Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Using zero trust to safely power the business ecosystem

Zero trust network access solutions are often the first step in the zero trust journey

By Gil Azrielant
third-party-freepik1170x6.jpg
March 24, 2022

“Supplier system failure” — these were the three words that a spokesperson from Toyota offered to the press in February, after news that one of their suppliers, Kojimo Industries Corp. suffered a cyberattack. Toyota was forced to halt the production of over 13,000 vehicles (about 5% of their monthly output) —  a reminder of the sinister impact a breach has on the business. Kojimo Industries provides vital air-conditioning, steering wheel components, and other interior and exterior vehicle parts to the world’s largest car manufacturer. 


While this latest example is the most recent, high-profile impact of a third party on a major business, we have seen several high-profile supply chain attacks in the last year. SolarWinds, Kaseya, Codecov, ua-parser-js, and Log4j are examples that prove how ransomware, stolen data, are on the rise.


Like Toyota, many companies rely on their business ecosystem of partners, suppliers, vendors, and even business-to-business customers for their success. Robust third-party relationships provide a disruptive advantage for companies — in many cases providing value far superior to anything a company could develop on its own. 


Third parties provide geographical reach, more scale, and greater flexibility than a company can manage on their own — even global conglomerates — simply can’t replicate.


This vast interconnectedness between a company and its partners often requires connecting partners to company networks through technologies like VPN or VDI. If not careful, this is where the business ecosystem often introduces risk — and is the single largest contributor for why they’re quickly becoming a popular entry point for cybercriminals across the globe.


Exploiting the Business Through Its Ecosystem


Fifty-one percent of organizations have experienced a data breach caused by third parties. It’s estimated that 60% of security incidents in 2022 will result from issues with third parties.


Cybercriminals are slick. They know that these partners often have weaker security protocols in place, and that a supplier can have access to dozens, if not hundreds, of other company networks. Therefore, ecosystem partners are so heavily targeted. They’re the ultimate conduit to scale an attack.


IT teams must work to eliminate technologies that grant overprivileged access to partners — and the mindset of network access is a requirement for application access. It’s not true. Technologies like VPN and VDI that inherently trust a third-party user and place them directly to the corporate network. This only expands the attack surface and increases the probability of an attack.


Think about it. A vendor tasked with updating critical infrastructure on behalf of the customer connects through a VPN to gain access to the customers network to troubleshoot or make updates — suppliers who require access to inventory management apps to create or cancel orders connect over VPN. Business customers who need access to web portals to learn about new services must log in via a password or username — forcing the web app to be exposed to the internet. Not to mention the fact that managing the identity lifecycle of partners, who are constantly coming and going, is a security and logistical nightmare. Another entry point for a savvy threat actor.


Putting the Zero Trust in Partnerships


The irony is that zero trust is what’s best for the business. For third-party risk management to be effective, it must be based on the belief that even “trusted” systems and entities can pose a threat to an organization. As such, companies are turning to zero trust access technologies to address security issues related to third-party risk. One research group that tracks zero trust shows that adoption has steadily grown from 24% in 2019 to 46% in 2021, and it’s estimated to continue growing to 52% of companies by the end of 2022.


The goal of zero trust is to never implicitly trust any entity when accessing business resources. 


Zero trust network access (ZTNA) solutions are often the first step in the zero trust journey. These are modern, often cloud-delivered, services used for securing access to private applications. ZTNA securely connects authorized users to specific applications based on identity and policies — without extending access to the corporate network, or requiring the application, or its underlying infrastructure, to be exposed to the Internet. They provide a sort of application-level segmentation, that allows network security teams to achieve a level of segmentation that’s virtually impossible with traditional solutions like internal firewalls. This minimizes lateral movement on the network and ensures that third parties can only access business data when authorized, and without access to anything else on the network.


Through integrations with technologies like IDP and endpoint security, the context in which a partner attempts to access an app is constant. This allows the IT team to set automatic triggers to revoke access and protect against attempted security attacks. Some ZTNA services also ensure that private traffic is inspected so IT can determine precisely what each partner accesses, the files they may have downloaded (to prevent data leakage), and even the commands they used.


In defining ZTNA, the National Institute of Standards and Technology (NIST) says it is designed to “eliminate the uncertainty in enforcing accurate access decisions in information systems and services.”


ZTNA provides simplified, least-privileged access from any device while mitigating malware vulnerabilities. As enterprises adopt zero trust by deploying ZTNA services for third-party users first, many quickly realize the benefits of extending its value to employees, as well. 


In fact, Gartner expects that by 2023 60% of enterprises will replace the remote access VPN with a ZTNA solution. Further, 80% of new digital business applications made available to ecosystem partners will be accessed through ZTNA by the end of this year.


It’s inarguable that companies will continue to grapple with a steady increase in cyberattacks.


By utilizing ZTNA services, the first leg of the zero trust adventure, companies can protect networks and resources, repel cyberattackers, and in the end, enable the business ecosystem to thrive. It just requires a little help from zero trust.

KEYWORDS: cyber security data breach risk management third-party security zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Gil Azrielant, co-founder and CTO of Axis Security, is responsible for technology strategy and the development of the company’s platform. Prior to joining Axis Security, he was co-founder & CTO of Cool Cousin. Azrielant's cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader.


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • zero-trust-freepik1170x658v47.jpg

    Leverage the zero trust architecture model to grow your business

    See More
  • Growing and Gaining

    Want to Avoid Being Scapegoated For the Next Breach? You Need Total Trust Alongside Zero Trust

    See More
  • Padlock on keyboard

    Zero trust: A business imperative for the digital age

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!