According to analyst firm Gartner®, Zero Trust Network Access (ZTNA) “starts with a default deny posture of zero trust. It grants access based on the identity of the humans and their devices — plus other attributes and context, such as time/date, geolocation, device posture, etc. — and adaptively offers the appropriate trust required at the time. The result is a more resilient environment, with improved flexibility and better monitoring.” 

Read the 2022 Gartner® Market Guide for ZTNA to understand:

  • ZTNA use cases 
  • Benefits and risks of ZTNA 
  • How ZTNA is a component of a Zero Trust strategy
  • Representative vendors
  • Market recommendations

 

Gartner, Market Guide for Zero Trust Network Access, Aaron McQuaid, Neil MacDonald, John Watts, Shilpi Handa, 17 February 2022.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Yes, I’d like a complimentary copy

By proceeding, you agree to receive news, updates and marketing communications from us. You can unsubscribe at any time.