Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

The greatest threat to zero trust? Marketing

By Rob McNutt
black computer screen with colorful text

Image via Unsplash

December 19, 2023

The greatest threat to zero trust is not ransomware or advanced persistent threats; it is marketing. Technology marketing tends to overuse buzzwords until they lose their meaning; take the predominance of “artificial intelligence” solutions, for example. Thanks to the self-aggrandizing behavior of cybersecurity marketing, zero trust is one of the most egregious victims.

According to the National Institute of Standards and Technology (NIST), in a modern zero trust architecture (ZTA), the focus is on protecting “resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource.”

Zero trust finally came to a boil in 2020, when organizations had to quickly implement remote work policies to adapt to a new normal. Unfortunately, many of these organizations chose to use VPNs or (even worse) RDP connections to facilitate remote work, which have been and continue to be easily exploited in ransomware attacks.

Consequently, zero trust network access (ZTNA) emerged as a solution to securely enable remote work. As the need for these solutions grew, so did the marketing claims made by the vendors selling them. Unfortunately, many organizations are now under the misconception that ZTNA is equivalent to ZTA, perhaps in part because of their similar acronyms. Furthering the confusion, zero trust networking, abbreviated as the similar ZTN and which may implement ZTNA, is just one pillar of an overall ZTA. The industry is drowning in alphabet soup.

There is no such thing as a “magic bullet” for realizing a ZTA, but that has not stopped cybersecurity vendors from trying to sell themselves as such. For example, take ZTNA.

ZTNA is a point solution

Consider the physical security at a casino. A bouncer at the door checks IDs, but once a guest enters, they continue to be monitored by security teams that can review surveillance footage for signs of suspicious behavior. A ZTNA solution is like a bouncer deciding who should enter but lacks continuous monitoring to maintain security.

ZTNA is often conflated with a ZTN solution, but once access has been granted to a resource, it offers no further visibility or control of the network. In fact, ZTNA implementations risk exposing the enterprise network to remote connections. If an attacker compromises a machine with ZTNA, then they could leverage that access to move around the network seemingly trustworthy.

Furthermore, ZTNA is a remote access solution that relies on installing and maintaining software agents to be effective. This requirement leads it to fall short when protecting the complex landscape of the Internet of Things (IoT) and operational technology (OT) devices.

Another critical issue related to ZTNA is its heavy reliance on decrypting endpoint traffic. This practice, although common, is facing newfound challenges in the face of complex new encryption techniques. The promise of quantum encryption has the potential to render ZTNA obsolete.

ZTNA does not equal zero trust

Education is the only way to counter the spurious marketing claims about ZTA, ZTN and ZTNA. The easiest way to understand the relationship between these terms is in their hierarchy. Zero trust networking is just one pillar of zero trust. According to the Cybersecurity and Infrastructure Security Agency’s (CISA) Zero Trust Maturity Model, the five pillars of zero trust are identity, device, network/environment, application workload and data.

Likewise, zero trust network access only addresses part of the requirements within the context of zero trust networking. The requirements of zero trust networking include:

  1. Authentication and authorization — Users and devices seeking network access must first prove their identity through robust authentication processes. Authorization ensures the authenticated user or device has the appropriate permissions to access specific resources.
  2. Least privilege access — Users or devices should only be allowed access to the specific resources deemed essential for their designated tasks, minimizing the potential attack surface and limiting unauthorized lateral movement.
  3. Continuous risk assessment — Access is based on real-time evaluation of the user’s identity and behavioral analytics, considering their risk and risk tolerances of the organization to dynamically enforce policy.

There are many solutions that organizations can implement to help achieve these requirements, such as multi-factor authentication (MFA) and identity and access management (IAM) solutions that enhance and enforce authentication and authorization policies. Network segmentation can isolate and control access to critical resources. Network monitoring solutions can provide behavioral analytics to detect deviations from typical patterns.

Traditional perimeter-focused security solutions that default to high trust levels within the internal network are ill-suited for an edgeless enterprise that increasingly supports remote workers and the growing number of IoT devices. The fact is, neither is ZTNA.

Just as all squares are rectangles, but not all rectangles are square, implementing ZTNA is not equivalent to implementing ZTN, and even meeting all of the requirements of ZTN is not equal to implementing a full zero trust architecture. However, by understanding and adhering to these three fundamental requirements and conducting due diligence into the solutions that satisfy them, organizations can fortify their zero trust networking within a larger zero trust framework.

KEYWORDS: CISA cybersecurity awareness network security security solutions zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob McNutt is SVP of Network Security at Forescout Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Growing and Gaining

    Want to Avoid Being Scapegoated For the Next Breach? You Need Total Trust Alongside Zero Trust

    See More
  • Five hands circled together

    The new normal: How to embrace a cultural approach to zero trust

    See More
  • zero-trust-freepik1170x658v47.jpg

    Leverage the zero trust architecture model to grow your business

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing