Zero Trust Network Access Reviews and Ratings
What is Zero Trust Network Access?
Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.
Product Listings
Filter by
Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.
Citrix, a business unit of Cloud Software Group, provides a secure app and desktop delivery platform that companies of all sizes can use to enable secure flexible work. With Citrix, employees can work where and how they prefer, and IT can be confident their information and devices remain safe.
Xage provides zero trust access and protection from one unified platform. Control access and prevent attacks in the cloud, in the data center, at the remote operational edge anywhere on Earth, and even in orbit with the Xage Fabric Platform. Xage is easy to manage and can be deployed in a day, giving users easy and secure access to the assets they need from anywhere, while preventing advanced adversaries and insider threats at every stage of the attack chain.
Netzilo provides zero trust cybersecurity solutions that protect enterprise data at the endpoint level through a suite of integrated technologies. At the core of their offering is the Enterprise Browser, which delivers last mile data protection and granular controls to prevent data leakage while maintaining a seamless user experience. This specialized browser creates a secure environment for accessing corporate applications and sensitive data without requiring traditional VDI infrastructure. Complementing this flagship solution, Netzilo offers disposable networks that create ephemeral, zero trust software-defined connections and isolated enterprise workspaces that prevent data leakage across devices.
Ivanti manages and secures Everywhere Work environments so that organizations and employees can improve their digital employee experience (DEX). Ivanti technology focuses on empowering IT and employees. Ivanti solutions let IT and employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive. Ivanti solutions find, manage and protect each IT asset and endpoint in an organization, no matter the OS. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency.
Features of Zero Trust Network Access (Transitioning to Security Service Edge)
Updated October 2024Optional Features:
Movement of security controls closer to where users and applications connect, regardless of location. Some of the larger ZTNA vendors have invested in hundreds of points of presence (POPs) worldwide to satisfy both latency-sensitive requirements and requirements for regional logging and inspection.
Agility to support direct access to applications hosted in public and hybrid clouds.
Ability to move applications exposed in demilitarized zones (DMZs) off the public internet to reduce an organization’s attack surface.
Support for digital business transformation scenarios ill-suited to legacy full tunnel access approaches when applications are delivered as SaaS via public and hybrid clouds. As a result of digital transformation efforts, most enterprises will have more applications, services and data outside their borders than inside.
Improved end-user experience for native access to applications.
Scalability in comparison with legacy, hardware-based remote access VPN approaches.
Provision of contextual, risk-based and least-privilege access to applications (not networks).




