Table of Contents
- Executive Summary
- Market Categories and Deployment Types
- Decision Criteria Comparison
- GigaOm Radar
- Solution Insights
- Analyst’s Outlook
- Methodology
- About Chris Ray
- About GigaOm
- Copyright
1. Executive Summary
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary advantages is that it enables employees to work from home or any location outside the office while maintaining secure access to company resources.
This feature has become increasingly popular in recent years, especially with the rise of remote, hybrid, and other flexible work arrangements. Moreover, secure remote access ensures that employees have continuous access to critical data and applications needed for their work, even after regular working hours. This guarantees that employees can respond promptly to urgent requests or alerts and work on important projects without being constrained by geographical or time limitations.
In the past, VPNs have been the conventional means of achieving secure remote access. VPNs offered an alternative to exposing internal systems’ remote access protocols, such as SSH and RDP, to the internet, where unauthorized individuals could attempt to establish a connection. By implementing a VPN, organizations gained greater control over who could access these remote access protocols.
However, VPNs have limitations in the control they offer since they often grant authorized users excessive access to internal networks and resources. Furthermore, VPNs do not account for the context in which legitimate users access resources through the VPN.
Zero-trust network access (ZTNA) addresses the limitations of VPNs by implementing an access model based on the user’s identity as well as the context of the connection request. For example, each time a connection is requested, the system establishes a trusted relationship with the user, unlike VPNs, which establish trust once and do not review it again. This approach ensures that access to internal networks and resources is restricted only to authorized users in specific contexts—such as location, time of day, and device type—providing enhanced security and control. By taking into account these contextual factors, ZTNA can effectively mitigate many risks that are left behind by VPNs.
This is our third year evaluating the ZTNA space in the context of our Key Criteria and Radar reports. This report builds on our previous analysis and considers how the market has evolved over the last year.
This GigaOm Radar report examines 23 of the top ZTNA solutions and compares offerings against the capabilities (table stakes, key features, and emerging features) and nonfunctional requirements (business criteria) outlined in the companion Key Criteria report. Together, these reports provide an overview of the market, identify leading ZTNA offerings, and help decision-makers evaluate these solutions so they can make a more informed investment decision.
GIGAOM KEY CRITERIA AND RADAR REPORTS
The GigaOm Key Criteria report provides a detailed decision framework for IT and executive leadership assessing enterprise technologies. Each report defines relevant functional and nonfunctional aspects of solutions in a sector. The Key Criteria report informs the GigaOm Radar report, which provides a forward-looking assessment of vendor solutions in the sector.