skip to main content

Introduction

Enterprise technology for secure remote access is undergoing an evolution beyond virtual private networks.

Highlights

  • ZTA has different flavors, and Ovum divides vendors in this market into two broad camps, one adopting primarily a licensed software approach, the other a service.

Features and Benefits

  • Describes how and why VPNs will over time lose their supremacy in the secure remote access market.
  • Describes the new approaches to the problems raised by accessing applications in the cloud.

Key questions answered

  • What are SDP and IAP?
  • How do the two approaches differ?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises

VPNs enable remote access to on-premises assets

  • Mobile computing and the explosion of the VPN market
  • VPNs are a multibillion-dollar market

Access to cloud assets changes the paradigm

  • Applications also reside off corporate premises
  • Tromboning through the corporate data center adds latency

ZTA is secure remote access for the cloud era

  • The cloudification of applications only increases from here on
  • The SDP and IAP camps within ZTA

Criteria for analyzing ZTA offerings

  • SDP and IAP have architectural differences
  • Core capabilities and assessment criteria

ZTA remains an evolving art

  • Most SDP vendors only partially adhere to the CSA spec

Appendix

  • Further reading
  • Author