Network management business Remote.it today revealed new features for its core SaaS-based service, including assistance for the Okta user identification platform and Docker containers, and what it’s referring to as “programmatic release” of no trust networks.Essentially, the business said, the idea is to provide automated provisioning and implementation of network access to managed assetts– utilizing a small, 80KB daemon developed to work on practically any hardware to hook into the TCP/IP stack and develop a connection with Remote.it’s systems. The company’s own cloud then automatically configures the connection, with no requirement of input from IT personnel.
“Let’s state [a possession] is making a connection to something in Finland,” said CEO Ryo Koyama. “The [agent] makes a demand, our systems verify and confirm, and we send out down info to both points that has routing info and encryption secrets.”
Beyond a simple reduction in work, according to Koyama, the system features powerful security benefits– particularly with using a brand-new tagging function, which lets IT teams create tags for specific classifications of users and possessions with particularized access to other “tags.” This is more potent than merely using a VPN to safeguard organizational resources.
“Generally, [with a remote possession], people have to stress over safeguarding the sub-node address space,” he stated. “In our case, it’s all bound to localhost, and what that means is that even if the city subnet is breached, no one can see any services running.”
Specialists described this as a helpful technique to network provisioning and security, however took issue with the idea that the business’s item represents a turnkey “absolutely no trust” capacity. According to IDC research study director Christopher Rodriguez, absolutely no trust needs a larger set of competencies.
“I would think of this more as a microsegmentation service,” he said.” [Zero trust] tends to be more of a VPN replacement.”
Rodriguez’ coworker, IDC research manager Philip Bues, said that the procedure of executing no trust security is a finished one– and typically not a short one.
“Many organizations that have zero trust or are moving there, that’s a multi-year kind of movement,” he said. “Beyond the [core elements], there’s this presence and governance angle– one of the greatest keyes to zero trust has to do with constant assessment.”
Copyright © 2023 IDG Communications, Inc.