Key factors for success for security and risk management leaders
Everyone in IT wants to talk about zero trust these days. In fact, according to Gartner, “inquiries on this topic grew 127% in the first four months of 2021, as compared with the same period in 2020.” Why is zero trust network access (ZTNA) a must-have conversation right now?
- With many employees out of the office and working from home during the COVID-19 pandemic, traditional virtual private networks (VPNs) have presented scalability and performance issues, forcing admins to look for solutions, like Google Cloud’s BeyondCorp Enterprise, that keep their workforce secure in a way that isn’t burdensome for end users.
- A zero trust approach supports the “new normal” of today’s work, which features:
- An increasing number of devices outside of the corporate network
- The critical need for remote access
- Security requirements designed to confront a new breed of sophisticated and evasive cyberattacks
ZTNA deployments must be treated differently than traditional VPNs, but many organizations lack experience implementing them. To help security and risk management leaders enable a smoother and more efficient implementation, Gartner interviewed multiple early adopters of ZTNA technology and developed a list of key findings and recommendations. Download the Complimentary Gartner report: Best Practices for Implementing Zero Trust Network Access to learn 5 points that are crucial to a successful ZTNA project.
(1) Source: Gartner, Best Practices for Implementing Zero Trust Network Access, Lawrence Orans, John Watts, Neil MacDonald, 10 June 2021, GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.