Gartner® report: Market guide for zero trust network access
Zero trust is growing, with organizations looking to zero trust network access (ZTNA) to reduce risk and securely support their extended workforces.
As per a Gartner forecast assumption, we estimate that, by 2025, at least 70% of new remote access deployments will be served predominantly by ZTNA as opposed to VPN services, up from less than 10% at the end of 2021.
ZTNA brokers connections between authorized users and specific private applications, granting zero trust access based on context such as identity, device, and content. Unlike VPNs, ZTNA solutions like Zscaler Private Access™ deliver application access without network access and make applications invisible to the open internet.
This Market Guide for ZTNA includes key findings and recommendations to help IT and security leaders kick-start ZTNA as part of a security service edge (SSE) strategy. Take a look to get the Gartner overview of:
- The ZTNA market and how it’s evolving
- Key findings and recommendations
- Benefits, risks, and use cases of ZTNA
Download the whitepaper to learn more about how ZTNA solutions can protect your organization.
Provided by Zscaler
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
HPE's new Cray system is a pocket powerhouseNews Hewlett Packard Enterprise (HPE) had unveiled new HPC storage, liquid cooling, and supercomputing offerings ahead of SC25
-
High performance and long battery life: How Dell AI PCs offer the best of both worldsUnlocking the true potential of on-device AI requires a perfect balance between software and hardware
-
Using AI to code? Watch your security debtnews Black Duck research shows faster development may be causing risks for companies
-
Organizations warned of "significant lag" in deepfake protection investmentnews Defenses are failing to keep up with the rapidly growing attack vector, with most organizations being overconfident
-
Teens arrested over nursery chain Kido hacknews The ransom attack caused widespread shock when the hackers published children's personal data
-
Middlesbrough Council boosts cybersecurity spending, strategy in response to repeated cyberattacksNews Councils across the UK have publicly struggled with maintaining services in the face of major cyber disruption
-
Foreign states ramp up cyberattacks on EU with AI-driven phishing and DDoS campaignsNews ENISA warns of hacktivism, especially through DDoS attacks
-
Cybersecurity leaders must stop seeing resilience as a "tick box exercise" to achieve meaningful protection, says Gartner expertNews Collaboration between departments and a better understanding of organizational metrics are key to addressing security blindspots
-
A new 'top-tier' Chinese espionage group is stealing sensitive datanews Phantom Taurus has been operating for two years and uses custom-built malware to maintain long-term access to critical targets
-
Asahi production halted by cyberattackNews Yet another big brand suffers operational disruption following apparent hacking attack
