The zero trust model is based on the concept that any user attempting to access resources is assumed to be untrustworthy, but that trust can be established based on context (identity, device, location, etc.) to allow users to access the data and applications needed to do their jobs.
New research by Cybersecurity Insiders proves that there’s a widespread movement to replace VPNs with ZTNA. This is most likely the result of recent malware outbreaks and attacks on VPN servers.
The 2019 Zero Trust Adoption Report discovered: