesday
PDF
Français Patch Tuesday - Mars
PDF
March Patch Tuesday
PDF
Français Patch Tuesday - Février
PDF
February Patch Tuesday
PDF
Patch Tuesday de Diciembre
PDF
Français Patch Tuesday - Décembre
PDF
Patch Tuesday Italia Dicembre
PDF
December Patch Tuesday
PDF
Patch Tuesday de Noviembre
PDF
Français Patch Tuesday - Novembre
PDF
Patch Tuesday Italia Novembre
August Patch Tuesday
Français Patch Tuesday - Juillet
July Patch Tuesday
Français Patch Tuesday - Juin
June Patch Tuesday
Français Patch Tuesday - Mai
May Patch Tuesday
Français Patch Tuesday - Avril
April Patch Tuesday
Français Patch Tuesday - Mars
March Patch Tuesday
Français Patch Tuesday - Février
February Patch Tuesday
Patch Tuesday de Diciembre
Français Patch Tuesday - Décembre
Patch Tuesday Italia Dicembre
December Patch Tuesday
Patch Tuesday de Noviembre
Français Patch Tuesday - Novembre
Patch Tuesday Italia Novembre

Recently uploaded (20)

PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
UiPath Agentic Automation session 1: RPA to Agents
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
OpenACC and Open Hackathons Monthly Highlights July 2025
NewMind AI Weekly Chronicles – August ’25 Week III
Module 1 Introduction to Web Programming .pptx
4 layer Arch & Reference Arch of IoT.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Training Program for knowledge in solar cell and solar industry
Build Your First AI Agent with UiPath.pptx
CloudStack 4.21: First Look Webinar slides
Improvisation in detection of pomegranate leaf disease using transfer learni...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
sbt 2.0: go big (Scala Days 2025 edition)
Microsoft Excel 365/2024 Beginner's training
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
The influence of sentiment analysis in enhancing early warning system model f...
Consumable AI The What, Why & How for Small Teams.pdf

Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the Remote Workforce

  • 1. Zero Trust: Best Practices for Securing the Remote Workforce Wladimir Araujo Senior Director, Product Management
  • 2. Excess Access Privileges To what extent do you believe users in your organization have access privileges beyond what they require? 2021 CybersecurityInsiders & Ivanti Zero Trust Report
  • 3. Identity Access and Zero Trust Priorities Which of the following identity access/zero trust controls do you prioritize for investment in your organization within the next 12 months? 2021 CybersecurityInsiders & Ivanti Zero Trust Report
  • 4. Eliminate “Inside-Outside”distinction DetectBreaches in real-time Hollow-out of DMZ, Get Visibility Compliance & Governance across Clouds Avoid fragmented Policy islands across Hybrid & Multi-Vendor environments Easier Consumption,faster provisioning Data Center Private Cloud Employees, Guests, Contractors, Admins BYOD/Corporate Devices Network and IoT Devices Infrastructure Apps & Data Apps & Data End-user Multi-Cloud Application Access Power-user Infrastructure Access Network or IoT Device Access CIOs, I&O and SecOps Seeking To Leverage IT Convergence
  • 5. Copyright © 2021 Ivanti. All rights reserved. From VPN to Zero Trust Access Control Evolving our value proposition to an integrated Zero Trust Access Experience Consolidate Bespoke Secure Access Solutions Complete Visibility, Reduce Operational & Security Risks Simplify Administration and End User Experience MOBILE ACCESS APPLICATION ACCESS CLOUD ACCESS NETWORK ACCESS
  • 6. • Flat network ➔ lateral movement allowed • User-based access controls ➔ all apps • Named VPN gateway ➔ user needs to select The ZTNA Paradigm • Micro-segmented network ➔ no lateral movement • User + application + location access controls ➔ specific apps • Dark network ➔ system selects gateway for user Tunnel The VPN Paradigm vpn.acme.com Apps Apps Apps Tunnel Apps Apps Apps
  • 7. The Ivanti Neurons for Zero-Trust Access
  • 8. • Authenticate and authorize users and devices before any access and throughput the entire session • Only the specific application, data, or service that should be accessedcan be accessed • Both Controller and Gateways are invisible from unenrolled, unauthenticated, unencrypted devices • All backend services, applications, and data are also invisible BYOD/Corp Device NZTA Controller Once enrolled, End-user has seamless Appaccess experience User,Device Identity & Access Controls,via MTLS E2E Advanced Secure Data Transfer,via MTLS Continuous Risk & Threat Assessment,via MTLS Unified Client Platform IAM Apps Apps NZTA NZTA Enterprise Security with Ivanti Neurons for ZTA (nZTA)
  • 9. Benefits of Ivanti Neurons for ZTA (nZTA) Multi-Cloud Zero Trust Access ▪ Eliminates distinction between on-premises, SaaS, and different clouds ▪ End-to-end Security with reduced attack surface ▪ Global, granular security and access policies Increase Productivity & Security ▪ Quickly deploy applications that can be securely accessed ▪ Enable collaboration between different organizations without compromising security ▪ HA and always up to date with security patches Visibility and Advanced Analytics ▪ Centralized visibility ▪ Insights into users, devices, applications, and gateways ▪ Automated responses to undesired behavior Flexible Consumption ▪ Deploy as many gateways as needed ▪ Unified client for ZTA/VPN/NAC ▪ Scale up quickly to support more users/sites Proprietary & Confidential 9 nZTA Controller Control Plane Data Plane Pulse Clients nZTA Gateway
  • 10. Copyright © 2021 Ivanti. All rights reserved. Co-existence and Unified Security • Seamless among PCS, PPS and nZTA • The entire portfolio can co-exist with each other • nZTA uses the same Pulse Client that end users are accustomed to using • Users can connect to existing PPS (for on-prem access), PCS (for remote access), and nZTA - all at the same time! • Customer can start their Zero Trust journey at their own pace without service disruption • Coexists with other VPN services as well PCS UN-CONNECTED PPS UN- CONNECTED nZTA UN- CONNECTED CONNECTED CONNECTED CONNECTED
  • 11. Copyright © 2021 Ivanti. All rights reserved. ▪ Risk and trust assessment tracks: ▪ Access methods ▪ Access times ▪ Geo-location ▪ User Risk Score with 30-day context ▪ Action taken may include: ▪ Disconnecting and disabling user ▪ Reducing privileges 11 Continuous Adaptive Risk and Trust Assessment (CARTA)
  • 12. Copyright © 2021 Ivanti. All rights reserved. ▪ User and Entity Behavior Analytics (UEBA) and anomaly detection and mitigation ▪ Industry leading Device Compliance Checker microservice ▪ Significantly reduces attack surface and breaches from inside/outside 12 UEBA and Threat Detection and Response
  • 13. Copyright © 2021 Ivanti. All rights reserved. Segment the Network Define Fine Grained Policies Integrate to Automate Segment the network based on applications or application domains to minimize lateral movement Deploy a gateway (or cluster of) for each segment Create application access policies as granular as possible/feasible • For each application, define the required device compliance level Define user groups that have access to each application Assign users to the groups they really need Export events to SIEM for aggregate analysis Leverage anomaly detection to narrow investigation focus Integrate with Neurons for Healing for automatic device non-compliance remediation ZTA Deployment Best Practices
  • 14. Copyright © 2021 Ivanti. All rights reserved. To learn more, please visit: www.ivanti.com/solutions/zero-trust-security