Zero Trust Network Access Assurance

Strengthen the Organizations Cybersecurity Posture

Zero Trust Network Access (ZTNA) is an emerging technology that is experiencing significant growth and one that you may be considering in your future IT initiatives to reduce exposure to the inevitable cybersecurity breach. 

VIAVI Observer 3D is not a ZTNA solution. However, should you deploy ZTNA it can assist in your initiative. Check out this interesting zscaler blog which references Gartner’s Continuous Adaptive Risk & Trust Assessment (CARTA) framework. One critical aspect of this is “Verify usage” which includes:

  • Monitor usage compliance
  • Detect exceptions: prioritize risk
  • Contain/mitigate risk

Observer 3D can help here using the following capabilities:

  1. On-demand application dependency mapping – An existing capability that excels at solving complex multi-tier application issues. It can also be utilized to inspect and log traffic by individual or multiple users to confirm valid access to specific network devices or services.
  2. IP Viewer – Available right now for compiling layer 2 and 3 insights into a unique, interactive visualization that illustrate the relationships between user, IP/MAC address and application usage. Used to quickly resolve service bottlenecks from a single user perspective, this same use case can be re-purposed for IT teams to inspect questionable or suspicious network transactions for adherence to ZTNA access to control policies.
  3. Profiling – Available within Observer GigaFlow. Sometimes referred to as “white listing”, profiling can be configured by host or service. Once created and deployed, every host and/or device that performs an unauthorized access will be flagged and IT alerted based on customizable settings of severity. 

Items #1 and #2 provide detailed visibility of east-west and north-south traffic activities that may be tied to ZTNA policy violations or other suspicious transactions. Topic #3 is perfect for instant notification of questionable host or service actions such as invalid ports being opened or two applications communicate in an unauthorized manner. Contact VIAVI support to learn more about this capability.