Skip to content Skip to navigation Skip to footer

Zero Trust Network Access (ZTNA)

Fortinet ZTNA improves secure access to applications anywhere, for remote users

Zero Trust Network Access (ZTNA) banner background banner dots


What is ZTNA?

ZTNA is a capability within Zero Trust Access (ZTA) that controls access to applications. It extends the principles of ZTA to verify users and devices before every application session. ZTNA confirms that they meet the organization’s policy to access that application.

Смотри сейчас

Fortinet Brings ZTNA to the Fortinet Security Fabric

Our unique approach, delivering ZTNA as part of our FortiGate Next-Generation Firewall (NGFW) makes it uniquely flexible, covering users when they are remote or in the office. ZTNA capabilities are automatically enabled on any device or service running FortiOS 7.0. This includes hardware appliances, virtual machines in clouds, and the FortiSASE service.

A FortiGate and the FortiClient ZTNA agent are all that’s needed to enable more secure access and a better experience for remote users, whether on or off the network.

Enable secure access and a better experience for your remote users with Fortinet ZTNA

To reach our technical library for information about ZTNA configuration, click here


View by:

Features and Benefits

Flexible Deployment

Enables ZTNA policies to be enforced for both remote workers and on-campus workers.

Granular Access Control

Grants access to a specific application only for that session.

Ongoing verification

Verifies the user identity, the device identity, device posture, and the user’s right to access an application before granting access to an application.

Client-Initiated Model

Provides more visibility and control of the endpoint for the IT team while providing the user a faster, easier experience.

No Extra Cost

Requires no additional licenses.
Fortinet’s ZTNA is a free feature in FortiOS and FortiClient, enabling customers to shift from
VPN to ZTNA at their own pace.

Automatic Encrypted Tunnels

Creates TLS-encrypted tunnels automatically, from the endpoint to the access proxy, ensuring traffic is hidden from prying eyes.

Use Cases

Legacy VPNs cannot provide the flexibility or level of security required for today’s dynamic networks and workers. ZTNA solves VPN shortcomings, making it the ideal solution for the following use cases: