Securely Managing Sub-Networks for Remote Workers

ZTN Remote Setup and Network Security

The Data Capture Agent is similar to RMM software, but over the last two decades, it has been refined to focus on capturing data from all networked print devices. Although the software may "see" other devices on the network, it is not configured to interpret any intelligence from those endpoints. This is why the RMM and DCA software must be deployed together to accomplish our objective. Capturing data from personal USB print devices, more likely to be found in remote/home environments, is more difficult but not impossible. We know the software can be installed remotely - that is not an issue. In our case study example, as many as 40 persons (out of 100) are expected to work remotely. This means 40 "sub-networks" that must be part of the ZTN/VPN structure and the ability to capture the entire hierarchy of endpoints (laptops, mobile devices, routers) and the printers and their respective consumables status and page output data. Is this all feasible?

Yes, it is feasible to implement the structure you're describing, where 40 remote workers create sub-networks that need to be integrated into the ZTN/VPN and managed using both RMM and DCA software. However, specific considerations need to be addressed to ensure the seamless functioning of this setup.

Feasibility Overview:

  1. RMM and DCA Deployment Together: Since RMM and DCA software complement each other, deploying them together ensures comprehensive monitoring and management of IT infrastructure and print devices. The RMM will manage all IT-related endpoints, such as laptops, mobile devices, routers, and IoT endpoints, while DCA will focus on capturing detailed information from networked print devices. The fact that both software can be installed remotely simplifies deployment, but they will need to communicate over the same ZTN/VPN infrastructure to ensure security and proper data flow.

  2. Managing Personal USB Printers: Capturing data from personal USB-connected printers at remote/home offices presents challenges, as these printers are often not part of the corporate network. However, it is possible to configure the DCA to recognize and gather data from USB-connected devices if the proper drivers and software are installed on the user’s endpoint (such as their laptop). While it may require additional configuration for each remote worker, DCA can capture essential print metrics such as consumables status and page output once the USB printer is included in the network management scope.

  3. Integration into ZTN/VPN: Managing 40 remote sub-networks within a Zero Trust Network (ZTN) and Virtual Private Network (VPN) is feasible. The ZTN ensures that each device, whether in the corporate office or a remote home, is verified before accessing the network. Once connected to the VPN, remote devices—laptops, routers, and printers—are treated as secure endpoints within the ZTN framework. The combination of ZTN and VPN provides layered security and ensures that the 40 individual sub-networks can function securely without compromising corporate security policies.

  4. Capturing the Full Endpoint Hierarchy: The RMM will oversee the complete endpoint hierarchy, managing laptops, mobile devices, routers, and other connected devices across these 40 remote sub-networks. The VPN ensures encrypted communication between these endpoints and the corporate network, allowing the RMM and DCA to access and gather necessary data. This hierarchical endpoint monitoring is integral to capturing print devices' performance data (including consumables and page output) while ensuring that all other devices are secure and compliant with corporate policies.

  5. Remote Configuration and Management: Both RMM and DCA can be configured remotely, making it easier to manage these remote environments without requiring physical presence at each site. The RMM will ensure that any security patches, software updates, or configurations can be applied automatically to all remote devices. Meanwhile, the DCA will continuously monitor print devices and provide real-time updates on consumables and page output.

  6. Scalability and Performance: The infrastructure you’re proposing is scalable. If the company grows and more remote workers are added, the setup can accommodate new users and endpoints with minimal impact on network performance. However, maintaining bandwidth and managing network traffic across 40 VPN tunnels may require robust infrastructure at the corporate office and individual remote locations.

Challenges to Consider:

  • Privacy Concerns: Managing personal USB printers and home devices may raise privacy concerns for remote workers. Clear communication regarding what the DCA and RMM software will monitor (e.g., work-related devices only) can help alleviate these concerns.
  • Network Stability: Ensuring remote workers have stable internet connections is critical, especially when routing traffic through VPNs. Poor connectivity can cause issues with data capture and may interrupt the performance of the RMM and DCA software.
  • Initial Setup: While remote deployment of RMM and DCA is possible, configuring printers and network devices within each remote sub-network may require additional remote assistance, particularly for less tech-savvy workers.

Conclusion:

Integrating 40 remote sub-networks into a Zero Trust Network/VPN structure is feasible. This allows both RMM and DCA software to monitor the complete endpoint hierarchy and capture essential print and device data. While there are challenges related to USB printers, privacy, and network performance, these can be managed with proper planning and configuration, ensuring a secure, scalable solution for remote and office-based employees.

Related reading: