Zero-trust network access (ZTNA), part of a zero-trust model, uses identity-based authentication to establish trust and provide access while keeping the network location — i.e., the IP address — hidden.
ZTNA adapts access to specific applications or data at a given time, location, or device, and provides IT and security teams with centralized control and improved flexibility to secure highly distributed IT environments.