close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
          Experience Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            Netskope debuts as a Leader in the Gartner® Magic Quadrant™ for Single-Vendor SASE
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Modern Data Loss Prevention (DLP) for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Stop playing catch up with your networking architecture
                    Understanding where the risk lies
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                            Netskope GovCloud
                            Netskope achieves FedRAMP High Authorization
                            Choose Netskope GovCloud to accelerate your agency’s transformation.
                              Let's Do Great Things Together
                              Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskope Technical Support
                                  Netskope Technical Support
                                  Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                                    Netskope video
                                    Netskope Training
                                    Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

                                      The UK’s NCSC Cyber Essentials Zero Trust Update: Explained

                                      Feb 07 2023

                                      Late in January this year, the UK’s National Cyber Security Centre announced an update to its Cyber Essentials scheme in order to ensure it “continues to help UK organisations guard against the most common cyber threats”. This year’s update isn’t an overhaul on the same scale as last year’s, but it did include important new guidance about zero trust architectures. You can see more detail here, but in essence, the April 2023 updates confirm that Cyber Essentials certification requirements are completely aligned with a zero trust architecture (as understood and explained by the NCSC here.) 

                                      Why Change?

                                      I was particularly pleased to see this update, and the language that explains the rationale for supporting a zero trust architectural approach is notable:

                                      “…many organisations are embracing flexible working, which means lots of different device types may connect to your systems from many locations….it’s also increasingly common for organisations to share data with their partners and guest users, which requires more granular access control policies….Zero trust architecture is designed to cope with these changing conditions by enabling an improved user experience for remote access and data sharing.”

                                      NIST defines zero trust as: “ the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.”

                                      Why Now?

                                      Gartner currently estimates that just 10% of large enterprises will have a mature and measurable zero-trust programme in place by 2026—that’s only an increase of 1% compared to today. And Gartner VP John Watts explains why zero trust is important:

                                      “Many organisations established their infrastructure with implicit rather than explicit trust models to ease access and operations for workers and workloads. Attackers abuse this implicit trust in infrastructure to establish malware and then move laterally to achieve their objectives”.

                                      This implicit trust is prevalent, with many organisations designing exceptions within their security policy for “trusted” cloud applications such as Microsoft 365. They often do this when their legacy security architecture causes user experience problems when it relies on physical appliances and long-winded routing maps. I posted about this last year, and the Netskope Threat Lab’s annual report proved my point when it showed that in 2022, 30% of all cloud malware downloads originated from Microsoft OneDrive. We should never implicitly trust applications, users or network connections when designing security policy. 

                                      And yet “zero trust” isn’t a panacea either—in fact Gartner makes it clear that those ever innovative cyber criminals are setting their eyes on targets that are not (or cannot be) covered by zero trust controls. However, as part of a robust security strategy, technology solutions such as zero trust network access (ZTNA) are certainly some of the most useful tools that security professionals can start to implement today. 

                                      Why Netskope?

                                      Netskope holds the NCSC’s advanced “Cyber Essentials Plus” certification, so we know these guidelines and know what is required to comply. On top of that, we happen to be world experts in zero trust—handy.

                                      Netskope helps organisations deliver zero trust across all four transformation stages of networking, security, applications, and data with a unified SASE-ready security service edge (SSE) platform. We do this by enabling context-driven, correctly-privileged access to both private and public applications.

                                      We get excellent feedback from our customers (click the link and search for “zero trust” feedback). Here are a few examples:

                                      • “Netskope is playing a significant role in our organisation reaching our zero-trust security goals”
                                      • “Netskope is an important step towards zero trust for our company”
                                      • “Netskope allows for the enablement of our Zero Trust strategy”

                                      We would love to have a conversation with you about how we can support your efforts to implement zero trust, or achieve Cyber Essentials certification. Take a look at our eBook; How to Apply Zero Trust Principles the Right Way, for more thoughts on this.

                                      author image
                                      Neil Thacker
                                      Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union GDPR.
                                      Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union GDPR.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog