Making sense of a quickly evolving ZTNA market
New insights from the Enterprise Strategy Group


Zero trust network access technology has benefited from a perfect storm. IT teams have revamped their secure access models to support rapid digitization and the shift to remote work.
ZTNA tools provide clear advantages over legacy VPNs, but few comprehensively address security challenges that come up when protecting applications in modern distributed environments.
Tools that support a broader zero trust approach require a substantial set of features and capabilities. This whitepaper shares an overview of where the ZTNA tool market is headed. Here's an overview of what's covered in this asset:
- Where traditional remote access models fall short
- How ZTNA emerged as a VPN replacement
- What marks the next evolution of ZTNA
Download now
Provided by Zscaler
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Cisco takes aim at AI security at RSAC with ServiceNow partnership
News The companies claim Cisco AI Defense and ServiceNow SecOps will help address new challenges raised by AI
By Jane McCallion
-
Why veterans can excel in data centers – and could help the IT sector address its skill shortages
In-depth Ex-military workers can bring software and hardware to civilian roles
By John Loeppky
-
Zero trust gains momentum amid growing network visibility challenges
News Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
By Emma Woollacott
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott
-
Cognizant and Zscaler expand partnership to launch new AI-powered zero trust security tools
News The pair’s expanded partnership aims to help customers simplify their security setups while tackling evolving cyber threats
By Daniel Todd
-
The evolution of SASE and its importance in zero trust
Supported Content SASE has been an increasingly important security framework for five years – but integrating zero trust is crucial to its success
By Keumars Afifi-Sabet
-
The complete guide to the NIST cybersecurity framework
Whitepaper Find out how the NIST Cybersecurity framework is evolving
By ITPro
-
Are you prepared for the next attack? The state of application security in 2024
Webinar Aligning to NIS2 cybersecurity risk-management obligations in the EU
By ITPro
-
Chicanes and tunnels
Webinar The race to securely connect remote users
By ITPro
-
Chicanes and tunnels: The race to securely connect remote users
Webinar Performant and reliable access across the globe
By ITPro