- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
- This new wireless carrier promises ultra-secure mobile phone service
BackBox bolsters network automation platform with zero-trust tools
- Zero trust use cases, including privileged access management, continuous compliance on discovery, and vulnerability management and mitigation.
- Integration with a broad range of network and security devices.
- No-code automation.
- A common platform from which to manage configurations across network and security vendors and device types.
- An API-first approach to automation that can be integrated into a NetOps workflow.
BackBox defined six pillars of ZTNO: access management, audit and control, device configuration onboarding, vulnerability management onboarding, continuous assessment, and reporting and visibility. For each pillar, BackBox provides intelligence around permissions as well as automated actions to ensure security is addressed across network management.
For instance, in terms of human operators and access management, secure access must be provided whether accessing network devices via API, WebURL, or CLI. BackBox does this by “integrating role-based access controls with credential vaults and providing a security, credentialed API.” Another example is when humans are accessing network devices, they must do so in an auditable manner. BackBox ZTNO enables this with controls to record all changes to an “immutable log,” and rollback capabilities are also possible through a centralized access point.
On the device side, BackBox provides “golden configurations” when new devices are brought onboard. ZTNO does this with policy enforcement to ensure the proper configurations, and automation reduces manual errors while speeding the process. Devices are also checked for known vulnerabilities when being onboarded. BackBox can remediate the known vulnerabilities with patches or updates. BackBox also performs continuous assessments to ensure configurations remain in compliance and to spot new vulnerabilities. And ZTNO also incorporates reporting for both network and security teams.
The growing convergence of network and security teams in itself marks an emerging best practice among businesses that recognize the benefits of increased collaboration, according to research from Enterprise Management Associates (EMA).
“We saw in the research that successful partnerships reduce security risk, drive operational efficiencies, and lead to fast resolution of problems on both the networking side and the security side,” said Shamus McGillicuddy, vice president of research at EMA.
The BackBox Network Automation Platform is a virtual appliance that can either be run on-premises or in a data center or delivered by BackBox via a software-as-a-service (SaaS) model. The software supports network and security devices from more than 180 vendors, using an API-first approach for integrating with other applications in the network operations center. The platform ships with 3,000 automations out of the box, which can be tailored to specific customer environments. The ZTNO capabilities are available now.