||ZTNA, zero trust network access, uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. ZTNA is a set of technologies that operates on an adaptive trust model, which assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location. Authentication and authorization, both subject and device, are discrete functions performed before a session to an enterprise resource is established. ZTNA is a response to enterprise network trends that include remote users, BYOD, and cloud-based assets that are not located within an enterprise owned network boundary. ZTNA focuses on protecting all assets, services, workflows, network accounts, etc.With increasing number of work from home, the organizations need to adopt ZTNA instead of VPN.