Gartner defines ZTNA as “a product or service that creates an identity- and context-based, logical access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker.” In short, ZTNA trusts nothing and considers no network segment inherently safe: ZTNA’s default security posture is “deny all”, an approach that hides asset visibility and significantly reduces the attack surface of your network.
A ZTNA security approach has become imperative due to the increasing popularity of cloud migration, Direct Internet Access (DIA), Work-from-anywhere (WFA), and the use of unmanaged BYOD/IoT devices: trends that have dissolved legacy networks’ hard perimeter. Modern client-to-cloud and WFA networks have a software-defined perimeter: the worker’s home has become a branch office, and the internet is part of the corporate network. “Intranet” no longer has a definitive meaning.
ZTNA is a client-to-application—not network-centric—approach to authenticate security based on:
the identity and context of the user, and
the device and application (or any other asset) being accessed
The ZTNA security broker verifies each access attempt regardless of location. It applies corporate policy and grants granular, least-privilege access to an asset (an application, URL, data or other destination). A ZTNA architecture:
ZTNA architecture comprises several components:
ZTNA establishes a secure, elastic, software-defined perimeter around your users, devices and assets. This architecture affords many benefits to your IT operations and users:
ZTNA components are software-based and cloud-delivered, easily fitting into your existing environment. They are maintained and kept up to date by the provider. You can leverage a vendor or provider’s global distribution of gateways and quickly integrate these into your architecture.
ZTNA is an integral element of a leading-edge SASE solution and is best implemented as part of your SASE strategy. No significant change is needed to your network design, topology, or infrastructure—the network becomes transport and authentication/access becomes a software layer on top.
Deploying ZTNA interacts with your existing user/device credential management and security policy management systems which may already be integrated with your SD-WAN architecture.
The Versa SASE solution includes fully integrated SD-WAN, SWG, CASB, ZTNA, branch NGFWaaS and Cloud Gateway capabilities that deliver the following additional benefits:
free ebook
Learn the business and technical background of SASE including best practices, real-life customer deployments, and the benefits that come with a SASE enabled organization.
Get the eBookFind more research, analysis, and information on SASE (Secure Access Service Edge), networking, security, SD-WAN, and cloud from industry thought leaders, analysts, and experts.
White Paper
Zero Trust is a new approach to security that requires organizations to fundamentally shift the way they approach identity and access.
Learn MoreOn-Demand Webinar: 60 min
Deep dive into the two approaches to protecting globally distributed users, devices, and applications have emerged on the market: Zero Trust Security and Secure Access Service Edge (SASE).
Learn MoreSolution Brief
Versa has made it simple for organizations to offer Secure SD-WAN for Work-From-Home users on home appliances or working from anywhere.
Learn More