Traditionally, many companies have used VPNs and firewalls to protect their resources from unauthorized remote access. However, these solutions cannot meet the modern requirements of hybrid and remote workforces.
A VPN has several limitations:
- They are perimeter-focused. While this reinforces the network perimeter, it also means an authorized user can have full access to the network and resources, allowing lateral attacks.
- Controls are at the network level. The access controls of a VPN are set at the network level without providing visibility at the application layer.
- Poor support for BYOD devices. When you allow access to a network with a BYOD device and use a VPN, you are giving access to the network by unmanaged endpoints. This situation increases the risk of malware and data breaches.
ZTNA includes several advantages over a traditional VPN including:
- Security at the app layer: Unlike a traditional VPN, which provides full access to the corporate network, ZTNA sets the perimeter at the application layer.
- One-by-one authorization: ZTNA assesses and authorizes each access request.
- Hidden IT infrastructure: Because ZTNA only shows the user the resources they need, an attacker cannot move laterally.