Six Key Characteristics of a Modern ZTNA Solutions

1422

This post was originally published by  Jeff Birnbaum.

Even as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate a return to the office while simultaneously supporting a portion of the workforce now permanently remote, secure access becomes even more important. 

 

Zero Trust Network Access (ZTNA) has quickly become the gold standard for securing access to on-premises resources, overcoming limitations of traditional VPNs while enabling adoption of modern zero trust security. However, not all ZTNA solutions are built the same. Here are six key characteristics to keep in mind when evaluating ZTNA solutions.

1. Scalable Performance

We have discussed the importance of uptime and performance before, and the message bears repeating for ZTNA solutions. A solution tasked with connecting remote workers to necessary on-premises resources must be responsive and reliable or companies risk losing productivity gains from remote work. A dynamically scalable solution, such as one hosted in the public cloud, provides additional benefits as in-office work ebbs and flows. 

2. Robust Data Loss Prevention (DLP) 

DLP becomes a heightened concern with a remote workforce. In the modern work environment where employees expect to be able to access corporate resources on their own unmanaged personal devices, a ZTNA solution must support advanced DLP capabilities, such as advanced regex and exact data matching, to prevent the exposure of sensitive information through techniques like blocking, digital rights management (DRM), and encryption on download. 

3. Advanced Threat Protection (ATP)

The ease and prevalence in which malware can spread to other devices and users through downloads makes advanced threat protection (ATP) a must-have for ZTNA solutions. A solution using behavior-based techniques with advanced detection engines surpasses those using signature-based techniques and is capable of stopping never-before-seen zero-day threats.

4. BYOD Deployment Options

“Bring-your-own-device” (BYOD) policies are now commonplace in remote work environments. This means an effective ZTNA solution must be capable of serving BYOD users with agentless options while also offering agent-based options for managed devices.  

Read more here: https://www.bitglass.com/blog/

Ad

No posts to display