Gartner predicts that by 2025, at least 70% of new remote access deployments will be served predominantly by Zero Trust Network Access (ZTNA).

ZTNA offerings are becoming increasingly popular as a method for providing users least privilege to business applications, in lieu of traditional remote-access VPN. Despite the continued steady adoption of ZTNA, and the security benefits that it provides, end-user organizations still struggle with policy development to successfully deploy ZTNA.

This research note outlines a practical approach that businesses can embrace so that security and risk management leaders can avoid the pitfalls and enable a smoother and more effective ZTNA implementation.