Accelerate your SASE deployment with the SASE Week Backstage Series. Explore sessions

close
close
  • Why Netskope chevron

    Changing the way networking and security work together.

  • Our Customers chevron

    Netskope serves more than 3,400 customers worldwide including more than 30 of the Fortune 100

  • Our Partners chevron

    We partner with security leaders to help you secure your journey to the cloud.

A Leader in SSE.
Now a Leader in Single-Vendor SASE.

Learn why Netskope debuted as a leader in the 2024 Gartner® Magic Quadrant™️ for Single-Vendor Secure Access Service Edge

Get the report
Customer Visionary Spotlights

Read how innovative customers are successfully navigating today’s changing networking & security landscape through the Netskope One platform.

Get the eBook
Customer Visionary Spotlights
Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn about Netskope Partners
Group of diverse young professionals smiling
Your Network of Tomorrow

Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.

Get the white paper
Your Network of Tomorrow
Introducing the Netskope One Platform

Netskope One is a cloud-native platform that offers converged security and networking services to enable your SASE and zero trust transformation.

Learn about Netskope One
Abstract with blue lighting
Embrace a Secure Access Service Edge (SASE) architecture

Netskope NewEdge is the world’s largest, highest-performing security private cloud and provides customers with unparalleled service coverage, performance and resilience.

Learn about NewEdge
NewEdge
Netskope Cloud Exchange

The Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.

Learn about Cloud Exchange
Aerial view of a city
The platform of the future is Netskope

Intelligent Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG), and Private Access for ZTNA built natively into a single solution to help every business on its journey to Secure Access Service Edge (SASE) architecture.

Go to Products Overview
Netskope video
Next Gen SASE Branch is hybrid — connected, secured, and automated

Netskope Next Gen SASE Branch converges Context-Aware SASE Fabric, Zero-Trust Hybrid Security, and SkopeAI-powered Cloud Orchestrator into a unified cloud offering, ushering in a fully modernized branch experience for the borderless enterprise.

Learn about Next Gen SASE Branch
People at the open space office
Designing a SASE Architecture For Dummies

Get your complimentary copy of the only guide to SASE design you’ll ever need.

Get the eBook
Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn about NewEdge
Lighted highway through mountainside switchbacks
Safely enable the use of generative AI applications with application access control, real-time user coaching, and best-in-class data protection.

Learn how we secure generative AI use
Safely Enable ChatGPT and Generative AI
Zero trust solutions for SSE and SASE deployments

Learn about Zero Trust
Boat driving through open sea
Netskope achieves FedRAMP High Authorization

Choose Netskope GovCloud to accelerate your agency’s transformation.

Learn about Netskope GovCloud
Netskope GovCloud
  • Resources chevron

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog chevron

    Learn how Netskope enables security and networking transformation through secure access service edge (SASE)

  • Events and Workshops chevron

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined chevron

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

The Future of Security: Quantum, AI, and Macro-political Change
Emily Wearmouth and Max Havey speak with Netskope CEO Sanjay Beri and CTO Krishna Narayanaswamy about the future of security.

Play the podcast Browse all podcasts
The Future of Security: Quantum, AI, and Macro-political Change
Latest Blogs

Read how Netskope can enable the Zero Trust and SASE journey through secure access service edge (SASE) capabilities.

Read the blog
Sunrise and cloudy sky
SASE Week 2024 On-Demand

Learn how to navigate the latest advancements in SASE and zero trust and explore how these frameworks are adapting to address cybersecurity and infrastructure challenges

Explore sessions
SASE Week 2024
What is SASE?

Learn about the future convergence of networking and security tools in today’s cloud dominant business model.

Learn about SASE
  • Company chevron

    We help you stay ahead of cloud, data, and network security challenges.

  • Careers chevron

    Join Netskope's 3,000+ amazing team members building the industry’s leading cloud-native security platform.

  • Customer Solutions chevron

    We are here for you and with you every step of the way, ensuring your success with Netskope.

  • Training and Accreditations chevron

    Netskope training will help you become a cloud security expert.

Supporting sustainability through data security

Netskope is proud to participate in Vision 2045: an initiative aimed to raise awareness on private industry’s role in sustainability.

Find out more
Supporting Sustainability Through Data Security
Help shape the future of cloud security

At Netskope, founders and leaders work shoulder-to-shoulder with their colleagues, even the most renowned experts check their egos at the door, and the best ideas win.

Join the team
Careers at Netskope
Netskope’s talented and experienced Professional Services team provides a prescriptive approach to your successful implementation.

Learn about Professional Services
Netskope Professional Services
Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn about Training and Certifications
Group of young professionals working

Emergency Response: Navigating Through the Ivanti VPN Crisis Together

Feb 05 2024

Legacy VPNs have become a significant security liability for businesses and governments. VPNs require inbound access to corporate networks, significantly broadening the attack surface for malware. This makes them prime targets for threat actors, increasing the risk of disruption to your business. VPNs are built on a foundation of excessive implicit trust, which can inadvertently allow attackers to move laterally within a network and escalate privileges without detection, gaining access to high-value systems far beyond their initial point of entry. Perhaps most alarmingly, VPNs are plagued by a long history of software vulnerabilities that have been persistently exploited by both individual hackers and nation-state actors.

CISA’s stark warning: “Just Disconnect” Ivanti Connect Secure VPN appliances

The widely used VPN Ivanti Connect Secure, previously known as Pulse Secure, starkly highlights these security risks. In recent years, Ivanti Secure Connect has been the breeding ground for several zero-day vulnerabilities, which have been widely exploited, sometimes leading to devastating consequences. Now, Ivanti finds itself in the crosshairs once again, with attackers actively exploiting new zero-day vulnerabilities in its software.

So, the pressing question arises: why is this happening now, and why do we believe VPNs are a clear and present danger? The root of the problem can be traced back to the age and evolution of VPN technology. Most legacy VPNs have been in use for decades and are burdened by mounting technical debt. Over time, their code bases have become a patchwork of outdated functions and piecemeal updates. We believe that this amalgamation of old and new code creates a snowball effect, leading to critical software vulnerabilities, such as the ones currently impacting Ivanti. 

 Even though Ivanti has rolled out its first round of patches for two known vulnerabilities (collectively nicknamed “ConnectAround”), it discovered two new critical vulnerabilities in the process and left many of its code versions unpatched. The situation reached a critical juncture last week, prompting the US Cybersecurity and Infrastructure Security Agency (CISA) to take an extraordinary step and issue an emergency directive to all federal agencies to disconnect all instances of at-risk Ivanti Connect Secure and Ivanti Policy Secure products from their networks as soon as possible (and no later than February 2, 2024). This move, while specifically directed at federal agencies, signals a broader message: the threats posed by these vulnerabilities loom large over all enterprises.

Addressing the current crisis requires our immediate action (and at the end of this post we outline what we can do to help), but it’s equally critical to prevent future VPN-related crises. If history is a guide, zero-day vulnerabilities are not mere probabilities, they are inevitabilities. This harsh truth demands that we fundamentally change our approach to network security. It’s not enough to just patch up vulnerabilities as they emerge; we need to overhaul our security architecture to remove these risks entirely. Let’s break the cycle of endless vulnerability patching, and instead build a stronger, more resilient framework – now. 

A clarion call to move beyond legacy VPNs

Zero trust network access, or ZTNA, circumvents the challenges inherent to VPNs with a fundamentally different paradigm for delivering remote access. Instead of the traditional approach of connecting devices directly to the network, ZTNA offers a more secure approach of connecting users to applications through a trust broker.  In doing so, it is able to offer these significant advantages: 

  1. It significantly shrinks the attack surface by removing wide-open VPN tunnels that force you to open inbound listeners which can be exploited by attackers.
  2. It constrains unauthorized lateral movement by taking users off the network and replacing IP-based access with logical, per-session based access that enforces least privilege on your enterprise resources.

Netskope ZTNA Next: No apps left behind

Netskope ZTNA Next was built from the ground up and offers a clear path to replace remote access VPNs for all application access use cases by delivering secure, bi-directional connectivity and bringing with it a host of benefits:  

  • Modernizes remote connectivity. ZTNA Next provides secure remote access to all types of private applications, including ones that require server-to-client or bi-directional connectivity–a gap for other ZTNA solutions–thereby accelerating adoption of a zero trust architecture.
  • Improves overall security posture. ZTNA Next is inherently more secure than VPNs because it provides application access rather than network access. It strictly enforces least-privilege access and adaptively grants the right amount of trust at the right time with the Netskope Zero Trust Engine. The result significantly narrows your attack surface and minimizes the risk of  lateral movement within your network.
  • Delivers a great experience for end-users. Ensure reliable and optimized access to critical applications, including time-sensitive voice and video communications used by call centers and help desks, with our innovative endpoint-based software-defined WAN technology built into the Netskope Client. This technology provides Quality of Experience which uses traffic management capabilities and techniques such as forward error correction to mitigate suboptimal network conditions such as packet loss.
  • Reduces complexity and inefficiency. Ensure that remote workforces of any size can securely and swiftly connect to enterprise resources without taxing your network or security teams with the operational overhead of installing network appliances or constantly applying patches. Netskope ZTNA Next is cloud-based and software-defined, meaning scaling is easy and patching is automatic.

Not all ZTNAs deliver on true VPN replacement

Despite other ZTNA vendors’ promises of a seamless transition away from VPNs, the reality has proven to be more challenging due to a technical limitation; most ZTNA solutions only support endpoint-initiated traffic flows. For this reason, many organizations are still tethered to their VPNs for critical legacy applications such as remote assistance and VoIP. This creates more than just an operational burden on administrators (managing VPN alongside ZTNA); it also increases costs and complexity while leaving organizations exposed to the security vulnerabilities inherent in their residual VPN appliances. 

Choose a ZTNA solution that does more than just promise; choose one that delivers a future-proof architecture. It should comprehensively address every application you will uncover during your implementation, overcoming the challenges of classic ZTNA architectures that rely solely on an inside-out connectivity model.  

Netskope is here to help

Recognizing the urgency of this situation, Netksope is ready to assist customers in transitioning from Ivanti Connect Secure VPN. We are providing the following bundle:

  • 90 day license: Get started quickly with your VPN replacement with Netskope ZTNA Next for 90 days emergency use at no cost and no obligation.
  • Free architecture assessment: Architecture and configuration assessment and consultation services.
  • Free migration assistance: Access 30 days of free professional services assistance for deployment.

Learn more about replacing Ivanti VPN with ZTNA Next here

author image
Michael Koyfman
Michael Koyfman is the Head of Global Solution Architecture at Netskope. He and his team advise Netskope customers on best practices around Netskope deployments.
author image
Gerry Plaza
Gerry Plaza serves as Field CTO in the Chief Strategy Office. His career trajectory has taken him through every IT functional role of increasing responsibilities.

Stay informed!

Subscribe for the latest from the Netskope Blog