This post is also available in: 日本語 (Japanese)
Welcome to the holiday season, the busiest travel time of the year. As the classic carol goes, there really is no place like home for the holidays. This means many of us are making our way through airports now to spend time with family and friends.
For those of us who haven’t traveled in a while, we’ll also be brushing up on the latest airport security requirements. Let’s face it, no one wants to be the person who has to throw away that expensive new hand lotion we bought because it exceeds the Travel Security Administration (TSA)’s 3.4 oz carry-on liquids rule.
The average traveler may wonder, what’s the difference between a 3.2 oz bottle of lotion in a quart-sized bag compared to just taking the 5.2 oz tube you already have in your backpack? Honestly, we aren’t going to be able to answer that question in this blog. But we do know airport and airline security experts have developed these protocols and procedures for a good reason: safety.
Information technology (IT) security policies and procedures can sometimes seem as arbitrary to the average employee as the TSA’s liquids rule. While your IT team says the purpose of IT security policies is to keep company data and applications secure, it can seem like these rules exist to keep you from easily accessing necessary resources to work efficiently.
This is where zero trust network access (ZTNA) 2.0 comes in. ZTNA 2.0 can help both IT security teams and employees work efficiently and securely, eliminating the frustrations that come from seemingly random rules that are meant to keep us safe but, in practice, just seem to make us late for flights (or unable to get our projects done on time).
ZTNA 2.0 is comprised of five key principles, and it works within an IT infrastructure like the various security points air travelers encounter during air travel.
Here’s what each of the five principles of ZTNA 2.0 look like if we consider each principle as a part of the airline travel experience.
Just like holiday airline travel, it can be stressful to protect and secure employees, apps, and data across your company or organization. The ZTNA 2.0 principles and architectural requirements provide IT security teams a framework and the technology so every employee can access the data and applications they need on any device they choose, wherever they work — all while still meeting strict security requirements.
Interested in learning more about ZTNA 2.0? We have multiple resources collected here that explain how ZTNA 2.0 can help you secure the future of work.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.