Gartner ZTNA Market Guide provides actionable recommendations
Whether because of digital transformation, closer integration with partners, or the remote workforce you’re probably finding that at least some data, applications, and services need to be accessible anywhere, anytime. This more complex perimeter expands your attack surface area, increasing corporate risk.
How will you protect yourself? Relying on “security by obscurity” simply doesn’t work. Don’t believe me? Take a quick visit to Shodan, the search engine of Internet-connected devices. You’ll see how easy it is to spot exposed webcams, Cisco appliances, Fortinet VPNs, and more.
Users and resources need protection everywhere, all the time, and you’ll likely want that protection to be very, very granular. That’s ZTNA. It cloaks services from discovery and reconnaissance, creating true, identity-based barriers that prove more challenging for attackers to circumvent than older notions of simple obfuscation. See here to learn the simple steps behind how to configure ZTNA in your organization.
The Gartner Market Guide is an excellent starting point for diving into ZTNA. Along with defining the market and the ZTNA players, the Guide identifies:
- 8 key points shared by all ZTNA offerings
- 2 major ZTNA architectures and how they differ
- 11 use cases of ZTNA
- 7 major risks of using ZTNA
- 22 factors to consider when evaluating ZTNA,
- 7 ZTNA alternatives and when they should — and should not — be used