Verizon Business has introduced a’ zero-trust’ network access (ZTNA ) support for business customers to stable their devices, system, and cloud applications. It claims the assistance, called Trusted Connection, is a “first-of-its-kind” for “network-native surveillance”, and secures network access for authorised customers whether they are on/off-site, and whether their programs are on the top or in the sky. It is geared ( “ideal” ) for mid-sized businesses, it said.
In sum, Verizon Business has united security service edge ( SSE ) capabilities, including ZTNA, plus cloud secure web gateway ( SWG), cloud access security broker ( CASB ) and firewall-as-a-service ( FWaaS ) applications, with per-user/group policy definitions, encrypted network pathways, and performance insights such as automated alerts and anomaly detection. All the features is available in a single device to control access to sensitive data.
Instead of establishing a stable perimeter around an company’s network and systems, it secures the pathways and access mechanisms in between. Verizon Business said it establishes a single-provider for both network services and embedded security to connect to curated software as-a-service ( SaaS ) providers, the firm is offering it as a managed service. It works across multiple office/worksite areas, data areas, and multi/hybrid sky settings.  ,
A declaration said: “]The service ] secures connections and devices from any device to any online resource, spanning web/cloud, software as-a-service, personal programs and more. ]It ] is particularly suitable for larger mid-size businesses that need enhanced surveillance but don’t have the resources or devoted expertise to install and run it themselves, or for businesses looking to improve the management of their security”.
The firm’s own research ( Verizon Data Breach Investigations Report ) in 2024 says 77 percent of basic web application attacks and 31 percent of all breaches in the past decade involved the use of stolen credentials. Enforcing zero-trust access and multi-factor authentication, and checking devices ‘ security credentials ( “postures” ) is the way to protect against such attacks, said the company.  ,
Kyle Malady, chief executive at Verizon Business, said:” The right cybersecurity architecture is one of the most important responsibilities technology decision-makers face. End-to-end security is critical. If a perimeter is breached, bad actors can wreak havoc. Trusted Connection creates a protected environment within the outer walls of security, protecting each specific entry point and pathway that could lead a bad actor to a valuable digital asset”.