What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained
Vložit
- čas přidán 29. 06. 2024
- Zero Trust Network Access (ZTNA) is a technology that is quickly replacing VPN’s as a more secure and scalable way to provide remote connectivity. Unlike VPNs, Zero Trust provides a scalable way to provide secure connectivity without the need of centralized equipment. In this video we take a deep dive on Zero Trust Network Access (ZTNA) and walk through the models, principles and architectures it’s based on. We’ll review what exactly “Zero Trust” is, as well as the foundational concepts that are at the core of ZTNA.
The Zero Trust Network Access Hierarchy 0:22
The Zero Trust Model 0:57
Verification: Three Foundational Functions 2:06
Continuous Monitoring 3:27
What is Zero Trust Network Access (ZTNA) 3:52
On-premise vs Cloud 4:36
Cloud ZTNA Implementation and Vendors 4:46
On-premise Implementation and Vendors 5:02
ZTNA De-centralized Architecture 5:20
ZTNA Full Walk Through 6:21 - Věda a technologie
By far the best video on Zero Trust
Thank you for the kind words!
Completely agree. Always quality content from this channel.
Yeah he definitely earned a sub. I watched a few before this and this one explained it best.
Just for knowledge, the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Someone just stole the idea.
Agreed. Nicely presented!
after discovering this channel, i always look it up if you have new content. love you vids man. keep up with this
Thanks Jimson. Appreciate the kind words
I thought this was an excellent, concise video on the subject, which really helped fill in the gaps of my understanding. I'm going to sift through your library to see what else you've got. Many thanks!
Awesome explanation of Zero Trust concepts!
Best introduction video on Zero Trust I have seen.
Excellent explanation! Thank you Andy.
Thanks for this explanation. Clear and concise.
Perfectly explained. Thank You. 5 stars.
Clear explanation and best video on Zero Trust
Well explained, thank you
Straight to the point 💯
Great Video. Short & Crisp. Keep Going Andy
Thank you!
Excellent explaination
Great high-level intro to ZTNA. Thank you.
Glad you like it!
Great video. Thanks.
Great video. Right to the point thanks alot
Great content . Subscribed. Please continue
Great video my dude
Good explanation about ZTNA
Yoda was here. Yoda says: "Best video I've seen, on Zero Trust this is. Strong with the Force, this CISO is."
wow! very informative. thank you so much.
great explanation ... thanks much
Perfect video about the subject ..
thanks for this excellent video 👍🏻😀
You have the best videos. Would surely buy a course made by you.
Thank you for the support Laurenz. Much appreciated
every developer should watch this...
Fantastic explanation brother
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust
brilliant!
Thanks Andy
Thanks alot
Most welcome
Great video! Can you please let me know what tool you used to create the whiteboard animations? Thank you!
The OSSTMM came up with this first using the methodology. Go read the OSSTMM, in this case Chapter 5 called "trust"
greate video !!
by the way you have a typo error in cloudflare
thank you for the vedio
but isn't ZTNA and SDP have the same concept?
i love you
Hello, very interesting
What tool do you use to create this type of animated content?
Using apsara pencil and sharpner
Most security products and strategies are not new or advanced. This includes the ‘Zero Trust’ strategy, regardless of how frequently vendors mention it. Authentication being used behind the firewall and on the internal devices of a network has been used for decades.
Good video. But you may need to correct the spelling mistakes : Principles, not Principals; Cloudflare, not Cloudfare.
Another example of no one in “zero trust “ can even agree on how many pillars there are. 3 here. 5-7 with the gov
Honestly so many security things now days and 99.999% of business breaches are probably from email credential phishing or some guy doing something stupid like opening up an API database connection with no password 😂. Not that it all doesn’t help.
Again where is this data stored for authentication purposes? Who controls it? Under what governmental law is it controlled?
More boundaries , no thank you for this zero trust.