{"id":20010,"date":"2022-06-20T08:46:52","date_gmt":"2022-06-20T08:46:52","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=20010"},"modified":"2026-04-17T18:07:44","modified_gmt":"2026-04-17T18:07:44","slug":"zero-trust-network-access-ztna-never-trust-always-verify","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/zero-trust-network-access-ztna-never-trust-always-verify\/","title":{"rendered":"Zero Trust Network Access (ZTNA): Never Trust, Always Verify"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>After the prior two posts (<a href=\"https:\/\/nsfocusglobal.com\/pt-br\/sase-popular-science-series-understanding-sd-wan\/\">SASE Popular Science Series &acirc;&euro;&ldquo; Understanding SD-WAN<\/a> and <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/sase-the-relationship-between-sd-wan-and-sase\/\">SASE: The Relationship Between SD-WAN and SASE<\/a>), you may already have a basic understanding of SD-WAN, which is used for network connections among users, assets and NSFOCUS Cloud in SASE. What security capabilities does NSFOCUS offer then? In the next few sessions, we will introduce one by one. Today&#8217;s topic is ZTNA, the core access control capability of SASE.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is ZTNA?<\/strong><\/h2>\n\n\n\n<p>Since the early 1990s, enterprises have been using endpoint-based access control, relying on approved IP addresses, ports and protocols to verify applications, data and users and then trust them to allow the communication in the internal network. The traditional VPN gives trust based on IP address.<\/p>\n\n\n\n<p>However, with the diversification of office scenarios, more and more users begin to use unmanaged devices to connect to enterprise applications through the Internet, which leads to unexpected security vulnerabilities when companies trust individuals or devices too much. In the BYOD scenario, ZTNA came into being.<\/p>\n\n\n\n<p>ZTNA, zero trust network access, specifies that, any user (even if allowed to enter the network) should not be trusted by default. Every device and user needs to be verified in the whole network access process, not just at the boundary, and minimum access permissions are allowed based on device authentication during the access process.<\/p>\n\n\n\n<p>In short, before the emergence of zero trust, as long as you access your intranet via your company&acirc;&euro;&trade;s VPN, the network will identify you as safe and allow access to all intranet resources. However, with ZTNA, the intranet will no longer provide IP address-based trust, but verifies your identity and your device, and provides corresponding access permissions according to your identity.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"336\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-20011\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-300x98.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-768x252.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-600x197.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-200x66.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a.jpg 1506w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Figure 1: Traditional security architecture VS. Zero-trust security architecture<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>ZTNA&acirc;&euro;&trade;S Working principle<\/strong><\/h2>\n\n\n\n<p>Since ZTNA has changed the traditional security mode, it must have its unique operation approach. Let&#8217;s see how zero trust does.<\/p>\n\n\n\n<p>Zero trust security is the minimal permission security. When accessing resources like applications and data, users must first ensure its own security and is granted the minimum permission to establish an access session after authentication, followed with continuous verification. Once any abnormal behavior is discovered, the control policy will be dynamically adjusted, including reducing the access level, doing secondary authentication, even cutting off access sessions.<\/p>\n\n\n\n<p>In the whole access process, SDP, IAM and MSG are the three key technologies:<\/p>\n\n\n\n<p>SDP client performs multi-factor authentication, and then enters the user login stage. After authentication, the client can establish a connection with the server.<\/p>\n\n\n\n<p>IAM has the capabilities of single sign-on, authentication management, central policy-based licensing, auditing, and dynamic authorization and so on. IAM decides who can access, how to access, and what can be operated.<\/p>\n\n\n\n<p>MSG micro-segmentation is a fine-grained network segmentation technology, which can deal with the traffic segmentation of the traditional environment, virtualization environment, hybrid cloud environment and container environment, and prevent the horizontal translation of attackers after they enter the enterprise data center network.<\/p>\n\n\n\n<p>These technologies work together to create a truly zero-trust access control.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b.jpg\"><img decoding=\"async\" width=\"1024\" height=\"350\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b-1024x350.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-20013\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b-1024x350.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b-300x103.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b-768x263.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b-1536x525.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b-600x205.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b-200x68.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620b.jpg 1904w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Figure 2: Three Key Techniques of ZTNA<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Advantages of ZTNA<\/strong><strong><\/strong><\/h2>\n\n\n\n<p>The protection mechanism of zero trust appears to be a little complex. What benefits does it bring?<\/p>\n\n\n\n<p>First, only legitimate users can establish a connection with authorized applications. Enterprise applications are invisible on the public network. Through asset &acirc;&euro;&oelig;stealth&acirc;&euro;, the security of enterprise digital property is fundamentally protected from the source of the attack chain.<\/p>\n\n\n\n<p>Second, giving permissions to internal employees based on their identity in the organizational structure and allowing them to access their needed applications and resources only can reduce the risk of unauthorized access.<\/p>\n\n\n\n<p>Finally, user&acirc;&euro;&trade;s behavior will be continuously monitored, and anomalies will be discovered and blocked timely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>ZTNA of NSFOCUS SASE<\/strong><\/h2>\n\n\n\n<p>In NSFOCUS SASE product management interface, enterprises can launch new applications and publish applications using SDP mode, hiding applications&acirc;&euro;&trade; real IP addresses and having the enterprise applications invisible and unreachable in the public network.<\/p>\n\n\n\n<p>Enterprise&acirc;&euro;&trade;s internal access authorization is determined by the organizational structure. Employees of different departments and levels correspond to different authorization ranges, realizing the identity-based fine-grained access strategy and ensuring the minimum authorization on demand. Users&acirc;&euro;&trade; access context is continuously monitored, and abnormal behavior detection and terminal exception detection are built in. In this way, anomalies are handled and blocked timely. If necessary, it can require a user to do a second authentication or can lower a user&#8217;s permissions.<\/p>\n\n\n\n<p>After reading our SASE product introduction, I believe you have a deeper understanding of the access strategy of zero trust. For more security capabilities of SASE products, please look forward to the follow-up.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>After the prior two posts (SASE Popular Science Series &acirc;&euro;&ldquo; Understanding SD-WAN and SASE: The Relationship Between SD-WAN and SASE), you may already have a basic understanding of SD-WAN, which is used for network connections among users, assets and NSFOCUS Cloud in SASE. What security capabilities does NSFOCUS offer then? In the next few sessions, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":35770,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,14],"tags":[631,771],"class_list":["post-20010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-research","tag-sase","tag-zero-trust-network-access"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust Network Access (ZTNA): Never Trust, Always Verify - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Network Access (ZTNA): Never Trust, Always Verify - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"After the prior two posts (SASE Popular Science Series &acirc;&euro;&ldquo; Understanding SD-WAN and SASE: The Relationship Between SD-WAN and SASE), you\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-20T08:46:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336-1.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Zero Trust Network Access (ZTNA): Never Trust, Always Verify - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"After the prior two posts (SASE Popular Science Series &acirc;&euro;&ldquo; Understanding SD-WAN and SASE: The Relationship Between SD-WAN and SASE), you\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Zero Trust Network Access (ZTNA): Never Trust, Always Verify\",\"datePublished\":\"2022-06-20T08:46:52+00:00\",\"dateModified\":\"2026-04-17T18:07:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/\"},\"wordCount\":803,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/0620a-1024x336-1.jpg\",\"keywords\":[\"SASE\",\"Zero Trust Network Access\"],\"articleSection\":[\"Blog\",\"Research\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/\",\"name\":\"Zero Trust Network Access (ZTNA): Never Trust, Always Verify - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/0620a-1024x336-1.jpg\",\"datePublished\":\"2022-06-20T08:46:52+00:00\",\"dateModified\":\"2026-04-17T18:07:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/0620a-1024x336-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/0620a-1024x336-1.jpg\",\"width\":1024,\"height\":336,\"caption\":\"Comparison of traditional and zero-trust security architectures.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-network-access-ztna-never-trust-always-verify\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust Network Access (ZTNA): Never Trust, Always Verify\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust Network Access (ZTNA): Never Trust, Always Verify - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Zero Trust Network Access (ZTNA): Never Trust, Always Verify - NSFOCUS","og_description":"After the prior two posts (SASE Popular Science Series &acirc;&euro;&ldquo; Understanding SD-WAN and SASE: The Relationship Between SD-WAN and SASE), you","og_url":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/","og_site_name":"NSFOCUS","article_published_time":"2022-06-20T08:46:52+00:00","article_modified_time":"2026-04-17T18:07:44+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336-1.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Zero Trust Network Access (ZTNA): Never Trust, Always Verify - NSFOCUS","twitter_description":"After the prior two posts (SASE Popular Science Series &acirc;&euro;&ldquo; Understanding SD-WAN and SASE: The Relationship Between SD-WAN and SASE), you","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336-1.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Zero Trust Network Access (ZTNA): Never Trust, Always Verify","datePublished":"2022-06-20T08:46:52+00:00","dateModified":"2026-04-17T18:07:44+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/"},"wordCount":803,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336-1.jpg","keywords":["SASE","Zero Trust Network Access"],"articleSection":["Blog","Research"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/","url":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/","name":"Zero Trust Network Access (ZTNA): Never Trust, Always Verify - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336-1.jpg","datePublished":"2022-06-20T08:46:52+00:00","dateModified":"2026-04-17T18:07:44+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/06\/0620a-1024x336-1.jpg","width":1024,"height":336,"caption":"Comparison of traditional and zero-trust security architectures."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/zero-trust-network-access-ztna-never-trust-always-verify\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Zero Trust Network Access (ZTNA): Never Trust, Always Verify"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/20010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=20010"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/20010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35770"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=20010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=20010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=20010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}