{"id":109292,"date":"2020-04-13T11:00:57","date_gmt":"2020-04-13T18:00:57","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=109292"},"modified":"2021-09-12T22:56:31","modified_gmt":"2021-09-13T05:56:31","slug":"network-federal-agency-remote-workers","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/04\/network-federal-agency-remote-workers\/","title":{"rendered":"Securing US Federal Agency Remote Workers and Branch Offices"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">During the COVID-19 pandemic, governments everywhere are focusing on delivering essential citizen services and maintaining critical infrastructure while keeping their workers safe. While Palo Alto Networks has announced <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/03\/cloud-securing-remote-workforces\/\"><span style=\"font-weight: 400;\">programs to help rapidly scale secure telework options<\/span><\/a><span style=\"font-weight: 400;\"> during this pandemic, we\u2019re also working on longer-term plans to address the changing world of work. Here in the U.S., this crisis has demonstrated the continuing need to ensure confidentiality, integrity and availability of services to federal agency personnel, regardless of location<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recently, the Office of Management and Budget (OMB) released a <\/span><a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2019\/09\/M-19-26.pdf\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">memorandum<\/span><\/a><span style=\"font-weight: 400;\"> outlining updates to the <\/span><a href=\"https:\/\/www.cisa.gov\/trusted-internet-connections\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Trusted Internet Connections (TIC) initiative.<\/span><\/a><span style=\"font-weight: 400;\"> TIC 3.0 aims to help agencies adopt modern security capabilities while connecting to the internet and other services outside their traditional perimeter.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Older TIC guidance has hindered agency adoption of cloud and mobile services, which are key aims of the <\/span><a href=\"https:\/\/cloud.cio.gov\/strategy\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Cloud Smart<\/span><\/a><span style=\"font-weight: 400;\"> strategy. Traditionally, federal agencies had few options to secure their branch offices and remote users connecting to the internet for cloud and Software-as-a-Service (SaaS) access. They could build and manage their own TICs or acquire TICs from managed services providers. They backhauled their branch office traffic over private links to their data centers and then to the TICs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mobile workers are key to achieving many agency missions, but similarly, securing them has been challenging. Agencies typically use different security products to connect remote users to their office or data center. This introduces another security stack to manage, and application performance for remote users falls the farther they get from their connection point. For both remote users and branch offices, this architecture created a less-than-ideal user experience for everyday applications such as Office 365.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-sase\"><span style=\"font-weight: 400;\">secure access service edge<\/span><\/a><span style=\"font-weight: 400;\"> (SASE) helps federal agencies embrace cloud and mobility by providing networking and network security services from a cloud-based, unified platform. <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-next-generation-network-security\"><span style=\"font-weight: 400;\">Prisma Access<\/span><\/a><span style=\"font-weight: 400;\"> by Palo Alto Networks is a<\/span> <span style=\"font-weight: 400;\">comprehensive SASE solution that delivers networking and security ideal for agency branch offices and remote users, two TIC use cases. Palo Alto Networks just announced that <a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2020\/palo-alto-networks-secures-fedramp--in-process--milestone-for-prisma-access\">Prisma Access has achieved the designation of \"In Process\"<\/a> for the Federal Risk and Authorization Management Program (FedRAMP). Prisma Access is working toward a FedRAMP Moderate authorization, which will enable agencies to meet TIC policy for branch and remote user use cases, and provide a unified policy framework across users.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rather than creating single-purpose technology overlays that are normally associated with point products, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/access\"><span style=\"font-weight: 400;\">Prisma Access<\/span><\/a><span style=\"font-weight: 400;\"> uses a cloud-based infrastructure to deliver security and networking services, which include:\u00a0<\/span><\/p>\n<p><b>Networking\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>SD-WAN<\/b><span style=\"font-weight: 400;\"> that supports Palo Alto Networks Next-Generation Firewalls and integrates with third-party SD-WAN appliances.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>VPN<\/b><span style=\"font-weight: 400;\"> options for connecting users and networks, including IPsec, SSL\/IPsec, and clientless VPN.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Quality of service (QoS)<\/b><span style=\"font-weight: 400;\"> that prioritizes bandwidth for critical applications.<\/span><\/li>\n<\/ul>\n<p><b>Security<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Firewall as a service (FWaaS)<\/b><span style=\"font-weight: 400;\"> for branch offices and remote locations.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Zero Trust network access (ZTNA)<\/b><span style=\"font-weight: 400;\"> for application access control and threat prevention.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>DNS security<\/b><span style=\"font-weight: 400;\"> featuring advanced analytics and machine learning to protect against threats in DNS traffic.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Threat prevention<\/b><span style=\"font-weight: 400;\"> that blocks exploits, malware, and command-and-control (C2) traffic using threat intelligence.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cloud secure web gateway (SWG)<\/b><span style=\"font-weight: 400;\"> that blocks malicious sites using static analysis and machine learning.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Data loss prevention (DLP)<\/b><span style=\"font-weight: 400;\"> that categorizes sensitive data and applies policies to control access.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cloud access security broker (CASB)<\/b><span style=\"font-weight: 400;\"> that provides governance and data classification to stop threats with in-line and API-based security.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All users, regardless of where they are located, connect to cloud-delivered Prisma Access to safely use cloud and data center applications. For agency branch offices, Prisma Access offers not only security but <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-sase-secure-sd-wan\/\"><span style=\"font-weight: 400;\">SD-WAN hub as-a-service<\/span><\/a><span style=\"font-weight: 400;\">, providing high-performance, low-latency interconnect between branch offices and cloud workloads. Combining <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/sd-wan-and-sase\"><span style=\"font-weight: 400;\">security and end-to-end SD-WAN<\/span><\/a><span style=\"font-weight: 400;\"> provides excellent user to application experience. By consuming Prisma Access SD-WAN hub as-a-service, agencies eliminate the complexity of building their own SD-WAN hub and interconnect fabric.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/sd-wan\"><span style=\"font-weight: 400;\">Palo Alto Networks SD-WAN<\/span><\/a><span style=\"font-weight: 400;\"> delivers an optimal user experience for cloud applications without compromising security. All users, whether at headquarters, branch offices or remote, can connect to Prisma Access to easily access SaaS, public cloud and data center applications, delivering security and optimized end-to-end performance. Additionally, with our recently announced <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/datasheets\/support\/prisma-access-service-sla.pdf\"><span style=\"font-weight: 400;\">SLAs<\/span><span style=\"font-weight: 400;\"> for SaaS<\/span><\/a><span style=\"font-weight: 400;\"> delivered by the Prisma fabric, agencies can be confident in their cloud experience, with guaranteed access to a growing list of SaaS providers, such as Microsoft Office 365, Box.com, Salesforce.com and more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Agencies no longer have to deploy and manage a separate security stack for teleworkers or other remote workers. With Prisma Access, they can extend consistent security and performance to branch offices and workers, no matter where they are. And in the event of natural disasters, public health emergencies or unexpected infrastructure damage, Prisma Access can help agencies quickly and efficiently develop secure communications. As a cloud-delivered service, Prisma Access scales automatically to meet demand, requires no infrastructure deployment, and operationalizes quickly with zero-touch provisioning.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SASE is the next wave of evolution for both security and connectivity, and Prisma Access is bringing new SASE innovations to federal agencies. For more information on how Palo Alto Networks can help agencies address TIC 3.0 requirements, please read our <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/techbriefs\/tic-3-0\"><span style=\"font-weight: 400;\">tech brief<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prisma Access, a product that can help secure federal agency remote workers, has achieved the designation of \"In Process\" for FedRAMP.<\/p>\n","protected":false},"author":663,"featured_media":109293,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484,6768,6765],"tags":[6888,6640,123,6833,102],"coauthors":[7064,6832],"class_list":["post-109292","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","category-secure-the-cloud","category-secure-the-enterprise","tag-branch-security","tag-fedramp","tag-government2","tag-prisma-access","tag-remote-access","sase_category-use-cases"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/panw-federal-TEST1-1200x627-3.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=109292"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109292\/revisions"}],"predecessor-version":[{"id":109376,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109292\/revisions\/109376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/109293"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=109292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=109292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=109292"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=109292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}