Report - Analyst

Gartner’s Latest Report: “2020 Market Guide for Zero Trust Network Access”

Learn more about how Zero Trust Network Access (ZTNA) ensures adaptive, identity-aware, precision access

 

Gartner’s latest Market Guide illustrates how digital business transformation is affecting enterprises worldwide.

Workforces are no longer located “inside” a network and today’s trust model is showing signs of strain. Threat actors exploit this model which results in breaches and exposes companies from a legal, financial, and regulatory standpoint.

ZTNA as a security architecture has been gaining momentum since an initial specification was released by the Cloud Security Alliance in 2014. Also known as a software-defined perimeter, it centralizes security mechanisms that broker trust between the application and both the user and their individual devices. Once trust is established, centrally distributed granular policies govern all transactions.

“ZTNA provides controlled identity- and context-aware access to resources, reducing the surface area for attack. The isolation afforded by ZTNA improves connectivity, removing the need to directly expose applications to the internet.” *

This architecture effectively hides applications and resources from public view, significantly reducing the attack surface. The result is a boundary around applications that is based on identity, context, and logical-access.

Virtually all enterprises have a blend of data center and cloud-based applications. Ensuring that corporate and remote workforces and 3rd parties (such as contractors, suppliers, or distributors) have secure access anytime, anywhere, and from any device is critical for today’s modern business. ZTNA offers immediate benefits by, according to Gartner, "enabling precision ("just in time" and "just enough"), least-privilege access for named users to specific applications only after an assessment of the user identity, device identity and hygiene (highly encouraged), and context has been made."


*Gartner, Inc., 2020 Market Guide for Zero Trust Network Access, Steve Riley, Neil MacDonald, Lawrence Orans, JUNE 8, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


About Pulse Secure

Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services that improve visibility, protection and productivity for our customers. Our suites uniquely integrate cloud, mobile, application and network access to enable hybrid IT in a Zero Trust world. Over 24,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.