TubbTalk 123: How To Easily Implement Zero Trust Networking for MSP Growth - Tubblog: The Hub for MSPs

TubbTalk 123: How To Easily Implement Zero Trust Networking for MSP Growth

TubbTalk 123: How To Easily Implement Zero Trust Networking for MSP Growth image

Zero trust

An Interview With Marc BarryZero trust

Marc Barry is the co-founder and Chief Product officer at Enclave.

The Enclave solution effortlessly connects laptops, servers, homeworkers, cloud instances, containers and IoT devices together across any infrastructure with zero trust network access.

Marc has a Master’s Degree in Applied Information Security, and a background in security across public and private sector organisations, with a focus on building, researching and securing computer networks.

What is Zero Trust Security?

Marc explains that there are many different definitions of Zero Trust, but to him, it’s an approach, and a way of thinking. “Essentially, it’s a model that assumes that our users, networks and systems shouldn’t be trusted.

“It’s the opposite of what networking has been for the last 30 years and how networks were designed to function. The goal is to reduce the attack surface of the organisation and reduce the impact or risk of a security breach.”

The Enclave Approach to Networks and Security

Enclave creates a fast, zero trust network connectivity between systems located anywhere on the public internet, without opening any firewalls, adding edge devices, or changing the infrastructure.

So, Marc says: “Enclave is a corporate VPN, but it’s a modern replacement to legacy corporate VPNs. Those were rooted in hardware. So many organisations run remotely now, and have their infrastructure and resources all over the place. And we need an effective modern way to connect it all together.

“There are a lot of options out there for private network connectivity. And, the core technology difference for us is that our product is based around what’s known as a mesh overlay network. It’s an architecture in which systems and devices talk directly to one another over the internet, so it’s different to traditional VPNs.”

How to Deploy Enclave Efficiently

Marc says that some customers have reported that it can take a long time to move from a Virtual Private Network (VPN) to a zero trust network access product, especially as there are lots of different architectures available.

However, Marc says that the Overlay Network deployment is a neat process. “You install Enclave, enrol your devices and generate enrolment keys. You share these with your end users, devices and so on.

“Then, you set up policies, tagging your devices that make the most sense to you. The policies define how tagged systems communicate with each other. Finally, Enclave will build the private network for you. It’s like magic!”

What is zero trust security and why should #MSPs be aware of it? @marc_enclave tells @tubblog how to better protect your #networks. Click to Tweet

The Enclave Integration Strategy

Integration is a big part of what Enclave do, says Marc.

Enclave offers single sign on and conditional access – via a concept they call ‘trust requirements’. These allow users to enrich and augment whatever access that they’ve already got in place.

“These fit in with the policies you already have defined, such as MFA. When we talk about the zero plus network access principle, we want to be as close to the endpoint as we possibly can be. That means we need to build technology that runs everywhere.”

How Enclave Makes Running a Remote Business Effortless

Firstly, Marc explains that as the Enclave business is run remotely, it is also important for them to provide secure, accessible solutions for themselves and their clients.

Secondly, “We’ve spent a huge amount of time making sure that Enclave plays nicely with existing technologies. Not everyone has the opportunity to build their private connectivity and access from scratch. So we’re acutely aware that non-disruptive, incremental deployment is valuable.

“It makes no difference to Enclave where you’re onboarding someone, or even if they’re in a different organisation. The process is the same internally and externally, you just need to have your policies in place. Location isn’t even a factor.”

How a Zero Trust Solution Keeps Users Safe

Marc explains that there are eight phases, or opportunities, to disrupt a cyber attack, known as the Cyber Kill Chain, as defined by Lockheed Martin. Key to this is to make systems and networks as secure as possible.

“We describe this as ‘going dark’, which means you close your firewalls, and don’t have  your VPN on a public internet where it’s exposed to threats. Having a door to your network is too much of a risk.

“Look at it this way – if you can’t be discovered, you can’t be targeted. And if you can’t be targeted, you also can’t be attacked. Simply remove your private systems from public networks, prevent anyone from trying to get in and have a zero trust policy will really help to keep your networks safe.”

How to Connect With Marc Barry

How to Connect With Me

Mentioned in This Episode

You Might Also be Interested in

RICHARD TUBB

Richard Tubb is one of the best-known experts within the global IT Managed Service Provider (MSP) community. He launched and sold his own MSP business before creating a leading MSP media and consultancy practice. Richard helps IT business owner’s take back control by freeing up their time and building a business that can run without them. He’s the author of the book “The IT Business Owner’s Survival Guide” and writer of the award-winning blog www.tubblog.co.uk

All Posts

You might like:

TubbTalk 170: How to Master Email and File Migrations for MSPs image

TubbTalk 170: How to Master Email and File Migrations for MSPs

Podcasts | By Richard Tubb
TubbTalk 169: Professional Musician to MSP Guru: the Amazing Luis Giraldo image

TubbTalk 169: Professional Musician to MSP Guru: the Amazing Luis Giraldo

Podcasts | By Richard Tubb
TubbTalk 168: Best-Kept Secret to Global Leader: The Remarkable Evolution of CompTIA image

TubbTalk 168: Best-Kept Secret to Global Leader: The Remarkable Evolution of CompTIA

Podcasts | By Richard Tubb
Bonusode: Live From Pax8 Beyond EMEA: Rob Rae on Amazing Events image

Bonusode: Live From Pax8 Beyond EMEA: Rob Rae on Amazing Events

Podcasts | By Richard Tubb
Travelogue: Pax8 Beyond EMEA 24 image

Travelogue: Pax8 Beyond EMEA 24

Events | By Richard Tubb
Bonusode: Live From Pax8 Beyond EMEA With Phylip Morgan: What’s New? image

Bonusode: Live From Pax8 Beyond EMEA With Phylip Morgan: What’s New?

Podcasts | By Richard Tubb
TubbTalk 167: Building a Culture of Success: Secrets from the UK’s Top ISP image

TubbTalk 167: Building a Culture of Success: Secrets from the UK’s Top ISP

Podcasts | By Richard Tubb
TubbTalk 166: Need More Free Time? Call Answering Services are a Game-Changer for MSPs image

TubbTalk 166: Need More Free Time? Call Answering Services are a Game-Changer for MSPs

Podcasts | By Richard Tubb
TubbTalk 165: The 20-Year Overnight MSP Success Story You Need to Hear image

TubbTalk 165: The 20-Year Overnight MSP Success Story You Need to Hear

Podcasts | By Richard Tubb
TubbTalk 164: Top Lessons from 25 Years Building a Successful MSP image

TubbTalk 164: Top Lessons from 25 Years Building a Successful MSP

Podcasts | By Richard Tubb
Travelogue: UptimeLIVE 2024: Business Growth for MSPs image

Travelogue: UptimeLIVE 2024: Business Growth for MSPs

Podcasts | By Richard Tubb
TubbTalk 163: Why Modern MSPs Need to be at UptimeLIVE image

TubbTalk 163: Why Modern MSPs Need to be at UptimeLIVE

Podcasts | By Richard Tubb

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore.

Share via
Send this to a friend