www.gartner.com Open in urlscan Pro
13.32.27.112  Public Scan

Submitted URL: https://cwkd-04.na1.hubspotlinks.com/Ctc/I6*113/cWkd-04/MWLmlDSXn54W7QzGh36KN76hW95j2m74NwRDgMQqrWD3q90_V1-WJV7CgQ2RW2CBHmX7dC16JW3g_...
Effective URL: https://www.gartner.com/doc/reprints?id=1-2AQ1IE0K&ct=220801&st=sb&utm_campaign=Digital%20Transformation%20Q3%202022&utm...
Submission: On August 09 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 

Licensed for Distribution

Licensed for Distribution

This research note is restricted to the personal use of ().


MARKET GUIDE FOR ZERO TRUST NETWORK ACCESS

Published 17 February 2022 - ID G00730534 - 12 min read

By Aaron McQuaid, Neil MacDonald, and 2 more

--------------------------------------------------------------------------------

ZTNA augments traditional VPN technologies for application access, and removes
the excessive trust once required to allow employees and partners to connect and
collaborate. Security and risk management leaders should pilot ZTNA projects as
part of an SSE strategy or to rapidly expand remote access.

ADDITIONAL PERSPECTIVES

 * Summary Translation: Market Guide for Zero Trust Network Access(10 March
   2022)
 * Invest Implications: Market Guide for Zero Trust Network Access(22 February
   2022)


OVERVIEW




KEY FINDINGS

 * An increased focus by end-user organizations on zero trust strategies — and a
   desire to provide a more secure, flexible hybrid workforce connectivity — is
   driving increased interest in the ZTNA market.
 * Organizations cite VPN replacement as their primary motivation for evaluating
   ZTNA offerings, but find that justification comes from risk reduction, not
   from any cost savings.
 * Agent-based ZTNA is increasingly deployed as part of a larger SASE
   architecture or SSE offering for the extended workforce, while clientless
   ZTNA continues to grow in popularity to support third-party and BYOD use
   cases.
 * Vendors continue to expand offerings into the data center with identity-based
   segmentation as separate products or combined with ZTNA offerings — blurring
   the lines between segmentation technologies.




RECOMMENDATIONS

Security and risk management leaders responsible for infrastructure security
should:
 * Establish a high-level zero trust strategy first and ensure that your
   identity and access management technologies and processes are well understood
   and mature before selecting and implementing a ZTNA solution.
 * Assess your current VPN landscape if VPN replacement is the primary goal to
   quantify the capabilities of a ZTNA vendor — and if there are sufficient
   benefits of implementing ZTNA to replace the VPN.
 * Consolidate agent-based ZTNA selection with the choice of SSE provider as
   part of the wider SASE architecture decisions to avoid the complexity and
   potentially unsupported configurations of multiple agents on managed devices.
 * Prioritize ZTNA vendor selection based on the desired end-user access use
   cases, as well as the endpoint and application architecture of the
   organization.




MARKET DEFINITION

Gartner defines zero trust network access (ZTNA) as products and services that
create an identity- and context-based, logical-access boundary that encompass an
enterprise user and an internally hosted application or set of applications. The
applications are hidden from discovery, and access is restricted via a trust
broker to a collection of named entities. The broker verifies the identity,
context and policy adherence of the specified participants before allowing
access, and minimizes lateral movement elsewhere in the network. ZTNA removes
excessive implicit trust that often accompanies other forms of application
access, such as legacy VPN. ZTNA, along with CASB and SWG, is one of the core
technologies that make up the security service edge (SSE) market. Gartner is
seeing increased consolidation of these offerings and expects this trend to
accelerate in the future.


MARKET DESCRIPTION

The ZTNA market has evolved from primarily being a VPN replacement to a key
component of a standardized architecture for (remote and small branch) user to
application zero trust networking. ZTNA has yet to gain major traction in the
large branch or campus environments due to high per-user cost and existing
investment in appliance-based solutions. Gartner views ZTNA technology as an
important organizational step toward increasing the maturity of your zero trust
program. When combined with SWG and CASB offerings, ZTNA forms one of the key
technological underpinnings of the emerging SSE market.

ZTNA provides controlled identity- and context-aware access to resources,
reducing the surface area for attack. ZTNA starts with a default deny posture of
zero trust. It grants access based on the identity of the humans and their
devices — plus other attributes and context, such as time/date, geolocation,
device posture, etc. — and adaptively offers the appropriate trust required at
the time. The result is a more resilient environment, with improved flexibility
and better monitoring. ZTNA will appeal to organizations looking for more
flexible and responsive ways to connect and collaborate with their digital
business ecosystems, remote workers and partners.

The isolation afforded by ZTNA improves connectivity, removing the need to
directly expose applications to the internet. The internet remains an untrusted
transport; a trust broker mediates connections between applications and users.
The broker can be a cloud service managed by a third-party provider or a
self-hosted service (in the form of a physical appliance in the customer’s data
center, or a virtual appliance in a public infrastructure as a service [IaaS]
cloud). Once the broker has evaluated a user’s credentials and their device’s
context, the broker communicates to a gateway function placed logically close to
applications. In most cases, the gateway establishes an outbound communication
path to the user. In some ZTNA products, the broker remains in the data path; in
others, only the gateway does.

Optimally, user and device behavior are continuously monitored for abnormal
activity, as described in Gartner’s Continuous Adaptive Risk and Trust
Assessment (CARTA) framework (see Zero Trust Is an Initial Step on the Roadmap
to CARTA). In a sense, ZTNA creates individualized “virtual perimeters” that
encompass only the user, the device and the application.


MARKET DIRECTION

The ZTNA market has continued to mature and grow at a rapid pace. In our
Forecast: Enterprise Network Equipment by Market Segment, Worldwide, 2019-2025,
4Q21 update, Gartner captured a 60% YoY growth rate for ZTNA. The market is
increasingly converging toward an SSE agent-based architecture for the majority
of deployments. We are also seeing increased demand for agentless-based
deployments in the case of unmanaged devices and/or third-party access. Security
and risk management leaders will need to ensure that their chosen vendor
supports both approaches to cover the most common use cases.
In the near to midterm, stand-alone ZTNA vendors will find it increasingly
difficult to compete with fully integrated SSE and SASE offerings. These vendors
should expand their offerings to include SWG, DLP and CASB offerings, or partner
with third-party providers.


MARKET ANALYSIS


BENEFITS AND USES

The benefits of ZTNA are immediate. When replacing legacy network-level VPN
access, ZTNA provides contextual, risk-based and least privilege access to
applications (not networks). When replacing applications exposed in DMZs with
ZTNA, services are no longer visible on the public internet and are thus
shielded from attackers. In addition, ZTNA brings significant benefits in user
experience, agility, adaptability and ease of policy management. For cloud-based
ZTNA offerings, scalability and ease of adoption are additional benefits. ZTNA
enables digital business transformation scenarios that are ill-suited to legacy
access approaches. As a result of digital transformation efforts, most
enterprises will have more applications, services and data outside of their
borders than inside. Cloud-based ZTNA services place the security controls where
the users and applications are — in the cloud. Some of the larger ZTNA vendors
have invested in hundreds of points of presence (POPs) worldwide to satisfy both
latency-sensitive requirements and regional logging and inspection requirements.

Several use cases lend themselves to ZTNA:
 * Opening applications and services to named collaborative ecosystem members —
   such as distribution channels, suppliers, contractors or retail outlets —
   without requiring a VPN or DMZ. Access is more tightly coupled to users,
   applications and services.
 * Deriving personas based on user behavior — for example, if a user’s phone is
   in one country, but their PC is in another country, and both are attempting
   to log on to the same application, legitimate access should be permitted,
   while compromised devices should be blocked.
 * Carrying encryption all the way from the endpoint to the ZTNA gateway (which
   may run on the same server as the application it protects) for scenarios
   where you don’t trust the local wireless hot spot, carrier or cloud provider.
 * Providing application-specific access for IT contractors and remote or mobile
   employees as an alternative to VPN-based access.
 * Controlling administrative access to applications, such as IaaS/PaaS
   applications as a lower-cost alternative to full privileged access management
   (PAM) tools.
 * Extending access to an acquired organization during M&A activities, without
   having to combine networks, combine directories or configure site-to-site VPN
   and firewall rules.
 * Isolating high-value enterprise applications in the network or cloud to
   reduce insider threats and affect separation of duties for administrative
   access.
 * Authenticating users on personal devices — ZTNA can improve security and
   simplify bring your own device (BYOD) programs by reducing full management
   requirements and enabling more-secure direct application access.
 * Creating secure enclaves of Internet of Things (IoT) devices or a virtual
   appliance-based connector on the IoT network segment for connection.
 * Protecting internal systems from hostile networks, such as the public
   internet, by removing inbound access (leveraging phone home), thus reducing
   attack surface.


RISKS

Although ZTNA greatly reduces overall risks, it doesn’t eliminate every risk
completely, as these examples illustrate:
 * The trust broker could become a single point of any kind of failure. Fully
   isolated applications passing through a ZTNA service will stop working when
   the service is down. Well-designed ZTNA services include physical and
   geographic redundancy with multiple entry and exit points to minimize the
   likelihood of outages affecting overall availability. Furthermore, a vendor’s
   SLAs (or lack thereof) can indicate how robust they view their offerings.
   Favor vendors with SLAs that minimize business disruptions.
 * The location of the trust broker can create latency issues for users,
   negatively affecting the user experience. Well-designed ZTNA offerings
   provide multiple POPs with distributed copies of the enterprise’s policies,
   combined with peering relationships to improve redundancy while decreasing
   latency.
 * Attackers could attempt to compromise the trust broker system. Although
   unlikely, the risk isn’t zero. ZTNA services built on public clouds or housed
   in major internet carriers benefit from the provider’s strong tenant
   isolation mechanisms. Nevertheless, collapse of the tenant isolation would
   allow an attacker to penetrate the systems of the vendor’s customers and move
   laterally within and between them. A compromised trust broker should fail
   over to a redundant one immediately. If it can’t, then it should fail closed
   — that is, if it can’t deflect abuse, it should disconnect from the internet.
   Favor vendors that adopt this stance. In addition, verify that vendors
   maintain their own security operations teams that diligently monitor their
   infrastructure for issues affecting the integrity of the service (see
   Risk-Based Evaluations of Cloud Provider Security).
 * Compromised user credentials could allow an attacker on the local device to
   observe and exfiltrate information from the device. ZTNA architectures that
   combine device authentication with user authentication contain this threat to
   a degree — stopping the attack from propagating beyond the device itself. We
   suggest that, when possible, MFA should accompany any ZTNA project (see
   Enhance Remote Access Security With Multifactor Authentication and Access
   Management).
 * Given the concerns with trust broker failure and user credentials, ZTNA
   administrator accounts are ripe for attack. Limit the number of
   administrators and monitor their activities to reduce insider threats, and to
   favor vendors that require strong authentication for administrators by
   default.
 * Some ZTNA vendors have chosen to focus their developments on supporting web
   application protocols only (HTTP/HTTPS). Carrying legacy applications and
   protocols through a ZTNA service could prove to be more technically
   challenging for vendors to develop and for customers to deploy.
 * Some vendors have adopted the usage of dTLS to enable more effective
   transport for real-time communication applications. Clients should ensure
   that their providers support this protocol if they intend to leverage
   real-time applications over ZTNA.
 * The market is in flux, and smaller vendors could disappear or be acquired.


REPRESENTATIVE VENDORS

The vendors listed in this Market Guide do not imply an exhaustive list. This
section is intended to provide more understanding of the market and its
offerings.



MARKET INTRODUCTION

The vendor selection is based on the old list from the previous Market Guide,
client inquiry and internal discussion among the author team (see Note 1).



TABLE 1: REPRESENTATIVE VENDORS OF ZTNA

Enlarge Table
 * 



VendorProduct or Service Name
 Absolute Software (NetMotion)
NetMotion ZTNA
 Akamai
Enterprise Application Access
 Appgate
Appgate SDP
 Axis
Axis Platform
 Banyan Security
Zero Trust Remote Access
 Bitglass
Zero Trust Network Access
 BlackRidge
Transport Access Control
 Broadcom
Symantec Secure Access Cloud
 Cato
Cato Secure Remote Access
 Check Point Software Technologies
Harmony Connect
 Cisco
Duo Beyond
 Citrix
Secure Private Access
 Cloudaemon
Taiji Perimeter
 CloudDeep Technology (China only)
Deep Cloud SDP
 Cloudflare
Cloudflare Access
 Cognitas Technologies
Crosslink
 Cyolo
Zero Trust Network Access (ZTNA) 2.0
 Deloitte (Transientx)
TransientAccess
 Forcepoint
Private Access
 Google
BeyondCorp Remote Access
Google Cloud Platform Identity-Aware Proxy
 InstaSafe
Zero Trust Remote Access
 Ivanti
Ivanti Neurons for Secure Access
 Jamf
Jamf Private Access
 McAfee
MVISION Private Access
 Microsoft
Azure AD Application Proxy
Web Application Proxy for Windows Server
 NetFoundry
Zero Trust Networking Platform
 Netskope
Netskope Private Access
 Okta
Okta Identity Cloud

 Palo Alto Networks
Prisma Access
 Perimeter 81
Zero Trust Network Access
 Safe-T
Zone Zero
 SAIFE
Continuum
 Systancia
Systancia Gate
 Trusfort
Zero-Trust Business Security
 Twingate
Twingate
 Unisys
Stealth
 Verizon
Verizon Software Defined Perimeter (SDP)
 Versa
Versa Secure Access
 Waverley Labs
Open Source Software Defined Perimeter
 Zentera Systems
Secure Access ZTNA
 Zero Networks
Access Orchestrator
 Zscaler
Private Access



Source: Gartner (February 2022)




MARKET RECOMMENDATIONS

Given the significant risk that the public internet represents — and the
attractiveness of compromising internet-exposed systems to gain a foothold in
enterprise systems — enterprises need to consider isolating digital business
services from visibility by the public internet. ZTNA cloaks services from
discovery and reconnaissance and erects true, identity-based barriers that are
proving to be more challenging for attackers to circumvent than traditional
network level VPNs and firewalls.

For legacy VPN access, look for scenarios in which targeted sets of users can be
switched to performing their work through a ZTNA, providing immediate value in
improving the overall security posture of the organization. In most cases, you
can start with contractor and/or third-party access, and then move on to
employee-facing applications as you progressively replace your legacy VPN. A
ZTNA project is a step toward a more widespread zero trust networking (default
deny, zero implicit trust) security posture. Specifically, nothing can
communicate (or even see) an application resource until sufficient trust is
established, given the risk and current context to extend network connectivity.

Be aware that ZTNA is an (albeit important) component of a zero trust strategy.
Do not assume that purchase of a ZTNA (or any product) is the only thing you
must do as you implement a general zero trust architecture.

For DMZ-based applications, evaluate what sets of users require access. For
those applications with a defined set of users, plan to migrate them to a ZTNA
service during the next several years. Use the migration of these applications
to public cloud IaaS as a catalyst for this architectural shift. Consider
placing them in a private IP space with no access except through a ZTNA service.
This does not apply to public-facing citizen or consumer applications that are
not in scope for ZTNA due to licensing, account and identity management
challenges for these types of public-facing applications.


EVIDENCE

1  Top Routinely Exploited Vulnerabilities, Cybersecurity and Infrastructure
Security Agency (CISA).


NOTE 1REPRESENTATIVE VENDOR SELECTION

The vendors named in this guide were selected based on client inquiry and the
authors’ collective experience.
 

IS THIS CONTENT HELPFUL TO YOU?



YesNo

© 2022 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a
registered trademark of Gartner, Inc. and its affiliates. This publication may
not be reproduced or distributed in any form without Gartner's prior written
permission. It consists of the opinions of Gartner's research organization,
which should not be construed as statements of fact. While the information
contained in this publication has been obtained from sources believed to be
reliable, Gartner disclaims all warranties as to the accuracy, completeness or
adequacy of such information. Although Gartner research may address legal and
financial issues, Gartner does not provide legal or investment advice and its
research should not be construed or used as such. Your access and use of this
publication are governed by Gartner’s Usage Policy. Gartner prides itself on its
reputation for independence and objectivity. Its research is produced
independently by its research organization without input or influence from any
third party. For further information, see "Guiding Principles on Independence
and Objectivity."

 * About
 * Careers
 * Newsroom
 * Policies
 * Site Index
 * IT Glossary
 * Gartner Blog Network
 * Contact
 * Send Feedback

© 2022 Gartner, Inc. and/or its Affiliates. All Rights Reserved.



SWITCHING TO SIMPLIFIED SITE

Your browser version is not supported by Gartner.com. Switching to the
simplified version of the site some features will no longer be available to you,
but overall experience will be improved.

Your browser version is currently supported by Gartner.com. If you change to the
simplified version of the site, some features will no longer be available to
you.


YOUR PRIVACY IS IMPORTANT TO US


By clicking “Accept all,” you agree to the storing of cookies on your device to
enhance site navigation, analyze site usage and assist in our marketing efforts.
To learn more, visit our Privacy Policy and Cookie Notice.

Customize Accept all



PRIVACY PREFERENCE CENTER


By clicking “Accept all,” you agree to the storing of cookies on your device to
enhance site navigation, analyze site usage and assist in our marketing efforts.
To learn more, visit our Privacy Policy and Cookie Notice.
Accept all


SELECT COOKIES

STRICTLY NECESSARY COOKIES

Always Active


These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

View Vendor Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

View Vendor Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

View Vendor Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

View Vendor Details‎
Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Select and proceed