VIDEO: Zero Trust Maturity CISA ZPA - PART 3 of 4

Please leave comments below.

Don’t forget to watch all 4 videos in this series!

VIDEO: Zero Trust Maturity CISA ZPA - PART 1 of 4

VIDEO: Zero Trust Maturity CISA ZPA - PART 2 of 4

VIDEO: Zero Trust Maturity CISA ZPA - PART 3 of 4

VIDEO: Zero Trust Maturity CISA ZPA - PART 4 of 4

6 Likes

Enforcing least privilege access or controlled access means we can refer to Zscaler ZPA as a PAM solution?

PAM is a broad area and historically has been mainly on-premises deployments. There is a significant overlap between zero trust and least-privileged access, of course! Zscaler has taken a cloud-native approach and extended the ZPA platform with Privileged Remote Access. Our initial focus for PRA has been primarily to solve the use case for Operational Technology environments where authorized technicians and 3rd parties require privileged access to OT assets, but it certainly has utility for enterprise IT use cases as well…
Hope this helps,
Lisa

1 Like