Many organizations are recognizing that “VPN alone is not enough to secure access, as threats can come from both outside and inside of a network perimeter,” reports Sean Michael Kerner. And, “that realization has in part led to the growth of the zero trust network access (ZTNA) approach.”
When considering the move from VPN to a ZTNA model, organizations should evaluate several factors, Kerner notes, including:
- Culture and mindset
- Identity
- Bridging the gap
Organizations should also "take a thorough inventory of the current VPN solution, to include the infrastructure, limitations, performance, and security features."
Learn more at SDxCentral.
Contact FOSSlife to learn about partnership and sponsorship opportunities.
Comments