Market Guide for Zero Trust
Network Access (ZTNA)

Learn how ZTNA replaces traditional technologies,
like VPN, enabling secure access to private apps, without network access.

Access the Gartner market guide now

Yes, please keep me updated on Zscaler news, events, webcast and special offers.

By submitting the form, you are agreeing to our privacy policy.

“ZTNA provides controlled access to resources, reducing the surface area for attack. The isolation afforded by ZTNA improves connectivity, removing the need to directly expose applications to the internet. The internet becomes an untrusted transport and access to applications occurs through an intermediary. The intermediary can be a cloud service controlled by a third-party provider or a self- hosted service.”

Gartner logo

Market Guide on Zero Trust Network Access
Aaron McQuaid, Neil MacDonald, John Watts, Shilpi Handa, February 2022

According to Gartner by 2022, 80% of new digital business applications opened up to ecosystem partners will be accessed through zero trust network access (ZTNA), and by 2023 60% of enterprises will phase out their remote access virtual private networks (VPN) in favor of ZTNA.

This new model uses a trust broker to mediate connections between a specific private application and an authorized user. It allows teams to begin with zero trust, but then provide connectivity based on context (identity, device etc.). Unlike VPNs, ZTNA technologies deliver a means of application access without network access, and the ability to mask applications from the open internet. Enterprises must now look to bake ZTNA into their security plans. This market guide offers considerations and recommendations for how and where to get started ZTNA.

Read the guide
person working on tablet

Gartner is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.