ZTNA

Zero Trust and VPNs: NOT Mutually Exclusive
Never trust, always verify. This is the basic premise behind a zero trust network. Zero trust can be an important piece of your layered cybersecurity, requiring strict identification to access a network. You don’t trust a connection without verifying it carefully. Many people in the tech industry have tried to paint the picture that zero trust
OpenVPN Team
7 minute read

How Identity and Access Management Fits Into Zero Trust
If you’ve heard anything about zero trust network access (ZTNA), you’ve likely heard the above phrase. Verifying identity is at the crux of zero trust, and identity and access management is how you make it happen. But isn’t it enough to use multi-factor authentication? Not exactly. In this post, we’ll dive into everything you need to know about
Krista Lyons
11 minute read

ZTNA for Small and Mid-Size Businesses: Where to Begin
What started as a nebulous new cybersecurity term defined by Forrester analyst John Kindervag in 2010 has morphed and changed through the years, but the intrigue has stayed the same with 61% of businesses claiming to have a zero trust strategy in 2024. As a result, product after product promises that if you give the right amount of money to the
Krista Lyons
6 minute read

Third Party Access Control
Are you in control of your office building? Of your resources? Of your own network? Do you have the control to determine who — or what — has access to your resources? Access control, simply put, is all about controlling who gets access to what. It is one of the most fundamental security practices, and is crucial to protecting your organization.
OpenVPN Team
6 minute read

2FA vs. MFA: What’s the Difference?
More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult
Krista Lyons
4 minute read