Zero Trust Network Access is critical for today’s mobile worker

Representation of a security padlock
(Image credit: Shutterstock)

Today, more organizations are offering the option to work from home, in the office or a mix of both, and company leaders are being forced to contend with the issues that come with this work landscape, looking for options to increase protection and achieve airtight cybersecurity.

About the author

Aaron Kiemele is Chief Information Security Officer at Jamf.

When many employees were forced to work from home during the COVID-19 pandemic lockdown, organizations quickly found their security measures were lacking in a new work-from-anywhere environment. Now, it’s out with the old solutions like VPNs, and in with the new. Enter Zero Trust Network Access (ZTNA).

ZTNA operates on a model that does not grant immediate or ongoing trust to any user, instead granting application access on a strictly need-to-know basis. ZTNA technology zeroes in on each individual user and device, rather than allowing full access to any given network. It’s a tighter way to keep a company (and users) safe, working on an individual basis to determine whether an access request is trustworthy at a particular moment in time. ZTNA determines if a user or device is suspicious by looking at a number of factors, giving you visibility into whether device security is put at risk due to an unintentional slip up, one that could allow outsiders into a company’s network and data.

Essentially, the ZTNA model has moved forward from trusting the entity to only trusting the transaction. There are a variety of reasons for companies to consider switching to ZTNA—here are a few.

Ideal for work-from-anywhere

Flexibility has proven an important tool in achieving work-life balance, and many employees have shown they’re just as productive at home as they are in the office. While some companies are returning to full in-house operations, many will continue to offer remote work options for employees.

However, working from anywhere exposes companies to expanded risk, particularly as employees operate from multiple devices across multiple networks. VPNs and other traditional security simply can’t keep up with emerging risks because of its cumbersome configuration and limited flexibility. ZTNA, on the other hand, allows configurable and precise access to applications across networks, with quick and seamless checks along the way. This prevents any nefarious actors or malware from accessing an entire network at once—it’s far easier to detect attempted untrustworthy activity when users, devices, and services are making security decisions at each step along the way.

Enhanced security gives companies and employees the freedom to safely work from home, on other private networks or in a public setting without having to worry or be burdened by cumbersome processes.

Enhanced ability to work from any device

Just as ZTNA reduces a user’s and organization’s risk by limiting the scope of any authentication to a limited application or service, it also gives employees the freedom to work from any device without compromising productivity OR security. From smartphones to tablets, personal laptops to company computers, the average employee accesses sensitive company data across a multitude of devices. It’s an important development in the work-from-anywhere model, and one employees rely on to complete tasks and communicate outside of an office setting.

The core philosophy of ZTNA is that trust is not given, it is earned through deep visibility into device posture and authorization. After all, devices can be stolen, multiple people may operate on one device, and mistakes happen. By requiring devices to pass security checks each time a device requests access to an application, company leaders can rest easy, even while knowing their employees operate across multiple devices.

Protects companies from sophisticated attacks

Cyber-attacks are becoming more frequent and sophisticated as criminals take advantage of existing and emerging vulnerabilities around the world. There is no longer a hard shell - soft center, no single point of ingress that could allow an evildoer access to enter an entire network. It lets you segment resources at a very granular level. It removes firewalls as potential keys to the kingdom.

Additionally, in a zero trust world, lateral movement and privilege escalation are much less likely. With constant iterative reevaluation of trust, an attacker can’t take the one thing they acquired and leverage it to access your neighbor’s machine - they are also going to be expected to have a good systems posture, authorization and repeated authentication to services/data. Hackers are extremely familiar with VPNs, how they work and how to exploit the weaknesses inherent to those systems. Often this weakness is single check or basic authentication that once complete grants trust to all future activity.

VPNs are also expensive and only solve network access security issues—if someone can hack or exploit their way into the VPN, they may gain access to an entire host of applications and sensitive data. VPNs are also expensive and neglect to account for authentication of users or devices.

ZTNA, on the other hand, adds several layers of protection against increasingly sophisticated criminal efforts. Many companies have taken notice—a Gartner report found that by 2022, 80 percent of new digital business applications will be accessed through ZTNA. Further, the same study found that by 2023, 60 percent of enterprises will phase out most of their VPNs, trading them in for ZTNA.

To protect against data breaches, it’s essential to consistently be improving your security posture to keep up with the criminals who are constantly improving their capabilities. You can’t use yesterday’s technology to solve for tomorrow’s problems. The ZTNA model provides that protection in a far more secure way than VPNs, as it is not a single gatekeeper for all your data, but a real process for ensuring continuous monitoring, evaluation and RE-evaluation of the trust you are leveraging to access a resource. It’s the kind of protection users want, presented in a streamlined fashion that can give both users and organizations peace of mind.

Networks have to be secure, but that security shouldn’t prevent innovation and forward movement in business. The purpose of ZTNA technology isn’t to stop users from accessing company data—it’s to empower organizations to move at the speed of business to improve operations, without constantly worrying about the next security breach.

Aaron Kiemele is Chief Information Security Officer at Jamf. With 20 years of experience, his background spans multiple industries, focusing on operational security and compliance.

Read more
Security padlock in circuit board, digital encryption concept
Best Zero Trust Network Access Solution of 2025
Security padlock in circuit board, digital encryption concept
Why software-defined perimeters (SDPs) are taking over where VPNs left off
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Security
Protect your network with an AI-secure browser and SASE framework
VPN encryption explained in infographic
Secure Web Gateway vs VPN vs Proxy vs CASB: What's the difference?
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in Features
Disappointed by The Electric State? Here's 4 reasons you should watch Tales From the Loop on Prime Video
A computer file surrounded by red laser beams
Cover your tracks: the risk of sending unencrypted files
Close up of PS5 DualSense controller leaning on a PS5
5 reasons your PS5 needs a VPN
Anora sitting on Ivan's lap in a casino in her self-titled film, one of the best new Hulu movies in March 2025
5 new Prime Video movies with over 90% on Rotten Tomatoes I think you should stream in March
Warhammer 40,000: Space Marine 2
With discounts of up to 95%, these are the biggest deals I've managed to find in the Steam Spring Sale
The cast of The Parenting
The Parenting is Max's #1 most-watched movie but it has frightening reviews – here are 3 better horror films with over 90% on Rotten Tomatoes