[2024 Report] Next-Gen DPI for ZTNA: Advanced Traffic Detection for Real-Time Identity and Context Awareness

By clicking download, you agree to your information being included in the marketing database of Rohde and Schwarz.

Migration to Cloud / SaaS, widespread adoption of work-from-anywhere (WFA) and proliferation of IoT devices have led to the inversion of enterprise networks, necessitating a stricter, yet dynamic approach to managing enterprise resources. Zero trust network access (ZTNA), which is based on the idea of ‘never trust, always verify’, leverages identity and context awareness to create virtual network perimeters that ensure users are granted access only to authorized resources. ZTNA executes access control decisions by establishing continuous adaptive trust based on a wide range of real-time session metrics and corresponding user privileges, device / resource risk profiles and usage thresholds.  

This report explores how traffic visibility impacts ZTNA, and the informational gaps affecting today’s deployments, highlighting the impact of poor monitoring mechanisms, the rise in encrypted traffic and limited application awareness. Based on a survey of 55 leading ZTNA vendors, the report presents, in detail, growing data complexities across ZTNA implementations, including the need for comprehensive internal inventories and granular data points on every resource, device and user. It evaluates how deep packet inspection (DPI)-driven granular, real-time traffic analytics power ZTNA solutions while supporting zero-trust principles such as microsegmentation, least privilege access, single sign-on and single DLP policy. It also assesses DPI adoption trends among ZTNA vendors and how DPI contributes to next-gen ZTNA offerings.

Download the report to discover:

  • The evolution of ZTNA
  • The importance of identity and context awareness in zero-trust execution
  • The granularity and depth of application and threat awareness that is required for effective ZTNA implementation
  • Challenges ZTNA vendors face in acquiring critical traffic insights
  • The impact of inadequate visibility on ZTNA’s outcomes and adoption rates
  • How traffic encryption, obfuscation and anonymization continue to compromise ZTNA
  • Informational needs for ZTNA automation
  • The growing adoption of DPI for ZTNA and common DPI deployment models

Leading players in the ZTNA space:

1 month ago / Research Reports / By Ray Sharma