Home Cybersecurity What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained

What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained

0
What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained



Zero Trust Network Access (ZTNA) is a technology that is quickly replacing VPN’s as a more secure and scalable way to provide remote connectivity. Unlike VPNs, Zero Trust provides a scalable way to provide secure connectivity without the need of centralized equipment. In this video we take a deep dive on Zero Trust Network Access (ZTNA) and walk through the models, principles and architectures it’s based on. We’ll review what exactly “Zero Trust” is, as well as the foundational concepts that are at the core of ZTNA.

The Zero Trust Network Access Hierarchy 0:22
The Zero Trust Model 0:57
Verification: Three Foundational Functions 2:06
Continuous Monitoring 3:27
What is Zero Trust Network Access (ZTNA) 3:52
On-premise vs Cloud 4:36
Cloud ZTNA Implementation and Vendors 4:46
On-premise Implementation and Vendors 5:02
ZTNA De-centralized Architecture 5:20
ZTNA Full Walk Through 6:21

source

LEAVE A REPLY

Please enter your comment!
Please enter your name here