BackBox introduces Zero Trust Network Operations

In a significant stride towards enhancing network security, BackBox introduces Zero Trust Network Operations (ZTNO).

  • Thursday, 8th February 2024 Posted 9 months ago in by Phil Alsop

This groundbreaking offering is a best practice framework with six actionable pillars to automate cybersecurity considerations at the network layer for NetOps teams. To simplify ZTNO for network teams, BackBox has enhanced its Network Automation Platform with improved Privileged Access Manager, Network Vulnerability Management, and Search.

With federal agencies and their contractors facing a September 2024 mandate for Zero Trust Architecture (ZTA) implementation, ZTNO by BackBox offers a timely, efficient, and comprehensive solution. ZTNO is a testament to BackBox’s ability to transform complex security requirements into simple, actionable solutions. This new offering aligns with the Zero Trust Architecture (ZTA), as defined in NIST document 800-207, and addresses key NetOps challenges.

ZTNO has six pillars, the first two are for network administrators, and the final four are for network devices:

1. Whether accessing via API, WebURL, or CLI secure access needs to be provided. BackBox does this by integrating with different credential vaults, and by providing a secure API.

2. When changes are made we should know where they’re done from, in an immutable log, and administrators should only have the permissions they need to get their jobs done. BackBox does this in a way that all logins are audited and recorded with privilege centrally controlled at the BackBox server.

3. Device configurations must be remediated before device onboarding via policy enforcement that configures the appropriate configuration compliance.

4. Devices must be evaluated for security risk before being onboarded and patched if the device is susceptible to known vulnerabilities.

5. Over time, continuous configuration grooming and remediation must be used to ensure configuration compliance and OS versions in an ongoing manner.

6. Rich reporting and visibility, including actionable data about the current vulnerability level of network devices.

“ZTNO makes zero trust actionable; NetOps teams can follow the framework to create a Zero Trust NetOps environment to complement the organization’s Zero Trust Architecture,” said Josh Stephens, CTO of BackBox. “It ensures the network remains secure without limiting a network engineer's ability to get things done.”

BackBox’s ZTNO framework is uniquely positioned due to:

• Rapid time-to-value ZTNO use cases, including privileged access management, continuous compliance on discovery, and vulnerability management and mitigation.

• Integration with a broad range of network and security devices.

• No-code automation means there’s no need for a developer skillset to implement zero trust.

• Built for network and security devices so the same platform can be used to manage configurations across vendors and device types.

• API-first approach to automation means that any automation can be integrated into a NetOps workflow.

“BackBox's introduction of Zero Trust Network Operations (ZTNO) marks a significant advancement in network security, aligning NetOps with Zero Trust principles in a user-friendly, efficient, and comprehensive manner,” said BackBox CEO Andrew Kahl. “It stands as a testament to BackBox’s leadership and innovation in network automation.”

Guardz expands in EMEA

Posted 2 days ago by Phil Alsop
Through a new partnership with Infinigate Cloud, Guardz will help to secure SMBs and support the MSP community across EMEA.
Data centre operators can now achieve the unparalleled speeds needed for the most demanding Artificial Intelligence (AI) applications, thanks to a...

Dell Technologies boosts AI for enterprises

Posted 2 days ago by Phil Alsop
Dell Technologies continues to make enterprise AI adoption easier with the Dell AI Factory, expanding the world’s broadest AI solutions portfolio....

AMD accelerates Exascale Computing

Posted 2 days ago by Phil Alsop
El Capitan, powered by the AMD Instinct MI300A APU, becomes the second AMD supercomputer to surpass the Exascale barrier, placing #1 on the Top500...
Global system integrator won over by simplicity, security and speed of the Cloudbrink service.
The Seeq platform will be leveraged to maximize production and increase energy efficiency across the largest biorefinery in Europe.
This global service forms part of the recently launched Intelligent Security portfolio and increases Logicalis' proactive threat-hunting capabilities...

Pure Storage invests in CoreWeave

Posted 3 days ago by Phil Alsop
Pure Storage and CoreWeave have announced Pure Storage’s strategic investment in CoreWeave to accelerate AI cloud services innovation. Alongside...