Saturday, December 1, 2018

ZTNA 2018: Emergence and the Future of Secure Access

December 2018 • 7 min read

In late 2018, Zero Trust Network Access (ZTNA) emerges as a promising alternative to traditional VPNs. As enterprise networks evolve and cloud adoption increases, legacy perimeter-based models struggle to keep up with the new threat landscape. ZTNA introduces a shift in mindset: trust no one, verify everything.

The Rise of Zero Trust

First articulated by Forrester in 2010, the Zero Trust model gains traction in 2018 as organizations face increasingly sophisticated threats and a dissolving network perimeter. Unlike traditional security frameworks that assume anything inside the network is trusted, ZTNA demands strict identity verification and granular access controls regardless of location.

From VPNs to ZTNA

VPNs dominate remote access solutions for years, but they expose the entire network once access is granted. ZTNA, on the other hand, connects users to applications—not the network—based on identity and context. This approach limits lateral movement and reduces the attack surface significantly.

Key Components of ZTNA

  • Identity-centric access: User authentication and role-based policies govern access.
  • Microsegmentation: Network access is limited to specific apps or services.
  • Device posture checks: Compliance checks ensure endpoint security before granting access.
  • Continuous monitoring: Real-time telemetry supports adaptive access policies.

Vendor Landscape in 2018

By the end of 2018, vendors like Zscaler, Google (BeyondCorp), Akamai, and Cisco begin offering ZTNA-aligned services. While the space remains immature, early adopters are piloting ZTNA in hybrid cloud environments and mobile workforces.

Benefits and Limitations

ZTNA brings clear advantages:

  • Improved security posture through least-privilege access
  • Better user experience with seamless, app-level access
  • Reduced risk of lateral movement and malware propagation

However, ZTNA also introduces complexity:

  • Integration with legacy systems remains challenging
  • Policy creation requires deep visibility into user/app behavior
  • Vendor lock-in and interoperability issues can arise

Use Cases and Early Adoption

Typical early use cases in 2018 include third-party contractor access, secure BYOD, and multi-cloud environments. Organizations looking to modernize VPNs or improve cloud access control are the first to explore ZTNA pilots.

Preparing for the ZTNA Journey

To prepare for ZTNA, organizations need to:

  • Assess current access control models
  • Inventory applications and user roles
  • Evaluate endpoint posture tools and SSO integration
  • Start with a pilot focused on a narrow user group or app

The Road Ahead

While ZTNA remains in early stages in 2018, it signals the beginning of a broader security transformation. As network perimeters dissolve and cloud-first strategies take hold, ZTNA becomes a critical enabler of secure digital business. Enterprises that start the journey early gain a strategic advantage.



Eduardo Wnorowski is a network infrastructure consultant and Director.
With over 23 years of experience in IT and consulting, he helps organizations maintain stable and secure environments through proactive auditing, optimization, and strategic guidance.
LinkedIn Profile

AI-Augmented Network Management: Architecture Shifts in 2025

August, 2025 · 9 min read As enterprises grapple with increasingly complex network topologies and operational environments, 2025 mar...