VPN or ZTNA? Grab A Free Copy of the Gartner ZTNA Market Guide to Answer Your Secure Access Questions
With the shift to work from home (WFH) there’s been a lot of talk about VPN and its successor, zero trust network access (ZTNA). But ZTNA is in fact far broader than “just” better remote access. It describes a whole new access paradigm that’s key to SASE and reflects the changes to today’s business.
Gartner detailed the ZTNA paradigm shift in its updated Market Guide for Zero Trust Network Access. The 18-page document provides an excellent overview of ZTNA technology, where it’s headed, the risks and the opportunities. For a limited time, we’re making copies of this Market Guide available free of charge.
Gartner ZTNA Market Guide provides actionable recommendations
Whether because of digital transformation, closer integration with partners, or the remote workforce you’re probably finding that at least some data, applications, and services need to be accessible anywhere, anytime. This more complex perimeter expands your attack surface area, increasing corporate risk.
How will you protect yourself? Relying on “security by obscurity” simply doesn’t work. Don’t believe me? Take a quick visit to Shodan, the search engine of Internet-connected devices. You’ll see how easy it is to spot exposed webcams, Cisco appliances, Fortinet VPNs, and more.
Users and resources need protection everywhere, all the time, and you’ll likely want that protection to be very, very granular. That’s ZTNA. It cloaks services from discovery and reconnaissance, creating true, identity-based barriers that prove more challenging for attackers to circumvent than older notions of simple obfuscation
The Gartner Market Guide is an excellent starting point for diving into ZTNA. Along with defining the market and the ZTNA players, the Guide identifies:
- 8 key points shared by all ZTNA offerings
- 2 major ZTNA architectures and how they differ
- 11 use cases of ZTNA
- 7 major risks of using ZTNA
- 22 factors to consider when evaluating ZTNA,
- 7 ZTNA alternatives and when they should — and should not — be used
To learn more, download the 2020 Gartner Market Guide for Zero Trust Network Access