Published: 03 October 2022
Summary
Zero trust network access is now typically deployed to replace remote-access VPN, but overly complex policies are inhibiting adoption. Security and risk management leaders must adopt a continuous life cycle approach to remote-access management in order to achieve success.
Included in Full Research
Overview
Key Findings
Historical architectural behavior remains consistent amongst remote access buyers and this behavioral gap creates a challenge for zero trust network access (ZTNA) adoption. ZTNA is not a “fire and forget” technology; it is inherently dependent on a continuous iterative process, which requires the access policy to adjust as the business and risk levels change.
Some end-user organizations have reported that they have completely replaced traditional VPN with a cloud-hosted ZTNA solution, but experienced challenges with policy development during the implementation.
ZTNA might provide benefits over traditional VPN; however, its deployment should be in alignment with the business’ zero
To view the entire document, log
in or purchase