• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Zero Trust Network Access (Transitioning to Security Service Edge)

Zero Trust Network Access Reviews and Ratings

What is Zero Trust Network Access?

Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.

Learn More About This Category
How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 5 of 5
Sort by
Logo of Cisco Secure Client

Cisco Secure Client

By Cisco Systems

4.6
(81 Ratings)

Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.

Show More Details
Logo of Citrix Secure Private Access

Citrix Secure Private Access

By Citrix

4.4
(26 Ratings)

Citrix, a business unit of Cloud Software Group, provides a secure app and desktop delivery platform that companies of all sizes can use to enable secure flexible work. With Citrix, employees can work where and how they prefer, and IT can be confident their information and devices remain safe.

Show More Details
Logo of Xage Fabric Platform

Xage Fabric Platform

By Xage Security

4.5
(16 Ratings)

Xage provides zero trust access and protection from one unified platform. Control access and prevent attacks in the cloud, in the data center, at the remote operational edge anywhere on Earth, and even in orbit with the Xage Fabric Platform. Xage is easy to manage and can be deployed in a day, giving users easy and secure access to the assets they need from anywhere, while preventing advanced adversaries and insider threats at every stage of the attack chain.

Show More Details
Logo of Netzilo

Netzilo

By Netzilo

5
(2 Ratings)

Netzilo provides zero trust cybersecurity solutions that protect enterprise data at the endpoint level through a suite of integrated technologies. At the core of their offering is the Enterprise Browser, which delivers last mile data protection and granular controls to prevent data leakage while maintaining a seamless user experience. This specialized browser creates a secure environment for accessing corporate applications and sensitive data without requiring traditional VDI infrastructure. Complementing this flagship solution, Netzilo offers disposable networks that create ephemeral, zero trust software-defined connections and isolated enterprise workspaces that prevent data leakage across devices.

Show More Details
Logo of Ivanti Neurons for Zero Trust Access

Ivanti Neurons for Zero Trust Access

By Ivanti

Ivanti manages and secures Everywhere Work environments so that organizations and employees can improve their digital employee experience (DEX). Ivanti technology focuses on empowering IT and employees. Ivanti solutions let IT and employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive. Ivanti solutions find, manage and protect each IT asset and endpoint in an organization, no matter the OS. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency.

Be the first to .

Features of Zero Trust Network Access (Transitioning to Security Service Edge)

Updated October 2024

Optional Features:

  • Movement of security controls closer to where users and applications connect, regardless of location. Some of the larger ZTNA vendors have invested in hundreds of points of presence (POPs) worldwide to satisfy both latency-sensitive requirements and requirements for regional logging and inspection.

  • Agility to support direct access to applications hosted in public and hybrid clouds.

  • Ability to move applications exposed in demilitarized zones (DMZs) off the public internet to reduce an organization’s attack surface.

  • Support for digital business transformation scenarios ill-suited to legacy full tunnel access approaches when applications are delivered as SaaS via public and hybrid clouds. As a result of digital transformation efforts, most enterprises will have more applications, services and data outside their borders than inside.

  • Improved end-user experience for native access to applications.

  • Scalability in comparison with legacy, hardware-based remote access VPN approaches.

  • Provision of contextual, risk-based and least-privilege access to applications (not networks).

Gartner Research

Market Guide for Zero Trust Network Access (Transitioning to Security Service Edge)
Gartner Peer Insights 'Voice of the Customer': Zero Trust Network Access (Transitioning to Security Service Edge)

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.