Published: 28 February 2022
Summary
Zero trust network access creates an identity- and context-based, logical access boundary around an application or set of applications. To select the right ZTNA offering, security and risk management leaders must focus on key capabilities and use cases in the context of security service edge.
Included in Full Research
Overview
Key Findings
Zero trust network access (ZTNA) is a maturing technology, with multiple vendors offering different forms of ZTNA products and services. However, these offerings are typically just a first step to implement technology as part of a zero trust strategy.
In 2021, ZTNA inquiries from our end-user clients increased more than 50% year over year, driven by significant interest from multiple verticals, including government organizations. VPN replacement for extended-workforce remote access is the top use case. Secondary use cases, such as granting third-party secure remote access, are growing in importance.
Organizations typically start by evaluating ZTNA vendor capabilities and ignore the
To view the entire document, log
in or purchase