Page 142 - Cyber Defense eMagazine January 2023
P. 142

We  also  asked  respondents  who  were  in  some  stage  of  adopting  ZTS  what  policies  they  were
            implementing or had already implemented on their network. We found that multi-factor authentication
            (MFA) and single-sign on (SSO) were the most widely implemented. Nearly 100% of respondents who
            had adopted ZTS had MFA in place.

            Remote user and device access policies were implemented by almost 70% of respondents.
            Privileged access management, or the restricting of access to certain data based on user profile, was
            implemented by 62% of respondents.

            Just under half of respondents had implemented policies to treat foreign networks/devices as hostile.
            One-third of respondents had some sort of user behavior analytics in place.



            Vendor Sourcing

            When we talked to respondents about network security in 2019, we found that many companies preferred
            not to outsource the management of their network security vendors. They wanted to remain agile and
            pick best in breed vendors for particular security challenges.


            In our latest WAN Manager Survey, we again find that the largest plurality of respondents, one in three,
            are using a mix of security vendors for their network security sourcing strategy.


            Fifteen  percent  of  respondents  sourced  their  network  security  from  a  managed  services  provider  or
            systems integrator. One WAN manager mentioned that they are allowing their broadband providers to
            manage  internet  security  for  them,  however  they  had  strict  requirements  including  “policy  visibility,
            see[ing] the logs, data on security analysis, and remote blackholing.”


            Another 15% of respondents were sourcing their network security from their SD-WAN vendor.

            One respondent, however, specifically mentioned that they do not plan to source their network security
            through their SD-WAN vendor, essentially rejecting the idea of combining the two into a SASE model.
            For them, “SD-WAN is just a new WAN service, not any of the additional stuff.”


            Only  11%  of  respondents  were  sourcing  their  network  security  from  their  carrier  or  network  service
            provider. One respondent said they were sourcing their network security through their carrier, as they
            were getting a better price since the carrier wanted it on their revenue books. However, they still manage
            their own security, other than DDoS protection which they have their carrier handle.










            Cyber Defense eMagazine – January 2023 Edition                                                                                                                                                                                                       142
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   137   138   139   140   141   142   143   144   145   146   147