Zero Trust Network Access (ZTNA)

What is Zero Trust Network Access (ZTNA)?

Created in April of 2019 by Gartner, Zero Trust Network Access (ZTNA) represents a set of innovative technologies designed for secure access to private applications. Also referred to as software-defined perimeter (SDP), ZTNA technologies use granular access policies to connect authorized users to specific applications without the need for access to the entire corporate network, establishing least-privilege app-level segmentation as a replacement for network segmentation and, unlike a VPN concentrator, avoiding exposure of the applications’ location to the public internet.

  • ZTNA explained
  • Understanding ZTNA services
  • Key concepts of ZTNA
  • ZTNA use cases
  • HPE Aruba Networking ZTNA
ZTNA explained

What is Zero Trust Network Access (ZTNA)?

Created in April of 2019 by Gartner, Zero Trust Network Access (ZTNA) represents a set of innovative technologies designed for secure access to private applications. Also referred to as software-defined perimeter (SDP), ZTNA technologies use granular access policies to connect authorized users to specific applications without the need for access to the entire corporate network, establishing least-privilege app-level segmentation as a replacement for network segmentation and, unlike a VPN concentrator, avoiding exposure of the applications’ location to the public internet.

Understanding ZTNA services

Understanding ZTNA services and how they work

The reason ZTNA adoption is becoming more prevalent is due to the need to work from anywhere, whereby every user, application and device now safely connects via the internet . This makes sense, as more business apps become SaaS-based and private apps continue to run in hybrid or multi-cloud environments.

The challenge is that the Internet is purely designed to connect things, not to block them. With a proper IP address and outbound call capabilities, all devices can communicate through the Internet. Threat actors exploit organizations that do not have the proper Zero Trust strategies in place.

Unlike VPNs or firewalls, ZTNA services are designed to securely connect specific entities to each other, without the need for overall network access. In most cases these are employees and third-party users connecting from home, on the road, or in the office. But this is not limited to just users; ZTNA can also apply to application-to-application traffic as well in the form of microsegmentation.

Key concepts of ZTNA

Key concepts of ZTNA

  • Zero Trust Foundation: ZTNA is built upon the principle of Zero Trust, which means that no user or system is trusted by default, regardless of where or how they are connecting. Every access request must be fully authenticated, authorized, and encrypted before granting access.
  • Application-Centric Access: Unlike traditional network access that grants access to the network, ZTNA ensures that access is given only to specific applications. This is achieved through outbound-only connections, which reduces the attack surface by not exposing the corporate network to the internet.
  • Least-Privilege Access: ZTNA enforces the principle of least privilege by providing users with the minimum level of access necessary to effectively do their job. This is done through granular access policies that are consistently and globally applied across the organization, regardless of the user’s location.
  • Cloud-Native for Speed and Scalability: To ensure access is both fast and reliable, ZTNA leverages cloud infrastructure. This allows for scalability to meet varying bandwidth demands and ensures that users can instantly connect to the applications they need without compromising security.
ZTNA use cases

ZTNA use cases

  • VPN Alternative for Work from Anywhere: Use ZTNA to replace remote access VPNs that are typically used to connect remote users to a network, and deliver a faster, more secure experience while doing so.
  • In-office Employee Access: Avoid inherently trusting on-premises users, and leverage publicly hosted Zero Trust brokers, or private brokers deployed within your own environment, for least-privilege access with simpler segmentation, faster user experience, easier compliance.
  • Securing Third-party Access: Use agentless access to securely enable business ecosystem partners, suppliers, vendors, and customers to access critical business data, without granting access to the entire corporate network.
  • Accelerate IT Integration During M&A or Divestitures: ZTNA helps accelerate the process of each down from 9-14 months, to just days or weeks by avoiding the need to consolidate (or split) networks, to deal with network address translation (NAT) for overlapping IPs, or to stand up a VDI infrastructure.
HPE Aruba Networking ZTNA

HPE Aruba Networking ZTNA

As part of the HPE Aruba Networking SSE platform, HPE Aruba Networking ZTNA provides a modern alternative to traditional remote access VPN solutions by providing secure global connectivity for any user, any device, and any private application—with zero trust.

As mentioned, ZTNA is an integral component of the HPE Aruba Networking Security Service Edge (SSE) platform. However, the overarching platform brings the power of ZTNA, SWG, CASB and Digital Experience monitoring into a single cloud-delivered solution, with one easy-to-use pane of glass to manage it all.

Related products, solutions or services

HPE Aruba Networking ZTNA

Related topics

Zero Trust

Security Service Edge (SSE)

Secure Access Service Edge (SASE)