Advertisement
Top
image credit: Freepik

Zooming Into Zero Trust Network Access (ZTNA) Philosophy

October 22, 2021

Category:

The gist of traditional perimeter-based network protection boils down to a series of contrasts. It combines regular and privileged users, insecure and secure connections, as well as external and internal infrastructure segments under the same umbrella. This model creates the illusion of a trusted zone, which is typically an organization’s internal or local network. Increasingly, enterprises are turning to Zero Trust Network Access techniques to address the issue.

Why? Various perimeter protection tools are used for this purpose: firewalls, Intrusion Detection and/or Prevention Systems (IDS/IPS), Secure Web Gateways, and many others. This principle is highly effective as long as the boundaries of protection are clearly specified and the attacker is outside of those boundaries.

Read More on Network Computing