{"id":62244,"date":"2022-04-25T21:00:00","date_gmt":"2022-04-26T01:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=62244"},"modified":"2024-02-05T12:48:27","modified_gmt":"2024-02-05T17:48:27","slug":"what-is-zero-trust-network-access","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/what-is-zero-trust-network-access","title":{"rendered":"What Is Zero Trust Network Access (ZTNA)?"},"content":{"rendered":"\n

In this article, we\u2019ll take a closer look at Zero Trust Network Access (ZTNA): a combination of technologies that facilitates secure remote access between users, devices, and applications via defined access control policies. <\/p>\n\n\n\n

We\u2019ve all heard the phrase: innocent until proven guilty. <\/em><\/p>\n\n\n\n

But what does it mean? <\/p>\n\n\n\n

Say your neighbor accuses you of stealing his bike\u2026 because you often wear black hoodies at night (he doesn\u2019t realize you\u2019re just a programmer). He recently installed some M820 Saint <\/strong>Shimano brakes, among other upgrades, and is distraught.<\/p>\n\n\n\n

Though your neighbor may start giving you the side eye, you can breathe a sigh of relief knowing the U.S. legal system has your back. Unless he can prove guilt \u201cbeyond all reasonable doubt,\u201d the law assumes your innocence. <\/p>\n\n\n\n

Sometimes it makes sense to give our fellow humans the benefit of the doubt. Unfortunately, that\u2019s never<\/em> a good idea when it comes to cybersecurity. <\/p>\n\n\n\n

As data breaches continue to rise \u2014 by at least 17% from 2020 to 2021<\/a>\u2014 adopting a \u201dtrust no one\u201d mentality has never been more crucial. This is where Zero Trust Network Access (ZTNA) comes into play. <\/p>\n\n\n\n

\n