According to Gartner®, “Zero trust network access is now typically deployed to replace remote-access VPN, but overly complex policies are inhibiting adoption. Security and risk management leaders must adopt a continuous life cycle approach to remote-access management in order to achieve success.”
- “Historical architectural behavior remains consistent amongst remote access buyers and this behavioral gap creates a challenge for zero trust network access (ZTNA) adoption. ZTNA is not a “fire and forget” technology; it is inherently dependent on a continuous iterative process, which requires the access policy to adjust as the business and risk levels change.”
- “Some end-user organizations have reported that they have completely replaced traditional VPN with a cloud-hosted ZTNA solution, but experienced challenges with policy development during the implementation.”
- “ZTNA might provide benefits over traditional VPN; however, its deployment should be in alignment with the business’ zero trust strategy, with the business leaders’ remote access requirements for its user base, and conducted using a risk-based methodology to optimize the organization’s security posture.”
- “In 2022, a strong interest and trend toward implementing zero trust strategies into the business environment has continued. Inquiries on this topic have grown 34% in the first 6 months of 2022, as compared with the same period in 2021.”
Access to Gartner Report "7 Effective Steps for Implementing Zero Trust Network Access"Access to the latest Gartner report "7 Effective Steps for Implementing Zero Trust Network Access".
Gartner, 7 Effective Steps for Implementing Zero Trust Network Access, 3 October 2022, Dale Koeppen, Neil MacDonald, John Watts
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.