Analyst house Gartner, Inc. recently released its 2020 Market Guide for Zero Trust Network Access (ZTNA). Gartner’s Market Guide series covers new and emerging technology markets as both the solutions and enterprise demands evolve. Therefore, Gartner’s Market Guide can provide a great resource for correlating how a fledgling technology space may meet with current or future needs.
According to Gartner, “With the focus on early, more chaotic markets, a Market Guide does not rate or position vendors within the market, but rather more commonly outlines attributes of representative vendors that are providing offerings in the market to give further insight into the market itself.”
Thus, the Gartner 2020 Market Guide for Zero Trust Network Access doesn’t focus on providers, although it does mention representative vendors to watch. Instead, it aims to provide an overarching perspective of ZTNA. A good portion of the vendors included in the report also operates as major players in access management and identity.
At Solutions Review, we read the report and pulled out the key takeaways.
Key Findings: Gartner 2020 Market Guide for Zero Trust Network Access
Gartner mentions the following providers in its ZTNA Market Guide: Akamai, Axis Security, Broadcom, Cato Networks, Cisco, Citrix, CloudDeep Technology, CloudFlare, Cognitas Technologies, Google, Hangzhou Cloudaemon Technology, InstaSafe, NetFoundry, Netskope, Okta, OPAQ, Palo Alto Networks, Perimeter 81, Proofpoint, SAIFE, TransientX, Wandera, Zero Networks, and Zscaler.
Additionally, Gartner mentions AppGate, Banyan, BlackRidge, Google Cloud Platform, Microsoft, Odo, Pulse Secure, Safe-T, Systancia, Unisys, Verizon, Waverley Labs, and Zentera as representatives of stand-alone ZTNA.
In the Market Guide, Gartner defines ZTNA as “products and services that create an identity- and context-based, logical-access boundary encompassing a user and an application or set of applications.”
As such, ZTNA solutions help applications remain hidden from discovery and restrict access via a trust broker to only named entities. In other words, Gartner defines ZTNA as tools that can remove the excess of implicit trust that often accompanies other forms of application access.
ZTNA can help enterprises reduce their attack surface area through controlled identity and context-aware access.
Other Critical Findings
In the Gartner 2020 Market Guide for ZTNA, researchers distinguish between endpoint-initiated and service-initiated ZTNA tools. Also, they posit that ZTNA could replace legacy virtual private networks (VPNs) and other remote access tools.
In fact, researchers say that ZTNA addresses latent risks in excessive implicit network trust obtained via VPN credentials.
You can download the full Gartner 2020 Market Guide for ZTNA here.
Latest posts by Ben Canner (see all)
- Top 7 Cybersecurity Certification Courses from IT Governance USA - October 20, 2020
- Identity Management Lessons from the Barnes and Noble Breach - October 15, 2020
- Findings: The Forrester Wave: Customer Identity And Access Management, Q4 2020 - October 12, 2020