Enterprises today operate in a digitally connected world, where technology and connectivity are core to their digital transformation strategies and operations. However,...
The need for zero trust Mobile SASE and IoT threat defence
Enterprises are rapidly adopting API-based applications, which rely on public or mobile internet as the primary data transport. In this article, Tri Pham, Chief Strategy Officer at Tata Communications, delves into two key security techniques: Mobile SASE and Zero Trust (Secure Access Service Edge), that can be used in combination to protect enterprise endpoints.
With the arrival of 5G, the trend towards cellular-based IoT projects shifts beyond low-bandwidth massive IoT applications towards more advanced broadband IoT use cases that require higher throughput, lower latency, and larger data volumes. These use cases include security cameras, drones, and connected cars. The integration of IoT devices into business processes to track assets, manage fleets, monitor patients, and ensure proper functioning of production systems represents a vast virtual expansion of the enterprise network perimeter, exposing a broader attack surface to hackers and criminals.
IoT devices often have limited processing power, storage, and may use proprietary operating systems, making them unable to support a client-based security software model. They are also transient and may cross multiple network boundaries, making traditional IT security controls inadequate. For "off-network/beyond the perimeter" devices, enterprise IT organisations have limited options for enforcing security controls and little to no visibility on device performance and behaviour. To overcome these obstacles, organisations are increasingly embedding secure networking into the app itself, or leveraging the device SIM.
The mobile network edge is the convergence point for data between endpoints and the cloud, making it a critical location to enforce strong security measures. As businesses adopt hyper-connected transport, healthcare, logistics, retail, and industrial value chains, the risk of cyber-attacks increases. As mobile networks become more open, widespread, and built using APIs, and as workloads move to multi-cloud environments, the threat from cyberattacks and attack surface widens.
Vulnerable API endpoints and gateways need to be protected more comprehensively by enabling developers to embed private, zero-trust capabilities in API client and publisher endpoints. This then enables the API publisher to stop exposing endpoints to the Internet - each API session instead leverages a private network, zero trust overlay. For remote and mobile IoT devices, IT organisations have limited options for enforcing security controls and have almost zero visibility on the performance and behaviour of the devices."Most of the deployed API-based applications rely on public or mobile internet as the main data transport, which creates a potential for a multi-fold increase in cyberattacks on vulnerable IoT endpoints and API clients."
Endpoint-enforced security, which requires an agent to be installed on each device, may not be viable due to device support and the associated management costs. Meanwhile, backhauling all the traffic to the cloud may have a latency impact on application performance, and result in high cloud egress costs. These are key reasons why leading organizations are now embedding the zero trust networking functions into the app itself, and using SIM-based approaches."CIOs must adopt a comprehensive security strategy to protect their endpoint assets."

It also provides improved visibility and control, robust security for both data in transit and data at rest, while also doing away with the need for integration with Sanjay's MDM solution."This approach offers several key benefits over traditional cloud or endpoint security solutions, by eliminating latency impacts on application performance and reducing the operational pain of managing agents across distributed devices."

Leaders In Our Own Right
Explore related solution
The world is advancing into a fourth industrial age and emerging technologies are powering it. In this article, Viswanathan Ramaswamy, Vice President of 5G & Digital...
In part one of this blog, I discussed how organisations can embrace IoT technologies to empower their workforce and drive sustainable cross-border growth. Part two of...
What’s next?
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators