Zero Trust Network Access (ZTNA) Never trust. Always verify.
A VIP guest list for secure access to work resources.No credentials or authorization? No access.
App-specific access to devices and users that meet requirements.ZTNA restricts access to corporate resources and ensures devices only access resources after successful user authentication and verification that the device is free from threats. Each app, service and data request also requires verification to gain access. All while ensuring data is independent from devices.

Context-aware access policies
Control user access to organizational resources and networks based on their context, like:
- Complies with IT policy
- Connection is encrypted
- User's ID is confirmed
Jamf's context-aware access delivers:
- Policies that allow or deny access based on requirement attestation
- Granular configuration or requirements for authorizing enrolled devices
- Always-on, low-latency secure connections enforce end-user privacy
- Uniform policy enforcement across data centers, clouds and SaaS apps
Manage risk, not infrastructure.
The benefits of using Jamf ZTNAZTNA keeps organizations and employees safer by providing more security measures than VPN does: multi-factor authentication, encryption, and policy-based access controls.
Using Jamf for remote access ZTNA delivers:
-
Real-time assessment of risk data that evaluates device health and ensures compromised endpoints are not accessing sensitive information
-
Cloud-based infrastructure integration without complex hardware or software to manage or expensive support contracts
-
Intelligent split-tunneling technology that preserves privacy while ensuring business connections are secure
-
Seamless reconnections after disruptions while maximizing battery and performance

How do you implement ZTNA?
Jamf Connect's ZTNA, using the Wireguard VPN protocol for packet routing, can be deployed to iOS, iPadOS, Android, macOS and Windows devices with the Jamf Trust app.
ZTNA is enabled and managed through the Jamf Security Cloud portal and can be deployed alongside other Jamf security products and capabilities, such as Jamf Protect.
You'll need:
- A third-party identity provider (IdP)
- Jamf Trust app-installed devices
- Jamf Security Cloud