-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Diving into Secure Access Service Edge
By :

To design the Use Case, first, start with the end state production goals in mind. The Use Case must be defined concerning the UX. Identify the who, what, where, how, when, and why of the use case’s requirements.
In the following Use Case, think about what could be refined or added to better describe the experience goal. The end user gets sub-120 ms access to any application, anywhere, at any time, from three different device types. The security limits from ZTF are expanded to allow sub-optimal encryption and that traffic is remediated through a DMZ. Security also allows MFA, which is both a convenience and a risk mitigator through a policy. The why is defined as a high-level justification for the service to be provided as each service carries a risk that must be accounted for and mitigated.
ZTNA – Zero Trust Network Access:
Change the font size
Change margin width
Change background colour