Beyond VPN replacement
Other ZTNA superpowers CISOs should know
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
No “castle and moat” analogies in this one — we promise!
Organizations are exploring their initial steps in adopting a zero trust architecture. Often, this involves strategizing meaningful pilot projects to augment and eventually (mostly) replace their VPNs. But what comes next?
The “aggregation layer” aspect of Zero Trust Network Access (ZTNA) shouldn’t stop at reducing VPN reliance. With roots in both access and connectivity, it launches an organization into a long-term SASE mindset, bringing together both security and networking teams and tech.
Join the security experts from Cloudflare as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business:
- Provide slick experiences to even your riskiest users like contractors, temporary hires, and developers
- Maintain business continuity during critical junctures like M&A or cloud migrations
- Roll out phishing-resistant MFA (like hard keys) everywhere to everyone
- Set the groundwork for a whole roadmap of security use cases even after that VPN is (mostly) gone.
Provided by Cloudflare
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Meta engineer trusted advice from an AI agent, ended up exposing user dataNews The internal security incident exposed sensitive user data to unauthorized employees
-
Stryker hackers struck by FBI in domain seizure campaignNews The domain seizures come hot on the heels of Handala's devastating attack on the medical tech firm
-
Securing the supply chain: Why zero trust and recovery readiness are non-negotiableIndustry Insights To prevent supply chain attacks, suppliers must be embedded in trusted business architecture
-
What security teams need to know about the NSA's new zero trust guidelinesNews The new guidelines aim to move an organization from discovery to target-level implementation of zero trust practices
-
Fears over “AI model collapse” are fueling a shift to zero trust data governance strategiesNews Gartner warns of "model collapse" as AI-generated data proliferates – and says organizations need to beware
-
November rundown: CrowdStrike's insider threatITPro Podcast As CrowdStrike grappled with a malicious employee, Cloudflare suffered a major outage
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
-
Cisco ASA customers urged to take immediate action as NCSC, CISA issue critical vulnerability warningsNews Cisco customers are urged to upgrade and secure systems immediately
-
Microsoft and Cloudflare just took down a major phishing operationNews RaccoonO365’s phishing as a service platform has risen to prominence via Telegram
-
Perplexity hits back at Cloudflare amid claims of website 'stealth crawling' to dodge AI blocksNews Perplexity has hit back at claims by Cloudflare that it's been stealthily crawling websites, suggesting recent research was a "sales pitch" for a new blocking product.
