I'm just starting to get my head around Zero Trust networking or more accurately how to achieve it in a small business (15 employees).
I watched a 2020 Brighttalk webinar on Zero Trust where Untangle was represented by Heather Paunton. While the purchase of Untangle by Astera might be leading to a Zero Trust offering for SME's I'm not sure that Untangle really gets it, yet.
For example, Untangle makes the assumption that if a connection comes in on a VPN then it can be trusted so, by default, that traffic is not scanned. It seems to me that Zero Trust would mean that VPN traffic should also be scanned since the device making the connection could be compromised. Of course we can all do this ourselves but it probably shouldn't be the default.
One of the objectives of Zero Trust seems to be to limit each user's access to the network so as to limit the damage which can be done by an infected client. This usually means confining each user's access to specific business applications rather than allow them to roam across the whole network. The obvious tools to do this are Policy Manager and Captive Portal although I am not sure that they would be sufficient to control access to specific business applications as distinct from Untangles own Apps.
More than anything else, I would like to see some informed discussion on this as I am sure many members of this forum have considerable experience with Zero Trust implementations involving Untangle.
Ian
I watched a 2020 Brighttalk webinar on Zero Trust where Untangle was represented by Heather Paunton. While the purchase of Untangle by Astera might be leading to a Zero Trust offering for SME's I'm not sure that Untangle really gets it, yet.
For example, Untangle makes the assumption that if a connection comes in on a VPN then it can be trusted so, by default, that traffic is not scanned. It seems to me that Zero Trust would mean that VPN traffic should also be scanned since the device making the connection could be compromised. Of course we can all do this ourselves but it probably shouldn't be the default.
One of the objectives of Zero Trust seems to be to limit each user's access to the network so as to limit the damage which can be done by an infected client. This usually means confining each user's access to specific business applications rather than allow them to roam across the whole network. The obvious tools to do this are Policy Manager and Captive Portal although I am not sure that they would be sufficient to control access to specific business applications as distinct from Untangles own Apps.
More than anything else, I would like to see some informed discussion on this as I am sure many members of this forum have considerable experience with Zero Trust implementations involving Untangle.
Ian
Comment