Cyolo Listed as a Sample Vendor for ZTNA in 2022 Gartner® Hype Cycle™ for Workload and Network Security

 

TEL AVIV, ISRAEL — August 4, 2022 — Cyolo, a leading identity-based access provider, announced that it has been recognized as a Sample Vendor in the Gartner “Hype Cycle for Workload and Network Security, 2022.”1 This recognition follows Cyolo being listed as a Representative Vendor earlier this year in 2022 Gartner “Market Guide for Zero Trust Network Access.”2 

What is the Business Impact of ZTNA? 

According to Gartner, “ZTNA makes possible an identity- and context-based access boundary between any user and device to applications.” The report further states “ZTNA removes full network access to reduce an organization’s attack surface, improves user experience (UX) and remote access flexibility. It enables dynamic, granular user-to-application segmentation through simplified policy management. Cloud-based zero trust network access (ZTNA) offerings improve scalability and ease of adoption for secure remote access.” 

What is Driving ZTNA Adoption? 

ZTNA offers a solution to the explosion of connected things and remote workers, which accelerated rapidly during the COVID-19 pandemic. ZTNA serves as a new security strategy and coordinated approach across both IT and OT, as the threats from bad actors exploiting weaknesses in old authentication infrastructure continues to increase. ZTNA makes use of modern authentication and covers the entire risk spectrum when connecting users to applications. ZTNA also ensures the accessibility and usability of every resource and asset without compromising security. 

According to Gartner, interest in ZTNA is being driven by: 

  • “The need to modernize and simplify traditional VPN deployments that were optimized for static user locations connecting to data center environments rather than applications, services and data located outside the enterprise.” 
  • “The need for augmenting remote access methods with cloud-based ZTNA services to offload hardware-based solutions when hybrid work demand exceeds hardware capacity constraints.” 
  • “The rise of zero trust initiatives within organizations, which resulted in the need for more precise access and session control in on-premises and cloud applications.” 
  • “A need to connect third parties such as suppliers, vendors and contractors to applications securely without exposing the entire network over VPN, or to connect the application to the internet for access.” 
  • “Mergers and acquisitions enabled by the ability to extend application access to acquired companies’ preclosure without needing to deploy endpoints or interconnect the corporate networks.” 
  • “The emergence of the security service edge (SSE) market, including ZTNA components, as organizations increasingly seek to secure private applications, web and cloud-services using a single platform and endpoint agent.” 
 

Cyolo’s ZTNA 2.0 Solution 

Cyolo helps organizations in their journey towards identity-based access, without the need to upgrade their infrastructure. Cyolo‘s unique architecture and capabilities provides the modern authentication infrastructure to empower organizations to confidently identify all users and quickly connect them to the resources they need to do their jobs in an efficient and effective way. Put simply, thanks to Cyolo’s identity-based access solution (ZTNA 2.0), organizations no longer have to compromise between security and accessibility. 

ZTNA 2.0 was designed to help teams succeed by enabling organizations to: 

 

Connect everything, at lightning-fast speeds, no matter what. 

  • Full visibility and control over who connects to where and what occurred 
  • Ability to integrate with multiple different IdPs (on-premises and cloud) 
  • Protect all applications regardless of protocol or location (on-premises, IaaS, SaaS) 
 

Optimize operational productivity and deliver exceptional user experiences. 

  • Seamless access of all users to accommodate support and critical business processes 
  • Consolidate multiple siloed access tools into a single, overarching platform 
  • Provide better user and admin experience without agents or additional software
 

Finally, with growing pressures from bad actors, tightening cyber insurance regulations, and ever-changing industry compliance mandates, organizations working with Cyolo gain the unmatched ability to reduce the risk of breaches and minimize their attack surface. 

  • Complete, real-time user to application access and control and end-to-end encryption 
  • Hide application credentials from trusted and untrusted connected users 
  • Minimize the attack surface, moving public network access to all applications behind ZTNA 
 

Recognition by Industry Players 

We believe Cyolo’s recognition in the Gartner Hype Cycle for Workload and Network Security, 2022 is another important validation and a significant milestone in Cyolo’s mission to secure every enterprise network, from edge to core, by retrofitting existing access locks to utilize smart, identity-based keys.  

“We are proud to be recognized as a Sample Vendor for ZTNA in Gartner Hype Cycle for Workload and Network Security, 2022. We feel this acknowledgement validates the tireless work our team is doing to become the access company for the digital enterprise,” says Almog Apirion, Cyolo’s CEO and co-founder. 

“My co-founders and I started this company as a CISO and two ethical hackers, and grew in a short time to become market leaders. To us, Gartner insights confirm that the market is progressing towards ZTNA solutions to answer the most pressing needs of security and remote access, for both cloud-based and on-premises infrastructure companies.” 

 

1 Gartner, “Hype Cycle for Workload and Network Security, 2022,” John Watts, Neil MacDonald, 18 July 2022. 

2 Gartner, “Market Guide for Zero Trust Network Access”, Aaron McQuaid, Neil MacDonald, John Watts, Shilpi Handa, February 17, 2022.

GARTNER and HYPE CYCLE are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. 

Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.