You are on page 1of 1

Zero-Trust Network Access Q&A

Valuable Perspectives from Forrester Senior Analyst David Holmes

ZTNA is a fairly new technology that has generated a bit of confusion. Guest speaker David Holmes, Senior Analyst at Forrester, tackled
this very topic on a live webinar. In this deep-dive follow-up Q&A, David gives additional guidance on the ins and outs of ZTNA.

1. What is ZTNA? How is it different from zero trust? 4. How do ZTNA and SASE fit together? I hear both solve
remote work issues.
Zero trust is a model of information security that reduces
implicit trust throughout an organization. Zero-trust ZTNA effectively split-tunnels traffic (routing only that
network access (ZTNA) is a specific application of the traffic going into the data center). This means that a
larger model. Zero trust has three core prinicples: 1) that remote user’s internet-bound network traffic does NOT
all entities are untrusted, 2) least-privilege access must go through the enterprise VPN and therefore does not go
be enforced, and 3) comprehensive monitoring must be through the enterprise security stack, leaving the user with
put in place. ZTNA is a specific technology that applies little or no inline protection.
these core principles to provide access to applications
Secure access service edge (SASE) complements ZTNA
and networks based on the user’s identity, device security
by providing a cloud-delivered security stack to inspect
posture, and other attributes.
and secure the user’s internet-bound network traffic. SASE
2. Do I need ZTNA? What is wrong with VPN? solutions include ZTNA and many other common security
inspection technologies, like SWGs, CASBs, DLPs and
Organizations can use ZTNA to improve their security
remote-browsing.
posture over legacy virtual private networking (VPN)
access, which nearly always allows too much access. 5. What recommendations do you have for how to adopt
Attackers who gain access to an enterprise network ZTNA?
through compromised credentials typically have full access
Security professionals who are looking to adopt ZTNA
to network all resources. With ZTNA, an attacker using
should consider it in context of the larger SASE model to
compromised credentials would only have access to those
ensure that they are protecting their remote workforce.
resources that the original user had access to.
They should also look for the Universal ZTNA capability if
ZTNA found fast adoption during the pandemic, as VPN they anticipate their remote workforce coming back to the
infrastructure became overloaded with millions and roost in the future.
millions of users when everyone was sent home.
Security professionals should identify their top
3. What is Universal ZTNA vs. “regular” ZTNA? applications, including non-web applications like VDI,
VOIP/SIP and SSH and ensure that the ZTNA solution
While ZTNA found fast adoption during the pandemic in
they’ve chosen works well with all of them. They
support of remote workers (regular ZTNA), some of those
should then deploy ZTNA in front of the most sensitive
workers are returning to the office now. With Universal ZTNA,
applications and the ones used by the largest number of
the user is authenticated and authorized in the same way,
remote workers. Ideally, the average remote worker can
using the same policy, regardless of whether they are local
leave their VPN behind and use ZTNA to access all the
or remote. Multiple vendors in the community are using this
typical corporate applications.
term (Universal) to describe the same capability now.

David Holmes
Guest Speaker, Forrester Senior Analyst
David Holmes is a senior analyst at Forrester, advising security and risk professionals about strategy, architecture, and Zero
FEATURING:
Trust. His coverage includes security architecture (Zero Trust edge, SASE, microsegmentation, Zero Trust network access),
network security controls (firewalls, automated malware sandbox analysis, IDS/IPS), distributed denial-of-service (DDoS)
protection, DNS security, and encryption of data in transit. He helps security leaders plan Zero Trust implementations,
select cybersecurity controls, and understand new mitigation technologies. David has presented at industry conferences
like RSA, Infosec Europe, and the Australian Cybersecurity Conference. He has written regularly for industry magazines on
cryptography, malware, and the security community.

© 2023 Fortinet. All Rights Reserved 1

You might also like