Upgrades to BackBox’s automation platform are aimed at making it easier for network teams to implement zero-trust security functions, including privileged access management and vulnerability management. Credit: Shutterstock BackBox today announced it has incorporated zero-trust capabilities into its network automation platform that will enable network operators to automate security actions including privileged access and vulnerability management. The vendor set out to simplify and tailor zero-trust technologies to network teams, calling its approach “zero trust network operations” (ZTNO). As part of the BackBox Network Automation Platform, ZTNO is designed to help network operators address complex security requirements with actionable insights. The new release includes upgrades to the platform’s privileged access management (PAM), network vulnerability management (NVM), and search capabilities. ZTNO will enable network operations teams to automate specific security tasks at the network layer. It aligns “NetOps with Zero Trust principles in a user-friendly, efficient, and comprehensive manner,” said BackBox CEO Andrew Kahl in a statement. ZTNO is designed to comply with the zero trust architecture (ZTA), which is a “trust but verify” approach to cybersecurity that government agencies and their contractors must follow by September 2024. ZTA “helps agencies build zero trust principles into industrial and enterprise infrastructure and workflows” by treating all “networks and traffic as potential threats,” according to the U.S. General Services Administration (GSA). “ZTNO makes Zero Trust actionable; NetOps teams can follow the framework to create a Zero Trust NetOps environment to complement the organization’s Zero Trust Architecture,” said Josh Stephens, CTO of BackBox, in a statement. “It ensures the network remains secure without limiting a network engineer’s ability to get things done.” BackBox says its ZTNO framework provides: Zero trust use cases, including privileged access management, continuous compliance on discovery, and vulnerability management and mitigation. Integration with a broad range of network and security devices. No-code automation. A common platform from which to manage configurations across network and security vendors and device types. An API-first approach to automation that can be integrated into a NetOps workflow. BackBox defined six pillars of ZTNO: access management, audit and control, device configuration onboarding, vulnerability management onboarding, continuous assessment, and reporting and visibility. For each pillar, BackBox provides intelligence around permissions as well as automated actions to ensure security is addressed across network management. For instance, in terms of human operators and access management, secure access must be provided whether accessing network devices via API, WebURL, or CLI. BackBox does this by “integrating role-based access controls with credential vaults and providing a security, credentialed API.” Another example is when humans are accessing network devices, they must do so in an auditable manner. BackBox ZTNO enables this with controls to record all changes to an “immutable log,” and rollback capabilities are also possible through a centralized access point. On the device side, BackBox provides “golden configurations” when new devices are brought onboard. ZTNO does this with policy enforcement to ensure the proper configurations, and automation reduces manual errors while speeding the process. Devices are also checked for known vulnerabilities when being onboarded. BackBox can remediate the known vulnerabilities with patches or updates. BackBox also performs continuous assessments to ensure configurations remain in compliance and to spot new vulnerabilities. And ZTNO also incorporates reporting for both network and security teams. The growing convergence of network and security teams in itself marks an emerging best practice among businesses that recognize the benefits of increased collaboration, according to research from Enterprise Management Associates (EMA). “We saw in the research that successful partnerships reduce security risk, drive operational efficiencies, and lead to fast resolution of problems on both the networking side and the security side,” said Shamus McGillicuddy, vice president of research at EMA. The BackBox Network Automation Platform is a virtual appliance that can either be run on-premises or in a data center or delivered by BackBox via a software-as-a-service (SaaS) model. The software supports network and security devices from more than 180 vendors, using an API-first approach for integrating with other applications in the network operations center. The platform ships with 3,000 automations out of the box, which can be tailored to specific customer environments. The ZTNO capabilities are available now. Related content how-to Compressing files using the zip command on Linux The zip command lets you compress files to preserve them or back them up, and you can require a password to extract the contents of a zip file. By Sandra Henry-Stocker May 13, 2024 4 mins Linux news High-bandwidth memory nearly sold out until 2026 While it might be tempting to blame Nvidia for the shortage of HBM, it’s not alone in driving high-performance computing and demand for the memory HPC requires. By Andy Patrizio May 13, 2024 3 mins CPUs and Processors High-Performance Computing Data Center opinion NSA, FBI warn of email spoofing threat Email spoofing is acknowledged by experts as a very credible threat. By Sandra Henry-Stocker May 13, 2024 3 mins Linux how-to Download our SASE and SSE enterprise buyer’s guide From the editors of Network World, this enterprise buyer’s guide helps network and security IT staff understand what Secure Access Service Edge (SASE) and Secure Service Edge) SSE can do for their organizations and how to choose the right solut By Neal Weinberg May 13, 2024 1 min SASE Remote Access Security Network Security PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe