Page 142 - Cyber Defense eMagazine January 2023
P. 142
We also asked respondents who were in some stage of adopting ZTS what policies they were
implementing or had already implemented on their network. We found that multi-factor authentication
(MFA) and single-sign on (SSO) were the most widely implemented. Nearly 100% of respondents who
had adopted ZTS had MFA in place.
Remote user and device access policies were implemented by almost 70% of respondents.
Privileged access management, or the restricting of access to certain data based on user profile, was
implemented by 62% of respondents.
Just under half of respondents had implemented policies to treat foreign networks/devices as hostile.
One-third of respondents had some sort of user behavior analytics in place.
Vendor Sourcing
When we talked to respondents about network security in 2019, we found that many companies preferred
not to outsource the management of their network security vendors. They wanted to remain agile and
pick best in breed vendors for particular security challenges.
In our latest WAN Manager Survey, we again find that the largest plurality of respondents, one in three,
are using a mix of security vendors for their network security sourcing strategy.
Fifteen percent of respondents sourced their network security from a managed services provider or
systems integrator. One WAN manager mentioned that they are allowing their broadband providers to
manage internet security for them, however they had strict requirements including “policy visibility,
see[ing] the logs, data on security analysis, and remote blackholing.”
Another 15% of respondents were sourcing their network security from their SD-WAN vendor.
One respondent, however, specifically mentioned that they do not plan to source their network security
through their SD-WAN vendor, essentially rejecting the idea of combining the two into a SASE model.
For them, “SD-WAN is just a new WAN service, not any of the additional stuff.”
Only 11% of respondents were sourcing their network security from their carrier or network service
provider. One respondent said they were sourcing their network security through their carrier, as they
were getting a better price since the carrier wanted it on their revenue books. However, they still manage
their own security, other than DDoS protection which they have their carrier handle.
Cyber Defense eMagazine – January 2023 Edition 142
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.