Wednesday, August 19, 2020

Zero Trust Network Access (ZTNA) explained

This blog was written by a third party author
In today’s ever-changing cybersecurity landscape, Zero Trust is here to stay.
Before the concept of Zero Trust was well known, organizations followed the belief that anything within the network is trusted, and anything outside of it is untrusted. Zero trust is built on the idea that all traffic, whether incoming or outgoing, should be inspected, regardless of the source.
Traditional remote connectivity solutions, like VPN, fall short of meeting this requirement because they connect users to an entire network segment, which in many cases provides access to a lot more than what is required to do their job.
With many organizations having to support a suddenly remote workforce, major performance concerns have arisen with VPN since it was never designed to support thousands of employees working remotely and connecting simultaneously.
Zero Trust Network Access can help address both of…

Mark Stone Posted by:

Mark Stone

Read full post

      

The post Zero Trust Network Access (ZTNA) explained appeared first on Cybersecurity Insiders.


August 20, 2020 at 09:11AM

0 comments:

Post a Comment