{"id":15742,"date":"2023-01-19T09:51:15","date_gmt":"2023-01-19T09:51:15","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=15742"},"modified":"2025-03-05T13:10:31","modified_gmt":"2025-03-05T13:10:31","slug":"zero-trust-remote-access","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/","title":{"rendered":"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15742\" class=\"elementor elementor-15742\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dcab5c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dcab5c0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-01cdd30\" data-id=\"01cdd30\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1bc0463 elementor-widget elementor-widget-text-editor\" data-id=\"1bc0463\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">With <a href=\"https:\/\/www.recordedfuture.com\/threat-intelligence-101\/cyber-threats\/ransomware-attack-vectors\" target=\"_blank\" rel=\"noopener noreferrer\">RDP access remaining a top initial access vector for ransomware attacks<\/a> today, it\u2019s necessary for organizations to definitely shift away from RDP and reconsider whether the current externally-facing remote access solution they have in place (instead of RDP) is secure enough.<\/p><p>Remote access solutions (beyond that of the built-in RDP) exist today, providing organizations with a secure means of remotely accessing systems from a guest device that can exist either within the corporate network or externally across the internet.<\/p><p>At the same time, organizations are looking to begin their years-long journey toward a state of zero trust.\u00a0<a href=\"https:\/\/cloud.google.com\/beyondcorp\" target=\"_blank\" rel=\"noopener noreferrer\">Google has been working on this initiative since 2011<\/a>\u00a0under the name\u00a0<em>BeyondCorp<\/em>.\u00a0<\/p><p>For most organizations, the initial step in their zero trust journey is often to implement a single element by providing remote access through Zero Trust Network Access (ZTNA).<\/p><p>But which type of solution is right for your organization? To answer this, let\u2019s start by defining zero trust remote access and ZTNA solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da9a977 elementor-widget elementor-widget-heading\" data-id=\"da9a977\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Zero Trust Network Access?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de0b66a elementor-widget elementor-widget-text-editor\" data-id=\"de0b66a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">Zero Trust Network Access (ZTNA) is a modern security solution that provides <a href=\"https:\/\/www.realvnc.com\/en\/blog\/what-is-secure-remote-access-the-ultimate-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\">secure remote access<\/a> to an organization\u2019s applications, data, and services.<\/p><p>Unlike traditional Virtual Private Networks (VPNs), which often grant access to an entire network, ZTNA operates on the principle of least privilege. This means users are granted access only to specific services or applications necessary for their tasks, significantly reducing the risk of unauthorized access.<\/p><p>By focusing on secure remote access, ZTNA solutions ensure that only authenticated and authorized users can access critical resources, which enhances the organization&#8217;s overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3786f16 elementor-widget elementor-widget-heading\" data-id=\"3786f16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Does Zero Trust Network Access Work?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66569b3 elementor-widget elementor-widget-text-editor\" data-id=\"66569b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">Zero Trust Network Access rigorously verifies the identity and context of users and devices before granting them access to applications and resources.<\/p><p><strong>Step 1:<\/strong> A robust network access control model applies policies based on a user&#8217;s identity, device type, location, and other contextual factors.<\/p><p><strong>Step 2: <\/strong>ZTNA employs <a href=\"https:\/\/www.realvnc.com\/en\/blog\/all-you-need-to-know-about-remote-desktop-encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\">encryption<\/a> and other advanced security controls to protect data both in transit and at rest.<\/p><p><strong>Step 3: <\/strong>Once a user is authenticated, ZTNA grants access to specific applications and resources through a secure, encrypted tunnel.<\/p><p>This method ensures secure access and shields corporate applications and services from exposure to the public internet, thereby reducing potential attack vectors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b4f3e3 elementor-widget elementor-widget-heading\" data-id=\"4b4f3e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits of Zero Trust Network Access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d19c84c elementor-widget elementor-widget-text-editor\" data-id=\"d19c84c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">Zero Trust Network Access offers numerous benefits, including:<\/p><p><strong>Enhanced Security: <\/strong>ZTNA integrates advanced security services, making it a modern solution for securely connecting remote and hybrid workforces.<\/p><p><strong>Limited Access: <\/strong>By granting access only to specific services or applications, ZTNA minimizes the attack surface and reduces the risk of unauthorized access.<\/p><p><strong>Real-Time Monitoring: <\/strong>ZTNA provides real-time user and device activity <a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-monitoring-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">monitoring and analytics<\/a>, enabling organizations to detect and respond to security threats promptly.<\/p><p><strong>Zero Trust Architecture: <\/strong>Implementing a zero trust architecture means assuming that all users and devices are untrusted by default, which leads to more secure and controlled access to applications and resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1149b0d elementor-widget elementor-widget-heading\" data-id=\"1149b0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure Remote Access Solutions: ZTNA vs VPNs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9766ed5 elementor-widget elementor-widget-text-editor\" data-id=\"9766ed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">ZTNA solutions offer several benefits over traditional <a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-access-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\">virtual private networks<\/a> (VPNs):<\/p><p><strong>Faster Connections:<\/strong> Unlike VPNs, which often grant access to an entire network, ZTNA operates on the principle of least privilege, ensuring that users are granted access only to the specific services or applications necessary for their tasks.<\/p><p><strong>Greater Control:<\/strong> This granular approach to remote access allows organizations to implement location- or device-specific access control policies, preventing unpatched or vulnerable devices from connecting to corporate services.<\/p><p><strong>Improved Security: <\/strong>By focusing on <a href=\"https:\/\/www.realvnc.com\/en\/connect\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">secure remote access<\/a>, ZTNA solutions enhance the organization&#8217;s overall security posture, making them a superior choice for modern enterprises.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b13fc1f elementor-widget elementor-widget-heading\" data-id=\"b13fc1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Select a Solution Using This Decision Framework<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44f6936 elementor-widget elementor-widget-text-editor\" data-id=\"44f6936\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">Navigating the choice between ZTNA and traditional remote access solutions can be challenging. But by following a systematic three-step framework, you can evaluate your organization\u2019s needs and select the optimal solution.<\/p><h3>1. Define Your Options<\/h3><p>While both solutions allow users to connect remotely to a corporate system, they are very different.<\/p><ul><li><p><strong>Remote Access solutions<\/strong>\u00a0are commonly considered solutions that allow a remote user to interact with an internal server or workstation\u2019s desktop within the organization.\u00a0<\/p><\/li><li><p><strong>ZTNA solutions<\/strong>, according to Gartner, create \u201c<em>an identity- and context-based, logical access boundary around an application or set of applications<\/em>\u201d (in this case, a <a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-desktop\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote desktop<\/a>). They go on to define a part of ZT<em>NA, the broker, w<\/em>hose job it is to \u201c<em>verify the identity, context, and policy adherence of the specified participants before allowing access and prohibit lateral movement elsewhere in the network<\/em>.<em>\u201d<\/em><\/p><p>In addition to providing remote connectivity to an internal desktop or other application, ZTNA has some additional security layers of its own.<\/p><\/li><\/ul><p>So, how do you determine which is right for your organization?<\/p><h3>2. Weigh Your Options<\/h3><p>Here are a few business requirements presented in the form of questions that can be used to help find the right answer.<\/p><h4><em>Are you wanting to connect securely to both internal and cloud resources?<\/em><\/h4><p>In general, ZTNA provides secure access to both, whereas remote access solutions are designed to connect a user to an endpoint\u2019s desktop. Secure access service edge (SASE) solutions integrate networking and security services to modernize infrastructure, consolidating various security measures to enhance both security and agility in hybrid work environments. Now, it <em>is<\/em> possible that the desktops we\u2019re talking about exist <em>in the cloud<\/em>, so it\u2019s necessary to determine exactly what kinds of resources you want to remotely connect to securely and then compare solutions.<\/p><h4><em>How much security do you actually need?<\/em><\/h4><p>ZTNA, by far, will offer more security than any remote access solution on its own. Usually, there&#8217;s policy-based access, centralized (usually read as\u00a0<em>cloud<\/em>) authentication, and a deeper scrutiny of the user\/client combination, as well as other criteria like the presence of antivirus, an up-to-date operating system, and even disk encryption when requesting remote user access.<\/p><h4><em>How much productivity do you actually need?<\/em><\/h4><p>Remote access solutions tend to improve the user experience of\u00a0<a href=\"https:\/\/www.realvnc.com\/en\/blog\/connect-remote-desktop\/\" target=\"_blank\" rel=\"noopener noreferrer\">connecting to and interacting with a remote desktop,<\/a>\u00a0whereas ZTNA is far more focused on security features. So, if you have specific remote access needs\u2014for example, improved graphics speed within a session to allow engineers to work on high-end computer-aided design applications\u2014ZTNA may not perform as well as a remote access solution.<\/p><h4><em>Do you have the security infrastructure required for ZTNA?<\/em><\/h4><p>To make ZTNA effective, some additional aspects of your network environment, such as a cloud-based identity management service, are usually required. However, for some organizations, this may not be feasible, making a remote access solution that can work with Active Directory (as well as cloud identity providers) a better choice for the immediate timeframe. At the same time, to achieve an appropriate level of security, even remote access solutions should support multifactor authentication, which would be an additional service.<\/p><h4><em>Is Zero Trust even on the organization&#8217;s radar?<\/em><\/h4><p>It&#8217;s worth asking the question. While every organization concerned about its cybersecurity must start down the path to zero trust, your organization&#8217;s leadership may not be ready to take on this challenge. Implementing only a single solution will be the catalyst for much more change, which may require more resources and budget than can be allocated.<\/p><h3>3. Choose the Right Solution<\/h3><p>The answer isn&#8217;t entirely clear-cut. Organizations that choose ZTNA want to improve their security by leveraging zero trust principles in conjunction with their remote access strategy.<\/p><p>Those who seek\u00a0<a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote access<\/a>\u00a0have a slightly different perspective\u2014they are looking for remote access first and a solution that also provides improved security.<\/p><p>While the lines between the various remote access solutions (including ZTNA) are blurring, the right solution will be the one that aligns with your organization&#8217;s position on balancing the importance of remote access and cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-853ca0d elementor-widget elementor-widget-heading\" data-id=\"853ca0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Elevate Your Network Security with RealVNC Connect<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40d4ec5 elementor-widget elementor-widget-text-editor\" data-id=\"40d4ec5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">As organizations balance the need for robust cybersecurity with seamless remote access, selecting the right solution is more critical than ever. Whether you choose ZTNA&#8217;s enhanced security or traditional remote access&#8217;s <a href=\"https:\/\/www.realvnc.com\/en\/blog\/remote-monitoring-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">streamlined efficiency<\/a>, your choice will shape your organization\u2019s digital resilience.<\/p><p>Take the next step toward a secure, productive future and experience the benefits of remote access and zero trust principles in action. Sign up for a <a href=\"https:\/\/manage.realvnc.com\/en\/auth\/sign_up\" target=\"_blank\" rel=\"noopener noreferrer\">free trial<\/a> of <a href=\"https:\/\/www.realvnc.com\/en\/connect\/\" target=\"_blank\" rel=\"noopener noreferrer\">RealVNC Connect<\/a> today and see how our solution can transform your remote access strategy while keeping your network secure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>At a time when security is as critical to remotely accessing a network as productivity, do organizations need to \u201czero\u201d in on ZTNA? Or is remote access enough?<\/p>\n","protected":false},"author":31,"featured_media":15743,"template":"","blog_category":[257,270],"class_list":["post-15742","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-security","blog_category-technology-trends"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?<\/title>\n<meta name=\"description\" content=\"At a time when security is as critical to remotely accessing a network as productivity, do organizations need to \u201czero\u201d in on ZTNA?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?\" \/>\n<meta property=\"og:description\" content=\"At a time when security is as critical to remotely accessing a network as productivity, do organizations need to \u201czero\u201d in on ZTNA?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-05T13:10:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/01\/Zero-Trust-VNC-Connect.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/\"},\"author\":{\"name\":\"RealVNC\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\"},\"headline\":\"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?\",\"datePublished\":\"2023-01-19T09:51:15+00:00\",\"dateModified\":\"2025-03-05T13:10:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/\"},\"wordCount\":1392,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Zero-Trust-VNC-Connect.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/\",\"name\":\"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Zero-Trust-VNC-Connect.jpg\",\"datePublished\":\"2023-01-19T09:51:15+00:00\",\"dateModified\":\"2025-03-05T13:10:31+00:00\",\"description\":\"At a time when security is as critical to remotely accessing a network as productivity, do organizations need to \u201czero\u201d in on ZTNA?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Zero-Trust-VNC-Connect.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Zero-Trust-VNC-Connect.jpg\",\"width\":1600,\"height\":800,\"caption\":\"Zero Trust VNC Connect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/zero-trust-remote-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/505d415578d7c153d5d004b19f33b53f\",\"name\":\"RealVNC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g\",\"caption\":\"RealVNC\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?","description":"At a time when security is as critical to remotely accessing a network as productivity, do organizations need to \u201czero\u201d in on ZTNA?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?","og_description":"At a time when security is as critical to remotely accessing a network as productivity, do organizations need to \u201czero\u201d in on ZTNA?","og_url":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2025-03-05T13:10:31+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/01\/Zero-Trust-VNC-Connect.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/"},"author":{"name":"RealVNC","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f"},"headline":"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?","datePublished":"2023-01-19T09:51:15+00:00","dateModified":"2025-03-05T13:10:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/"},"wordCount":1392,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/01\/Zero-Trust-VNC-Connect.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/","url":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/","name":"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/01\/Zero-Trust-VNC-Connect.jpg","datePublished":"2023-01-19T09:51:15+00:00","dateModified":"2025-03-05T13:10:31+00:00","description":"At a time when security is as critical to remotely accessing a network as productivity, do organizations need to \u201czero\u201d in on ZTNA?","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/01\/Zero-Trust-VNC-Connect.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/01\/Zero-Trust-VNC-Connect.jpg","width":1600,"height":800,"caption":"Zero Trust VNC Connect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-remote-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Zero Trust Network Access vs. Remote Access: Which is Right for Your Organization?"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/505d415578d7c153d5d004b19f33b53f","name":"RealVNC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d95cbb9294770b615786a0d7ab34d9e66477d2115f031620926a5d0f17d22cfb?s=96&d=mm&r=g","caption":"RealVNC"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/15742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/15742\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/15743"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=15742"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=15742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}