What are the most critical features to look for in a zero trust network access solution, particularly for a diverse IT environment?

818 viewscircle icon1 Upvotecircle icon4 Comments
Sort by:
VP of Information Security4 months ago

Zero Trust Network Access is a journey, where multiple security features need to be evaluated like SWG, DLP, End point protection, FWaaS, CASB, Private Access, Browser Isolation, Decryption.  Integration with IDP, SIEM Solution, HoneyPot strategies OR DDOS attack are few additional key use cases to consider. We perform Business value assessment also to make sure impact on existing digital asset, license subscription can be minimized.

Director Global Infrastructure Architecture and Network Ops in Healthcare and Biotech5 months ago

Critical features to look for would be first security (micro-segmentation, least privilege access, encryption, and multi-factor authentication), scalability and flexibility (support for diverse devices and platforms, cloud and on-premises deployment options, and scalability), integration and interoperability (authentication protocols, and API-based integration), user experience and management (single sign-on, and single pane of glass for monitoring and management), compliance and governance, vendor support and reliability

Director of Corporate Development in Healthcare and Biotech5 months ago

Key principles of ZTA 2.0:
Trust No Device
Trust No Content
With ~80% of the global workforce now remote, secure access is critical. We’re implementing ZTA 2.0 to ensure BYOD devices either access the internet only or meet strict conditional access policies with managed SCEP certificates. #ZeroTrust #CyberSecurity

CISO in Software5 months ago

How easily can it integrate with legacy applications and services and what custom development will be required. 

Content you might like

Yes, if followed correctly.39%

Unsure38%

No, there is still a significant risk.19%

Other (please tell us in the comments)3%

View Results

Yes65%

No35%