Beyond VPN replacement
Other ZTNA superpowers CISOs should know


No “castle and moat” analogies in this one — we promise!
Organizations are exploring their initial steps in adopting a zero trust architecture. Often, this involves strategizing meaningful pilot projects to augment and eventually (mostly) replace their VPNs. But what comes next?
The “aggregation layer” aspect of Zero Trust Network Access (ZTNA) shouldn’t stop at reducing VPN reliance. With roots in both access and connectivity, it launches an organization into a long-term SASE mindset, bringing together both security and networking teams and tech.
Join the security experts from Cloudflare as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business:
- Provide slick experiences to even your riskiest users like contractors, temporary hires, and developers
- Maintain business continuity during critical junctures like M&A or cloud migrations
- Roll out phishing-resistant MFA (like hard keys) everywhere to everyone
- Set the groundwork for a whole roadmap of security use cases even after that VPN is (mostly) gone.
Provided by Cloudflare
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Outgoing Kaseya CEO teases "this is just the beginning" for the company
Opinion We spoke to Fred Voccola who remains a key figurehead at the firm as it enters its next chapter...
-
Why Microsoft thinks diversity will keep security workers relevant in the age of agentic AI
News Improved AI skills and a greater focus on ensuring agents are secure at point of deployment will be key for staying ahead of attackers
-
Edge devices are now your weakest link: VPNs, firewalls, and routers were the leading source of initial compromise in 30% of incidents last year – here’s why
News Compromised network edge devices have rapidly emerged as one of the biggest attack points for small and medium businesses.
-
Zero trust gains momentum amid growing network visibility challenges
News Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
-
The big book of selling data protection
Whitepaper Agile risk management starts with a common language
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
-
Detection is not enough: Exposed assets require rapid mitigation to reduce and eliminate risk
Whitepaper Agile risk management starts with a common language
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
-
Cognizant and Zscaler expand partnership to launch new AI-powered zero trust security tools
News The pair’s expanded partnership aims to help customers simplify their security setups while tackling evolving cyber threats