ÎÞÓÇ´«Ã½

Overhauling Cyber Architecture to Align with ZTA

The Challenge: A Complex Overhaul to Adopt Zero Trust

The work included a transition from on-premises VPN to a cloud-based security services edge (SSE) approach. The organization also needed to implement east-to-west protection, container security, and API security into its cloud security stacks. In addition, they needed to decentralize perimeter protection by moving security as close to the edge as possible. Further, they needed to implement a modern, multicloud defensive cyber operations (DCO) environment.

The Approach: AOA and Cutting-Edge Tech Implementation

We provided vendor-agnostic ZTA architectures and design patterns along with an original equipment manufacturer analysis of alternatives (AOA) that ÎÞÓÇ´«Ã½ developed. We selected and implemented an SSE vendor based on unique DOD and client requirements (e.g., route-based vs. proxy, impact level 5 certified). Also, we selected and implemented application security products based on unique DOD and client requirements—for instance, bring your own IP, infrastructure as a service (IaaS) vs. software as a service (SaaS), and hybrid-multicloud. In addition, we collaborated with a previously commercial-focused vendor to adapt their unique solution to support DOD requirements, and deploy a multivendor, distributed secure access service edge (SASE) solution. Further, we integrated multiple commercial-off-the-shelf and government-off-the-shelf productions to provide a modern, multicloud DCO.

The Impact: Security Architecture Transformation

We completely transformed their security architecture from a centralized security solution to a distributed, conditional-based access ZTA. This improved performance while applying security to the edge. We moved from a pilot to full production. We expanded the scope from one network classification to two. And we increased visibility and analytics capabilities to more quickly detect events.

Explore Our Insights on Zero Trust

Tech to Propel Your Mission and Business

ÎÞÓÇ´«Ã½ is the top provider of zero trust solutions to the U.S. government with unprecedented experience driving ZTA implementation at scale. Defense and intelligence organizations, federal agencies, and critical infrastructure businesses can implement zero trust cybersecurity with greater confidence and speed using our proven approach.