AWS brings Verified Access security to the Apple enterprise

Amazon introduces its next-generation AWS Verified Access security technology. At its annual AWS re:Invent show, the company confirmed that the technology will be available to businesses running Apple products through partnerships with Jamf, JumpCloud and other device management providers in the space.

Securing the remote enterprise, one service at a time

What’s valuable about AWS Verified Access is that it allows IT to provide secure access to applications without using a VPN. Based on zero-trust principles, Verified Access allows teams to create, configure, and manage a set of detailed policies for access to private applications.

Think of it as an additional layer of protection within the rapidly evolving security landscape, which also ensures that valuable corporate data is not transported through less reliable VPN servers. It also means users won’t call in with help requests because they’re having problems with the VPN.

The idea is that IT can define security policies and criteria, and those requirements must be met before users or their devices can access internal services hosted on AWS. Verified Access evaluates each access request in real time and only connects users to the application if these conditions are met.

Also Read :  Rep. Green advocates for parents rights with approval of House bill

“It means you can define a unique access policy for each app, with conditions based on identity data and device posture,” Amazon explains. “For example, you can create policies that allow only members of the finance team to access your financial reporting application and use only compatible devices.”

Jamf explains that the technology means customers can set things up so that only devices that are managed and originate from a specific Internet Protocol (IP) address range, have a certain device risk score, or have a minimum version of the operating system (OS) can access a system.

What are the advantages?

The biggest change should be an improved security posture. Unlike traditional protections where access is evaluated once, this system evaluates each application access request as it arrives. This makes it much more difficult for bad actors to move from one application to another.

Also Read :  New California law blocks parents who oppose “gender-affirming” therapies for their children

AWS also integrates with numerous device and ID management services (such as Jamf and JumpCloud) and logs all access attempts, which helps with troubleshooting.

But for the growing number of hybrid and remote enterprises, AWS Verified Access is an opportunity to further lock down their cloud-based business services and onboarding processes with the ability to protect users more effectively at the edge.

Earlier this fall, Jamf announced that it was working with AWS to create a workflow to manage and provide an additional layer of security to Amazon Elastic Compute Cloud (Amazon EC2) Mac instances at scale.

“AWS is proud to continue working with Jamf to enable organizations to provide trusted access to their users,” said Dave Brown, vice president of Amazon EC2 at AWS. “Today’s announcement of AWS Verified Access Integration is the next step in a powerful partnership aimed at helping the company succeed with Apple.”

Also Read :  The most likable characters in Wednesday, ranked

Apple’s expanding business game

Of course, the introduction provides another proof point of how far Apple continues to grow as a company. After all, it’s unlikely that this kind of support would be available if Macs, iPhones, and iPads hadn’t taken off so quickly in recent years. It’s also a testament to Apple’s enterprise product security improvements that continue to emerge from players in the space, even as Apple’s share grows.

Follow me on Mastodon or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

Copyright © 2022 IDG Communications, Inc.


Leave a Reply

Your email address will not be published.