<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/secure-access-service-edge/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #secure access service edge</title><description>Cloud 9 Advisers - News #secure access service edge</description><link>https://www.cloud9advisers.com/News/tag/secure-access-service-edge</link><lastBuildDate>Fri, 27 Feb 2026 19:33:08 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Never Trust and Always Verify]]></title><link>https://www.cloud9advisers.com/News/post/never-trust-and-always-verify</link><description><![CDATA[Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TAHtRM7MTwyz93DQF4vulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EK0C27GDQIeK-T7DwhG40g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1wDa-H2ITMKidvNyBIDVAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Zero Trust Picking up Steam in the Enterprise</h2></div>
<div data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/ZeroTrustSecurity.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_3MYoUag1of7CYIZHqfMTrA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_3MYoUag1of7CYIZHqfMTrA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_KX-DnESpwPeszGZSn0xybQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KX-DnESpwPeszGZSn0xybQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gmq_CGqL3txZQszRpkTkTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gmq_CGqL3txZQszRpkTkTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something. </p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">&quot;The traditional perimeter-based security model is dead. It has been overtaken by an era of cloud, mobility, and BYOD that requires a new approach to network access control.&quot;</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">The Zero Trust Network Access (ZTNA) model is a new method of access control that considers all network connections untrusted. This is a shift from the traditional concept of an inside/outside network where only some connections were considered trusted. The ZTNA model requires organizations to consider all traffic as potential threats, which means security controls must be in place at every stage of the attack lifecycle and beyond the firewall layer into your environment.</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">Never Trust and Always Verify</span>&nbsp;is the general premise behind Zero Trust Network Access (ZTNA). A strong proponent for the replacement of traditional remote access like Virtual Private Networking (VPN), where a secure tunnel straight into the corporate network is created and anything that goes through that tunnel is presumed &quot;safe&quot; and &quot;trusted&quot;. There are a number of &quot;faith-based&quot; assumptions that take place when using&nbsp; VPN. One big one being the remote device creating the tunnel is <span style="font-style:italic;">still</span>&nbsp;a trusted device. ZTNA takes a different approach: nothing is trusted and everything must be verified. This might seem laborious, but the user experience is minimally affected and security benefits are significant.</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">ZTNA is starting to turn heads with IT for its protection of applications, data, and networks, easier control, and innate simplicity allowing access to remote staff, suppliers, and contractors. Some providers offer client and clientless versions for far greater flexibility and no need to constantly update Active Directory just to let a supplier in for two hours worth of work. And even provided secure access to users' personal devices without the typically required &quot;big brother'&quot;intrusions.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">The real power of ZTNA comes when its combined with the power of a Secure Access Service Edge (SASE) solution. These two put together forms a full security barrier and flexible perimeter thoroughly protecting endpoints and users.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">Using disparate/separate SASE and ZTNA platforms can certainly be done, but should only be done so by the most adept and experience security professionals. The management interface and integration of these separated systems is highly complex. Many solutions exist&nbsp; that combine both SASE and ZTNA together with a single management interface. Some providers also offer a completely managed solutions as well.&nbsp;</p><p style="font-size:16px;"><br></p><p><span style="color:inherit;"></span></p><p style="font-size:16px;">Regardless there is a lot to consider. Contact us and we'll get you in contact with a Strategic Tech Expert to wal you through all of the options and find out who the best vendors are for your business</p></div>
</div></div><div data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_iS6O_iNXLx1VEelRIBau9w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_iS6O_iNXLx1VEelRIBau9w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all.png" data-src="/C9-Logo1.t-all.png" size="medium" data-lightbox="true" style="height:140px;width:271.85px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy great technology. We work with you to rationalize and reduce technology spending without sacrificing the technology itself and employ sound digital transformation principles and strategies.</div><p><span style="color:inherit;"><br></span></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We diagnose problems, prescribe solutions, and facilitate decisions.</div><p><span style="color:inherit;"><br></span></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>To learn more contact us today and book an appointment.</div><p><span style="color:inherit;"><br></span></p><div><br></div></div>
</div></div></div><div data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 16 Mar 2021 17:11:26 -0500</pubDate></item></channel></rss>