As a kid who grew up on a steady diet of network TV in the 80s, I always got excited when a crossover was teased at the end of an episode. Take the original Magnum PI starring Tom Selleck. There were several. Magnum and Hawaii Five-O… classic. Simon and Simon on the case with Higgins and Thomas Magnum in 1982, that was a good one! And who could not forget Jessica Fletcher (Angela Lansbury) using her detective skills in episode ‘Novel Connection’!
In 2017 Gartner unveiled a new acronym “ZTNA” short for zero trust network access, and released the Market Guide for Zero Trust Network Access. Revolutionary, especially compared to its incumbent technologies like VPN, ZTNA solution quickly became a new form of remote access that was designed to replace traditional remote access technologies and all the risks they came with.
Welcome to the ZTNA Collection, a curated list of the top favorite Zero Trust Network Access assets. Enjoy the array of glossary pages, blogs, videos, and whitepapers all specific to ZTNA thought leadership. What is Zero Trust Network Access (ZTNA)? Zero Trust Network Access (ZTNA) Created in April of 2019 by Gartner, the term Zero Trust Network Access (ZTNA) represents a set of new technologies designed for secure access to private applications.
Over the past 28 months, two significant events happened which will change the way we build our IT networks. First, obviously, the pandemic. March 2020 caused the workers of the world to move their office cubes to their basements, bedrooms or even the family kitchen table. Remote work became essential for the economy to function. To facilitate access, we saw mass adoption of Zero Trust Network Access (ZTNA) technologies which do not require heritage based solutions like IPSec VPNs.
The term “ZTNA,” zero trust network access, has been around for years – first bursting onto the scene in 2017 when Gartner dropped the term in their ZTNA Market Guide. This solution quickly became the starting point for most zero trust projects in the industry since it helped solve a relatively simple, but critical problem – finding more secure ways of providing remote access to internal applications.
In this new world of hybrid work where users, data, and applications are everywhere, there has been an increased reliance on web-based applications and for good reason. Web apps allow greater accessibility, flexibility, and scalability of resources for users requiring access from anywhere. While web applications are great, IT teams oftentimes encounter onboarding issues, specifically around discovering unidentified domains, and easily defining new policies for those discovered resources.