In a world where employees work from anywhere, cyber criminals strike from everywhere, and data lives across multiple locations, trust is no longer a given. That’s where Zero Trust Network Access (ZTNA) comes in.
ZTNA is more than a buzzword – it’s a fundamental shift in how we approach network security. Unlike traditional models that assume everything inside the network perimeter is safe, ZTNA flips the script: no one and nothing is trusted by default, whether they’re inside or outside the network.
In partnership with




Take a look at the agenda
- Welcome and Introductions
- What is ZTNA? Breaking down the buzzwords
- ZTNA in action: building blocks and use cases
- How Phoenix supports ZTNA adoption: practical tools, services and roadmaps
- Live Q&A: ask the experts
- Closing remarks and next steps
