The legacy method of granting users access to applications in the enterprise is to extend the network perimeter to the client. This is achieved by routing the traffic between the client and the network edge in one secure tunnel. This approach poses a security risk as the user usually has full access to all network resources and applications.
The next problem with legacy VPNs is that it is based on Layer 3. This means your security policies are based on IP information, for example Access Control Lists (ACLs). ACLs are hard to manage and are not application centric.
Zscaler Private Access could disrupt the Virtual Private Network (VPN) market with a new approach on how to connect users to applications securely. Zscaler Private Access (ZPA) is cloud service that can securely connect users to applications without extending the network perimeter and without routing. The Zscaler Application (ZApp) client securely presents applications to the client, therefore removing the network complexities and security risk from legacy VPN technologies.
ZScaler has an interesting approach, they have moved the security model up the network stack from ISO Layer 3 to 7 and based the entire system on Domain Name Systems (DNS) instead of Internet Protocol (IP). This is more application centric approach and solved many challenges we have at Layer 3, like routing, IP overlap, Network Address Translation (NAT), 4to6 NAT, IP4 Scalability. All these network headaches disappear and now I can control application access.
The granular application policy is also based on DNS, this policy can be dynamically applied to the end user. This idea follows the Zero Trust Model, where you only grant user access to applications and systems they require and not to your entire network. There is also a method of using wildcard domains if you don’t want follow the this model.
ZPA is using federation via Security Assertion Markup Language (SAML), so easy to integrate with your external IDP or internal Microsoft ADFS. The SAML claims define the user application access policy, the claims are linked to an application name that consist of the domain name and port number in the simplest form.
Without going into a deep dive on how this is working, you could say this is more like a Proxy VPN based on an Software Defined Network (SDN) in the cloud, every TCP session and UDP stream is proxied multiple times. The ZScaler cloud will always find the best path to the application and dynamically create a one hop encrypted tunnel for each application, so you could call this Software Defined Security (SDS).
I believe this application centric technology will improve security, flexibility, scalability and most important simplify the complex legacy VPN solutions we often see in the enterprise.
I am looking forward to how this disruptive technology will change the current IT landscape, and how enterprises will start solving security challenges, like Internet of Things (IoT), company mergers, contractor access, and securing the end user device.