
What am I looking for in zero-trust deployment
The actual story is not in the survey data – it is in the conversation that I am doing with the Enterprise Security Architects who are trying to implement zero trust strategies. Last month, I worked with a financial services company that spent eighteen months in evaluating the ZTNA solutions. He created documents of the requirements, operated the seller demo and mapped his application inventory. But when the time came to deploy, they hit a wall.
The problem was not technology. Gartner’s magic quadrant Palo Alto shows sellers such as networks, netskope and zscaler with mature platforms. The problem was that these solutions require years of VPN configuration to implement, documentation of heritage application dependence and coordinate with the stretched application teams.
What I said to me, “We bought this ZTNA platform for intelligent, automated access control. Instead, we are spending more time on manual policy creation than our old VPN.” When I realized that we are working with a deep issue compared to technology selection.

