Thanks Steve- great video and your content is amazing- a couple analogies I like to give is- 1: airport analogy as we use a ticket to board a specific flight 2: an analogy where we visit another’s office building and after being in lobby, we are provided access to only that one meeting room- then after meeting is done, the person is escorted out to lobby- this is ZTNA- VPN would allow access to entire building after a temp badge is issued
what happens if you using ZTNA and need to connect to on premise Linux machine with SSH protocol and this PC has SSH access to other PC by SSH, how ZTNA will help you without micro-segmentation ? Thanks
Thanks Steve- great video and your content is amazing- a couple analogies I like to give is- 1: airport analogy as we use a ticket to board a specific flight 2: an analogy where we visit another’s office building and after being in lobby, we are provided access to only that one meeting room- then after meeting is done, the person is escorted out to lobby- this is ZTNA- VPN would allow access to entire building after a temp badge is issued
thank you! And thanks for the great analogies!
What is difference between SDP and SWG@@steve_murphy1
Thank you. Several supporting slides\screens with the facts detailed would be helpful as takeaways
Noted!
what happens if you using ZTNA and need to connect to on premise Linux machine with SSH protocol and this PC has SSH access to other PC by SSH, how ZTNA will help you without micro-segmentation ?
Thanks
Network Segmentation is a feature of zero trust. It's literally just one aspect of zero trust.
Thanks Steve, great video - much appreciated.
My pleasure!
It was better with a support :(
Reverse proxy solutions