What is Zero Trust Network Access (ZTNA)?

The phrase Zero Trust is not new, but it’s increasingly gaining traction in network infrastructure circles.

Conceptually, Zero Trust is relatively straightforward in that, instead of building castle walls around your network and defending that perimeter against outsiders, you assume that no system or endpoint, either inside or outside your castle walls, should be trusted by default. At Enclave, we think of this as Endpoint Defined Perimeters (EDP).

As organisations embrace the opportunities of cloud infrastructure, integrate cloud with on prem; as team members are increasingly operating outside our premises and as applications become more complex and diverse, we need a different approach to assigning and managing trust and affording access to our critical network infrastructure.

Zero Trust Network Access (ZTNA) takes nothing for granted; identities must always meet trust standards, access must be provided only on a need to know basis, systems need to be micro-segmented and continuously checked, verification and trust must be established, not assumed.

So, for example, a Zero Trust approach aims to mitigate many of the risks associated with traditional VPN connectivity. That risk being that if someone maliciously manages to authenticate themselves through your remote access VPN server, then they are inside your castle walls and can often move around freely (lateral movement).

Indeed, that risk only exists because most remote access VPNs work on the basis that they’re freely accessible to anyone on the public internet. In other words they operate on a “Connect first, then Authenticate” basis.

At Enclave Networks, Zero Trust is at the heart of everything we do, from our patented technology and our authenticate first, then connect approach to network connections, through to how we allow centralised, policy based management of network infrastructure.

So instead of punching holes in network perimeters to allow access, we ensure firewalls always stay closed (and doing their job) and that systems are connected together in a micro segmented, end to end encrypted, peer to peer way.

Ready to try Enclave?

Get Started

Related Posts

  • Simpler, more secure Network Infrastructure for Managed Service Providers

    Simpler, more secure Network Infrastructure for Managed Service Providers
  • It’s time to say goodbye to your VPN

    Building VPN pathways into your organisation is a security disaster waiting to happen. Just ask Travelex.
    It’s time to say goodbye to your VPN
  • How to make your network less time consuming to manage and more secure

    How to make your network less time consuming to manage and more secure
  • How to create truly private connections on the public Internet

    How to create truly private connections on the public Internet

Request a Demo

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll show you how to use Enclave to:
  • Introduce a zero-trust network access model.
  • Avoid ACLs and VPNs to secure network access.
  • Leverage your firewalls to darken your network.
  • Protect against discovery, targeting and attack.
After completing this form, a member of our team will contact you to arrange a short product demo at a time of your choosing.

Request a Demo

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll show you how to use Enclave to:
  • Introduce a zero-trust network access model.
  • Avoid ACLs and VPNs to secure network access.
  • Leverage your firewalls to darken your network.
  • Protect against discovery, targeting and attack.
After completing this form, a member of our team will contact you to arrange a short product demo at a time of your choosing.