
The core technology of ZTA is called micro-segmentation, which is like a DMZ reduced to each application on each device. ZTA was created to perform protection for applications instead of for infrastructure and enable the risk of outsider devices to be reduced. One more device-related problem is the issue of identifying IoT devices, which don’t have a user, and so are termed “ headless”.Ī network firewall is no use in today’s business model. So, users can be anywhere on devices that are not strictly controlled by the network administrator. Thus, software packages in the cloud interact with cloud storage systems.Ĭomplicating matters further, users now connect to the corporate network from home or within the office with their own devices. Data storage is also increasingly based in the cloud instead of on the premises. With so many software packages moving to cloud platforms, much of a business’s office connections now reach out to SaaS systems instead of to software running on in-house servers. It guards access to connections and data by blocking incoming connection requests and scanning packet contents for malicious instructions or data. The firewall protects a network or an endpoint.

Zero Trust Access (ZTA) is a new field of system security that is a progression from firewalls.

Now the network security industry is moving into Zero Trust Access and Fortinet and Palo Alto Networks are both vying for leadership in this new area of security. Fortinet and Palo Alto Networks are both innovators of firewalls and leaders in the market for them.
