Zero trust security is a concept that’s been around for several years, but it may finally be starting to gain traction as a technology product. The problem is that zero trust can mean different things to different people – and not all vendors take the same approach. But buyers are beginning to express interest, and a number of security vendors have assembled some interesting approaches to zero trust security.
What is zero trust security?
Even analysts don’t entirely agree on what zero trust security is.
Gartner calls it zero trust network access (ZTNA) and sees ZTNA as something of a fine-grained approach to network access control (NAC), identity access management (IAM) and privilege access management (PAM) – and at least an adjunct to, if not a replacement for, VPNs and DMZ architectures. Users are granted access only to the data and applications they need rather than the entire network, reducing the risk of lateral movement on the network, and device security and beh
Bringing Zero Trust to Secure Remote Access
Demand for secure remote access has skyrocketed during the pandemic. Here Omdia profiles more secure alternatives to virtual private network (VPN) technology.
The coronavirus pandemic has put secure remote access technology in the spotlight as never before. In 2020, the WFH acronym was seared into the consciousness of countless organizations, as their office staff was forced to decamp suddenly and, often for extended periods, to work from home offices (i.e. back bedrooms, living rooms or kitchens) around the world.
Of course, the trend for knowledge workers to work from anywhere had begun long before that: 2005 is generally agreed to be the year in which the number of laptops sold surpassed that of desktops for the first time as the primary form factor for personal computing. Indeed, since the turn of the millennium, technology to enable the so-called “road warrior” has been a staple of hardware and software vendors, as well as pro