
Eliminating Blind Spots: How Browser-Based ZTNA Closes Security Gaps
Zero trust promised a fundamental shift: security where access depends not just on identity, but on full context—rigorous authentication, device posture, location and real-time risk assessment. Zero trust network access (ZTNA) became the engine driving this vision, replacing porous network perimeters with granular, policy-driven control. Yet, a critical blind spot persists in many implementations: the unmanaged device.
Contractors, partners and BYOD users leverage unmanaged endpoints daily—essential for modern business, yet often outside IT's direct visibility and control. They lack agents and consistent configuration. For security leaders, this gap isn't an inconvenience; it's a direct threat to zero trust integrity. Unmanaged devices represent a glaring vulnerability, undermining the model's core principles.
The Shortcomings Of Traditional ZTNA: Where The Perimeter Fades
ZTNA dethroned legacy VPNs, offering stronger authentication, micro-segmentation (app-specific access) and superior visibility. However, its Achilles' heel is clear: It primarily serves managed devices running dedicated agents under IT's control.
Unmanaged devices are left exposed, and common workarounds are flawed. Consider the following shortcomings:
• Agent Deployment Hurdles: Installing clients on third-party or personal devices is often unscalable, invasive and blocked by user permissions or policies.
• The VDI Burden: Virtual desktops (VDI) create a secure "bubble" but sacrifice performance and user experience—and add significant infrastructure complexity and cost.
• Fragmented Tool Chains: Bolting on separate solutions (browser gateways, SWGs, reverse proxies, etc.) creates parallel access paths, inconsistent policy enforcement and siloed visibility—reintroducing complexity that zero trust aimed to solve.
These approaches fail to deliver true zero trust for unmanaged devices and introduce new risks: policy gaps, visibility holes, operational overhead and user friction. We need a unified approach that can secure every user and device without multiplying complexity.
The Imperative Of Consistency: No Exceptions Allowed
Security effectiveness hinges on consistency. If managed users face stringent zero trust controls while unmanaged users operate through weaker exceptions, the entire model unravels. Uniform enforcement is impossible.
This inconsistency has tangible consequences, especially for compliance (PCI-DSS, HIPAA, GDPR, SOC 2, etc.). These frameworks demand demonstrable, uniform security controls across all access points handling sensitive data. Gaps for unmanaged devices aren't just vulnerabilities; they are potential compliance violations with severe penalties.
To address this, some organizations are turning to browser-based ZTNA. Unlike agent-based ZTNA models that require deep device integration, browser-based ZTNA delivers secure access directly through the user's standard web browser.
This simple difference can be transformative. Contractors on home PCs, partners on their laptops and BYOD users can instantly fall under the exact same granular access policies, continuous risk assessment and inspection frameworks as managed users.
Crucially, it achieves this without requiring device-level control, persistent software installs or intrusive endpoint changes. The browser becomes the universal conduit. Every access request undergoes rigorous verification, monitoring and filtering—true zero trust extended to the entire workforce ecosystem.
Reducing Complexity, Not Just Risk
Security leaders know the trade-off: more control often means more complexity. Accommodating unmanaged access historically meant buying new tools and managing parallel policy engines—draining resources and creating gaps.
Browser-based ZTNA offers consolidation. It can eliminate the need for separate point products for external users. All traffic flows through a single, unified policy engine with common enforcement points. This ensures uniform access control, threat prevention, data protection and monitoring, reducing the overhead of managing siloed systems. In my experience, it streamlines multiple checkpoints into one efficient lane.
Just as importantly, browser-based ZTNA respects the user experience. By supporting standard browsers (Chrome, Edge, Firefox, etc.), users access resources as they always have. No disruptive workflow changes, no specialized software installs or configuration changes. Adoption, I've found, is often frictionless.
Use Case: Secure Access For Unmanaged Devices
The most compelling application of this model is securing access from unmanaged devices, delivering core zero trust benefits universally. By focusing on these devices, you can:
• Enforce identity and risk-based access policies.
• Limit users to specific, authorized applications or data sets.
• Prevent lateral movement within the network.
• Log and audit access for compliance reporting and forensics.
• Inspect web traffic for threats and data loss—no endpoint agent needed.
In contrast to traditional VPNs or VDI setups, I've found that this model is lighter, faster, more scalable and simpler to manage.
Getting Started
Organizations beginning their zero trust journey should first address the critical vulnerability of unmanaged devices. Established, traditional ZTNA models often fail here, leaving contractors, partners and BYOD users outside consistent security controls. Agent deployment is impractical, while VDI introduces performance penalties and complexity. Fragmented solutions recreate the visibility gaps zero trust aims to eliminate.
Prioritize implementing browser-based ZTNA for unmanaged access. This approach directly tackles the core weakness: It allows applying rigorous zero trust policies—strong authentication, granular access control, continuous inspection—to every user without agents or disruptive changes. The standard web browser becomes the secure conduit, delivering immediate risk reduction at the perimeter's weakest point.
Ensure consistent policy enforcement across all users and access paths; security and compliance demand no exceptions. Base access decisions on rich context: identity, device posture (where feasible), location and real-time risk. Critically, reduce complexity by choosing solutions that unify access paths and policy management, avoiding fragmented tools that undermine zero trust. Start by securing high-value applications via this browser approach to demonstrate value and build momentum.
Why This Matters Now
Hybrid work and third-party collaboration are not temporary—they're the permanent operational fabric of our day-to-day efforts. Unmanaged devices are integral to this landscape. Half-measures are obsolete.
A consistent, identity-centric, browser-based ZTNA approach can eliminate fragmented solutions and ensure comprehensive policy coverage. The same stringent rules apply to the CEO on a corporate laptop and the contractor on a personal device. It simplifies operations for security teams.
For CISOs, this means fewer dangerous security exceptions, fewer exploitable gaps and more confidence in protecting data and meeting regulatory obligations—regardless of where work happens or which device is used. Browser-based ZTNA doesn't just close the blind spot; it provides the consistent control demanded by boundary-less work.
Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
3 hours ago
- Forbes
Google Confirms It Has Been Hacked — User Data Stolen
The Google Threat Intelligence Group has officially confirmed that user data has been stolen following a successful hack attack impacting one of its databases. Here's what we know so far. Google Has Been Hacked — Data Has Been Compromised This is not a warning that the Google Chrome web browser is in need of an urgent security update, or a story about switching from passwords to passkeys to protect your Google account. No, this is exactly what the headline says: Google has been hacked. Source? That would be Google itself. An August 5 posting by the Google Threat Intelligence Group has confirmed that one of the corporate databases was impacted by hackers thought to be associated with the ShinyHunters ransomware group, more formally known as UNC6040. 'Google responded to the activity, performed an impact analysis and began mitigations,' the GTIG posting stated, adding the database in question was a Salesforce instance 'used to store contact information and related notes for small and medium businesses.' Customer data was, Google said, 'retrieved by the threat actor,' in the short period of time that the attack window remained open. Although Google has not gone into great detail regarding the attack as of yet, it did confirm that the stolen data consisted of 'basic and largely publicly available business information, such as business names and contact details.' I have reached out to Google for a statement. Google has stated that ShinyHunters commonly uses an attack tactic of extorting victims using emails or telephone calls demanding bitcoin ransom payments within 72 hours of compromise. It has not, however, confirmed or denied that this was the case here. Google did confirm that the attack itself occurred in June. This is a developing story, and I will update it if more information from Google is forthcoming.
Yahoo
4 hours ago
- Yahoo
SK Telecom Co Ltd (SKM) Q2 2025 Earnings Call Highlights: Navigating Challenges with Strategic ...
Consolidated Revenue: KRW4,338.8 billion, a decline of 1.9% year on year. Operating Income: KRW338.3 billion, down 37.1% year on year. Net Income: KRW83.2 billion, down 76.2% year on year. 5G Subscribers: Declined by approximately 220,000 quarter on quarter to 17.02 million. AI Business Revenue Growth: 13.9% year on year. AIDC Revenue: KRW108.7 billion, up 13.3% year on year. AIX Revenue: KRW46.8 billion, up 15.3% year on year. Second Quarter DPS: KRW831 with the record date of August 31. Warning! GuruFocus has detected 2 Warning Signs with BOM:532156. Release Date: August 06, 2025 For the complete transcript of the earnings call, please refer to the full earnings call transcript. Positive Points SK Telecom Co Ltd (NYSE:SKM) has announced a significant investment of KRW700 billion over the next five years to build a world-class information protection system, enhancing cybersecurity measures. The AI business revenue grew by 13.9% year on year, partially offsetting the decline in telecom revenue, indicating strong growth potential in AI-related sectors. SK Telecom Co Ltd (NYSE:SKM) plans to establish a hyperscale AI data center in collaboration with AWS and SK Group affiliates, aiming to secure a hub for AI Infrastructure Superhighway. The company has introduced a customer assurance package, including free mobile device security solutions and a cybersecurity damage compensation insurance program, to regain customer trust. SK Telecom Co Ltd (NYSE:SKM) has been selected as a key player in the government's sovereign AI model development project, positioning itself as a leader in AI technology in Korea. Negative Points The cybersecurity incident led to a decline in MNO revenue due to net subscriber losses and suspension of new subscriber sign-ups, impacting overall financial performance. Operating income decreased by 37.1% year on year, with significant one-off costs incurred due to the cybersecurity incident and related compensation measures. Net income fell by 76.2% year on year, reflecting the substantial financial impact of the cybersecurity incident on the company's earnings. The company has lowered its annual revenue guidance from KRW17.8 trillion to KRW17 trillion, anticipating further financial impact in the second half of the year. The suspension of new subscriber acquisition and cancellation fee waivers resulted in a loss of 750,000 handset subscribers, highlighting challenges in customer retention. Q & A Highlights Q: Can you provide more details on the response measures and financial impact of the cybersecurity incident? A: The response includes a customer assurance package and a KRW700 billion investment in information protection over five years. Financial impacts began in Q2, with MNO revenue declining due to subscriber losses and increased costs from free SIM replacements and dealer compensation. The incident will significantly affect 2025 earnings, with revenue guidance lowered to KRW17 trillion. Q: What are your plans regarding dividend payouts and strategies to regain lost customers? A: The Q2 dividend per share is KRW831, with future dividends to be discussed based on full-year earnings visibility. Strategies to regain customers include restoring subscription years and membership grades for returning customers and offering membership discounts. The abolition of the Handset Subsidy Law allows for more promotional flexibility. Q: Can you elaborate on the AI data center investment in Ulsan and its impact on CapEx? A: SK Broadband will invest in the Ulsan AI data center, with AWS providing AI computing facilities. The project will increase SK Broadband's CapEx by nearly 10% year over year, but overall CapEx will remain stable due to completed 5G network investments. The data center aims for KRW1 trillion in annual revenue by 2030. Q: What are SK Telecom's plans for the national AI model development? A: SK Telecom is actively participating in government-led AI projects and was selected as a finalist for developing sovereign AI foundation models. The company aims to support AI adoption through open-source releases and proprietary technology development, positioning itself as a key partner in Korea's AI ecosystem. Q: How does SK Telecom plan to enhance its cybersecurity measures following the incident? A: SK Telecom has restructured its security system, installed next-generation security solutions, and completed SIM information encryption. The company plans to invest KRW700 billion over five years to strengthen its IT security to global top levels, following the US National Institute of Standards and Technology's cybersecurity framework. For the complete transcript of the earnings call, please refer to the full earnings call transcript. This article first appeared on GuruFocus. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
5 hours ago
- Yahoo
Check Point Software Technologies (CHKP) Enhances Cybersecurity With OneLayer Integration For Private Networks
Check Point Software Technologies recently announced a partnership with OneLayer, focusing on enhanced security integration in private cellular and operational technology environments. This development emphasizes improved security management features, such as automated device context synchronization and dynamic access controls, potentially boosting the company's growth outlook. Over the past week, CHKP's share price movement was largely in sync with broader market trends, marked by a recovery amid ongoing economic concerns and mixed earnings reports from major companies. While the specific integration might have added some marginal influence, overall market dynamics likely held more substantial sway. Buy, Hold or Sell Check Point Software Technologies? View our complete analysis and fair value estimate and you decide. Diversify your portfolio with solid dividend payers offering reliable income streams to weather potential market turbulence. Check Point Software Technologies' recent partnership with OneLayer could positively influence its longer-term objectives, particularly with its focus on AI and SASE integration in cybersecurity. This alliance underscores the company's efforts to enhance device context synchronization and dynamic access controls, key elements that align with its strategic expansion initiatives. Analysts anticipate that the continued investment in such innovations could bolster future revenue and earnings, further supporting the company's growth narrative amid a competitive cybersecurity landscape. Over the past three years, Check Point's total shareholder return was 53.64%, reflecting a solid longer-term performance. In contrast, the company's one-year performance has underperformed the US Software industry, which returned 39.8%. This broader industry comparison highlights both potential opportunities and challenges facing Check Point as it seeks to capitalize on emerging technologies and market demands. The current share price of $188.21, compared to the analyst price target of $226.20, indicates a potential upside of approximately 20.2%. The market's reaction to the OneLayer partnership, along with other strategic initiatives aimed at enhancing revenue and earnings, will be crucial for bridging this valuation gap. Analysts expect revenue to reach $3.1 billion over the next three years, contingent upon successful execution of growth strategies and external economic factors. Click to explore a detailed breakdown of our findings in Check Point Software Technologies' financial health report. This article by Simply Wall St is general in nature. We provide commentary based on historical data and analyst forecasts only using an unbiased methodology and our articles are not intended to be financial advice. It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your financial situation. We aim to bring you long-term focused analysis driven by fundamental data. Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material. Simply Wall St has no position in any stocks mentioned. Companies discussed in this article include CHKP. This article was originally published by Simply Wall St. Have feedback on this article? Concerned about the content? with us directly. Alternatively, email editorial-team@