Gartner® report: Market guide for zero trust network access
Zero trust is growing, with organizations looking to zero trust network access (ZTNA) to reduce risk and securely support their extended workforces.


As per a Gartner forecast assumption, we estimate that, by 2025, at least 70% of new remote access deployments will be served predominantly by ZTNA as opposed to VPN services, up from less than 10% at the end of 2021.
ZTNA brokers connections between authorized users and specific private applications, granting zero trust access based on context such as identity, device, and content. Unlike VPNs, ZTNA solutions like Zscaler Private Access™ deliver application access without network access and make applications invisible to the open internet.
This Market Guide for ZTNA includes key findings and recommendations to help IT and security leaders kick-start ZTNA as part of a security service edge (SSE) strategy. Take a look to get the Gartner overview of:
- The ZTNA market and how it’s evolving
- Key findings and recommendations
- Benefits, risks, and use cases of ZTNA
Download the whitepaper to learn more about how ZTNA solutions can protect your organization.
Provided by Zscaler
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Cyber attacks against UK firms dropped by 10% last year, but experts say don't get complacent
News More than four-in-ten UK businesses were hit by a cyber attack last year, marking a decrease on the year prior – but security experts have warned enterprises to still remain vigilant.
By Emma Woollacott
-
Zero trust gains momentum amid growing network visibility challenges
News Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
By Emma Woollacott
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott
-
Unlock profitability with Cove Data Protection
Whitepaper Agile risk management starts with a common language
By ITPro
-
Ransomware missteps that can cost you
Whitepaper Agile risk management starts with a common language
By ITPro
-
The big book of selling data protection
Whitepaper Agile risk management starts with a common language
By ITPro
-
London council claims it faces 20,000 cyber attacks per day
News Hammersmith and Fulham Council reportedly faces up to 20,000 attempted cyber attacks each day.
By Emma Woollacott
-
Detection is not enough: Exposed assets require rapid mitigation to reduce and eliminate risk
Whitepaper Agile risk management starts with a common language
By ITPro