The last few years have seen an explosion of interest in Zero Trust Network Access (ZTNA). The zero trust approach replaces the perimeter defense model with a "least privilege" framework where users authenticate to access specific data and applications, and their activities are continuously monitored.
ZTNA gained a boost in the wake of the COVID-19 pandemic, with more employees working remotely. The old perimeter defense model, exemplified by VPNs, provides a secured internet connection that gives remote users privileges as if they were on an internal private network. This doesn't match up with a zero trust mindset; and to make things worse, many organizations found that their infrastructure couldn't handle the traffic loads created by large numbers of remote workers connecting via VPN.
To read this article in full, please click here
http://dlvr.it/StKxzr
Langganan:
Posting Komentar (Atom)
Versa extends SASE platform to the LAN edge
Versa Networks has bumped up its secure access service edge (SASE) software with a variety of features, including AI to help customers bette...

-
Looking to harness a decade of AI/ML development Cisco this week previewed generative AI-based features it will soon bring to its Security C...
-
The upcoming cloud system will provide an added layer of network and data handling security for companies working on national security and d...
-
The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities...
Tidak ada komentar:
Posting Komentar