Security News > 2022 > March > Apps, devices and workloads provide an ecosystem cornerstone for zero trust growth
With the ability for true zero-trust access to securely connect users to data no matter which network connection the user chooses, enterprises have newfound freedom and flexibility when designing their information technology and security infrastructure and ecosystem.
Imagine a world in which the software, hardware, and cloud technology ecosystem starts to absorb and bundle zero-trust access components directly into specific applications, devices, and workloads that enterprises purchase to support modern digital transformation.
Enterprises procure SaaS apps, hosted apps, or on-premises apps, and then purchase identity, authentication, and zero-trust connectivity products separately to give users anywhere secure access to those apps through a zero-trust connection across a multitenant, cloud-based exchange.
Leveraging zero trust for secure access to SAP ERP ensures employees and third parties can securely and reliably access SAP systems without exposing the entire network.
As can be seen, the growing value of zero-trust connectivity does not stop with the cloud-based architectural approach and the highly valuable security features and functionality of a real zero-trust product.
Bundling and distributing zero-trust components via applications, devices, and workloads makes the customer's environment more secure while making their overall purchasing and deployment process more straightforward.
News URL
https://www.helpnetsecurity.com/2022/03/01/zero-trust-access/