ZTNA Trends and Leaders 2022
Zero trust is one of the hottest buzzwords in cybersecurity circles. It is more a philosophy than a specific technology, but it has important implications for emerging cybersecurity technologies, especially in the networking area, where the applications of the approach are often referred to as zero trust network access (ZTNA).
Because networks and applications are becoming more complex, it’s more important to verify and authenticate users and applications across multiple dimensions. We now have cloud networks, WiFi, Internet of Things (IoT) devices, remote users, and hybrid work. ZTNA technology can be used to track and automate the authentication of devices and people as they use all of these networks and applications, or in many cases travel across clouds or the Internet.
Download the Report Here Now!
What Is ZTNA?
A good base definition of ZTNA comes from the U.S. National Institute of Standards and Technology (NIST), which describes zero trust as: “A collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised.“
NIST believes that a zero-trust strategy is “primarily focused on data and service protection but can and should be expanded to include all enterprise assets (devices, infrastructure, components, applications, virtual and cloud components) and subjects (end users, applications and other non-human entities that request information from resources.”
Many ZTNA systems as well as cybersecurity tools function in a similar way: Collect as much data as possible from different sources, then process or analyze that data in a policy engine that can determine if user access is legitimate or a threat. These sources can include:
• User credentials
• Network devices (routers, switches)
• Devices and endpoints
• Log files
• Applications workloads: For example, virtual machines (VMs) or containers
• Cloud or applications data
• API sources such as single sign on (SSO), security information and event management
(SIEM), identity managers, threat intelligence databases
What's in This ZTNA Report?
ZTNA has become one of the hottest areas of investment in the cybersecurity market right now, with more than 30 active startups and at least 20 major public cybersecurity companies adding ZTNA products and solutions.
This report gives a general overview of ZTNA architectures and approaches and details the positioning of the major players in the market. The contents include the following:
Related Articles
Databricks Adds $1.6 Billion for $38 Billion Valuation
Databricks' "data lakehouse" strategy brings in another $1.6 billion in funding and a $38 billion valuation. Here's what's behind all the fuss
SASE Ecosystem Growth: What to Expect in 2024Futuriom believes the secure access service edge (SASE) market is in the early innings of a long-term shift helping cybersecurity pros consolidate distributed cloud security
Companies featured in this report: Akamai, Appgate, Axis Security, Banyan Security, Barracuda, Cato Networks, Cisco, Citrix Systems, Cloudflare, Cyolo, Elisity, Fortinet, Google, Infiot, Illumio, Jamf, Juniper Networks, NetFoundry, Netskope, Okta, Palo Alto Networks, Perimeter 81, Teleport, Versa Networks, VMware, Wandera, Waverly Labs, Zentera Systems, Zscaler
Download the Report Here Now!
Related Articles
Amazon Zeroes In On Diverse, Safe AI
At re:Invent, Amazon Web Services took control of the AI message, focusing on safety and business customization.
Cloudflare’s Nefeli Buy Perks Up the MCN MarketHere's why Cloudflare snapped up little-known multicloud networking company Nefeli Networks
AI Traffic Is Up, and So is Security RiskSecurity platform provider Zscaler says enterprise users are diving into AI applications - and facing new AI cyberthreats