Published: 07 September 2023
Summary
Zero trust network access creates identity- and context-based, logical-access boundaries around users, devices and applications. To select the right ZTNA offering, security and risk management leaders must focus on key capabilities and use cases of a security service edge strategy.
Included in Full Research
Overview
Key Findings
Zero trust network access (ZTNA) is a maturing technology, often requiring more than one vendor to satisfy all use cases. ZTNA is only one implementation part of a larger zero trust strategy.
Most ZTNA deployments are aligned with security service edge (SSE) to secure the majority of end-user access needs. However, organizations deploy separate vendors for niche use cases, such as privileged access management (PAM) and operational technology (OT) secure remote access.
Gartner clients increasingly ask how ZTNA fits into a wider secure remote access strategy. This is because general-purpose ZTNA offerings may not support all requirements for every
To view the entire document, log
in or purchase