Site icon Check Point Blog

Seven Key Considerations for a ZTNA Solution

Explore seven key considerations to keep in mind when evaluating a Zero Trust Network Access (ZTNA) solution for your environment

Over the last couple of years, organizations have experienced a massive shift to remote and hybrid work environments, which has dramatically increased their attack surfaces and risk. Many companies accelerated cloud initiatives to provide access to data and resources. BYOD policies allowed employees to access company assets from home and personal devices. Supply-chain partners, including consultants and other third party users, also now needed remote access to information.


Learn Zero Trust essentials to protect your most valuable assets.
Download the ZTNA Buyer’s Guide.


Until recently, most companies have relied on Virtual Private Networks (VPNs) and premises-based security methods for secure remote access. Since 2020, the limitations of these methods have become painfully clear:

Securing Access with Zero Trust

For these reasons, Zero Trust Network Access (ZTNA) is becoming a critical element of standardized security architecture. A ZTNA model “never trusts and always verifies.” When implemented, ZTNA:

Gartner® defines ZTNA as “products and services that create an identity- and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities. The broker verifies the identity, context and policy adherence of the specified participants before allowing access, and minimizes lateral movement elsewhere in the network[1].”

More than simply a VPN replacement, ZTNA ensures all users and devices—whether inside or outside the organization’s network—are authenticated, authorized, and continuously validated for security configuration and posture before being granted or maintaining access to applications and data.

Key Considerations for choosing the Best ZTNA Solution

When evaluating ZTNA solutions for your environment, here are seven key consideration  to keep in mind.

Ensure Support for All Users

The solution must secure access for everyone—employees with managed devices, BYOD devices, mobile devices, third-party partners, engineering teams, and DevOps users. Look for client-based access to secure employees using managed devices and a clientless architecture for secure access to web applications, databases, remote desktops, and secure shell (SSH) servers. Be sure to also consider basic PAM requirements for teams who need access to multi-cloud environments and single sign-on (SSO) into private resources, such as servers, terminals, and databases.

Ensure Support for All Target Resources

Ensure the ZTNA solution supports all high-priority private applications and resources, not just Web apps. This includes access to SSH terminals, SQL databases, remote desktops (RDP) and servers. DevOps and engineering teams need ZT access to Infrastructure-as-a-Service (IaaS) offerings, cloud production environments, microservices, and virtual private clouds.

Ensure Simple Deployment and Rapid Time to Value

Look for out-of-the-box identity provider (IdP) integration through a standard like SAML 2.0, as well as intuitive, granular policy configuration. See how to deploy clientless ZTNA in 15 minutes for fast time to value.

Ensure Easy Operation

Look for a ZTNA solution offering maximum value with minimum maintenance and no need to hire additional staff. Cloud-based solutions with a unified console are easy to use and provide visibility across all ZTNA use cases.

Ensure High Performance and Service Availability

A ZTNA service must deliver close to 99.999% uptime and high performance backed by Service Level Agreements (SLAs). Review a vendor’s SLAs and look for a global network of points of presence (PoPs) with redundancy in each zone.

Ensure Zero Trust Security Soundness

Look for ZTNA solutions that separate the control and data planes to enable true least-privilege access to applications and other resources. They should offer granular in-app controls, such as read, write, administer permissions, and enabling policies at the command and query levels. The ability to report on groups, users, and application usage with access to video session recordings provides deep visibility. Also check for additional integrated security features such a sandboxing, cloud IPS, and DLP.

Part of a Future-Ready Security Service Edge  

Consider how the ZTNA solution can be extended to secure other use cases—branch access (FWaaS), Internet access (SWG), and SaaS access—through a Security Service Edge (SSE). Securing remote ZTNA is a critical step toward a broader zero trust security architecture.

Why Check Point Harmony Connect Remote Access

Check Point Harmony Connect Remote Access secures access to any internal corporate application residing in the data center, IaaS, public or private clouds. Easy to use, it can be deployed in less than 15 minutes.

Harmony Connect Remote Access can be implemented in two ways:

To learn more:


Learn Zero Trust essentials to protect your most valuable assets.
Download the ZTNA Buyer’s Guide.


[1] Gartner, Market Guide for Zero Trust Network Access, February 17, 2022, by Aaron McQuaid, Neil MacDonald, John Watts, Shilpi Handa
Gartner is a registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Exit mobile version