Technical Review by
Craig MacAlpine
Zero Trust Network Access (ZTNA) solutions enforce application-level access based on verified user identity and device posture — replacing legacy VPN architectures that grant broad network access regardless of what a user actually needs. ZTNA removes the implicit trust that perimeter-based access models grant to anyone inside the network boundary. We reviewed the top platforms and found NordLayer, Akamai Enterprise Application Access, and Aviatrix Cloud Network Security Platform to be the strongest on identity-aware access enforcement and application segmentation granularity.
Zero trust network access (ZTNA) solutions enable remote users to securely access network resources such as files, servers, and applications. They create identity- and context-based boundaries around network assets or asset groups, hiding the network IP address so that those assets are hidden from public view, and restricting access to them on a zero trust basis.
Before granting a user access, the ZTNA provider authenticates their identity, their device’s identity and health, and the context of their login attempt. Once authenticated, users are given access only to the resource they need in line with the principle of least privilege; to access something else, they must be re-authenticated. This continuous verification helps segment the network, preventing attacks from spreading laterally throughout the network.
To achieve this, ZTNA solutions offer application micro-segmentation, granular role-based access policy configuration, and in-depth reporting into user access and application use. They should also verify that the endpoint security on a user’s device is working properly, and that the operating system is patched. Finally, the best ZTNA solutions offer in-built two-factor or multi-factor authentication (2FA/MFA) or integrations with leading MFA providers, for further security against identity-based attacks and account takeover.
In this article, we’ll explore the top zero trust network access (ZTNA) solutions. We’ll look at features such as app micro-segmentation, user and device authentication, access policy configuration, reporting and analytics, and added security controls. We’ll give you some background information on the provider and the key features of each solution, as well as the type of customer that they are most suitable for.
NordLayer is a cloud-based ZTNA solution designed for mid-sized organisations that want zero trust without a heavy deployment lift. We think it sits well between lightweight VPN replacements and the heavier enterprise SASE platforms. The NordLynx protocol delivers fast, encrypted connections, and the platform is genuinely easy to get up and running.
The unified console handles user management, permissions, and policies from one place. Identity provider integrations with Azure AD, Google Workspace, Okta, and OneLogin make authentication straightforward. The device posture module monitors endpoints and blocks non-compliant devices automatically, and a cloud firewall combines stateful inspection, intrusion prevention, and threat intelligence. A Kill Switch cuts traffic if connections drop, preventing data leaks. NordLayer also recently partnered with CrowdStrike to integrate Falcon Go and Falcon Enterprise directly through the platform, which is good to see for teams wanting endpoint and network protection together.
Customers praise the quick setup and the interface. Adding users takes minutes, and connection stability gets consistently high marks across deployments. Something to be aware of is that admin role permissions can be restrictive; team admins can’t reset MFA or access certain key settings, which may slow down day-to-day management in larger teams.
We think NordLayer is a strong option for mid-sized organisations wanting zero trust access controls without extensive infrastructure changes. If you need quick deployment, IdP integrations, and device posture checks without the complexity of a full SASE platform, this delivers.
Akamai Technologies is a cybersecurity company that specialises in cloud-based web and internet security, and content delivery network services. Enterprise Application Access is Akamai’s cloud-delivered ZTNA solution, running on Akamai’s Intelligent Edge Platform with no virtual or physical hardware to manage. We were impressed by the performance and scale this brings to zero trust access. It provides secure access to AWS, Azure, Google Cloud, and SaaS applications, and is best suited for mid-to-large enterprises prioritising low-latency global access.
Admins can configure per-application access policies through a single portal, with decisions based on user identity, device posture, and endpoint status, helping minimise the spread of account takeover and malware attacks throughout the network. Built-in MFA and SSO integrate with major identity providers, LDAP, and Active Directory. The edge-based delivery keeps latency low across distributed infrastructure, which is a strong selling point for globally distributed teams. Enterprise Application Access analyses signals in real time, such as user identity, device posture, and endpoint compromise, to detect anomalous activity, helping to block high-risk access attempts while giving admins heightened visibility. SIEM integration through Unified Log Streamer handles centralised logging, and API and SDK support lets you connect it into your broader security architecture.
Customers praise the network performance and DDoS protection capabilities. Microsegmentation and API protection features get positive feedback from security teams. Something to be aware of is that this is enterprise-level pricing, which limits accessibility for smaller organisations. Some users also note that implementation requires a learning curve, and support response times can vary.
We think Akamai EAA is a strong fit for organisations needing reliable, low-latency ZTNA across complex cloud environments. The solution scales well, and integrations with LDAP and Active Directory make it relatively straightforward to deploy and provision. If you already use Akamai services or need edge-optimised performance globally, this integrates naturally into your existing stack.
Aviatrix is a cloud network security platform built for multi-cloud and hybrid environments. It provides a zero-trust firewall, encrypted connectivity up to 100 Gbps, and unified management across AWS, Azure, Google Cloud, and Oracle Cloud. We think it stands out for organisations managing complex, distributed cloud infrastructure who need consistent security and visibility across providers.
The CoPilot dashboard delivers strong real-time visibility across cloud environments. It brings back the kind of network insight you had on-prem but applies it to distributed cloud workloads. SmartGroups enable identity-driven zero-trust policies that adapt to changing environments. The platform handles east-west and egress traffic with embedded firewalling, micro-segmentation, and Network Detection and Response. Kubernetes networking gets native support, and high-performance encryption maintains throughput without bottlenecks.
Customers consistently highlight reduced troubleshooting time and simplified management. Documentation gets praise for clarity, and GitOps integration fits modern deployment workflows. Something to be aware of is that feature parity varies across cloud providers, with certain capabilities stronger on some CSPs than others. Initial setup also requires coordination with your cloud teams.
We think Aviatrix is well worth considering for enterprises running workloads across multiple cloud providers who need consistent security and visibility. The CoPilot dashboard is a real differentiator for operations teams, and the SmartGroups approach to zero-trust policies is well suited to fast-moving cloud environments.
Check Point Harmony SASE (formerly Perimeter 81) is a cloud-based zero-trust platform combining ZTNA with a Secure Web Gateway. The platform is cloud-based, so it doesn’t require the maintenance of any external hardware, making it easy to deploy and scale. It supports Windows, Mac, Linux, iOS, Android, and Chromebook operating systems, with agentless options for unmanaged devices. We think it works well for organisations wanting ZTNA and web security consolidated in one platform without managing separate tools.
The centralised dashboard handles policy management across users, devices, roles, and locations, with automated enforcement keeping configurations consistent. The platform supports IPSec, OpenVPN, and WireGuard protocols to encrypt all network traffic, no matter the cloud environment users are connecting to, offering protection against unauthorised access should users be connecting via an unsecure WiFi network. On-device inspection reduces backhauling, which keeps browsing fast and latency low for distributed teams. The Secure Web Gateway adds malware protection and web content analysis in the same package, and recent updates have added threat emulation, anti-bot protection, and DLP capabilities with fine-grained data type management. In-built two-factor authentication provides further security against identity-related breaches, and DNS filtering prevents employees from accessing known malicious websites. Admins can also access activity reports and audits to monitor logins, app connections, and gateway deployments.
Customers praise the cloud-native architecture and quick deployment. Policy updates propagate instantly, and the threat prevention capabilities get strong marks. The solution’s helpful, efficient support is highlighted, and the interface makes it a particularly popular product amongst SMBs. With that said, initial setup complexity increases in hybrid environments with on-prem components. Web content analysis is also limited to 10MB file sizes, which restricts some use cases.
We think Check Point Harmony SASE is a solid choice if you have a hybrid workforce spread across locations and need consistent policy enforcement. The wide OS compatibility, including Chromebook, makes it a strong option for companies with BYOD devices in their fleet. The consolidated approach to ZTNA and web security simplifies architecture, and the automated policy enforcement is good to see.
Cisco is a market-leading provider of solutions that enable and secure remote and hybrid work. Software-Defined Access (SD-Access) is Cisco’s ZTNA solution, designed to enable IT and security teams to configure and enforce access policies across their remote or hybrid workforce. It integrates tightly with Cisco’s broader security suite, managed through Cisco Catalyst Center. We think it works best for mid-to-large enterprises already invested in Cisco infrastructure, where the ecosystem integration adds value that standalone solutions can’t match.
From the central dashboard, admins can configure role-based access policies for all users and devices, including IoT devices, connected to their network. Network segmentation enforces least privilege access, helping stop the lateral spread of attacks. SD-Access offers particularly strong device verification; it establishes a segmented connection with each endpoint, granting it as little access as possible, and continuously verifies the security posture of each device to identify anomalous or risky behaviours. If devices are considered high risk, IT admins are alerted so they can contain the threat and investigate. Analytics and reporting give visibility into endpoint activity across the environment. SD-Access offers cloud, on-prem, and hybrid deployment options, making it suitable for any environment.
Customers with long-standing Cisco deployments praise the account team relationships and support access. Teams report faster site deployments and simplified code upgrades through automation. Something to be aware of is that some users, particularly those unfamiliar with Cisco’s products, report that initial deployment is complex and requires support from Cisco’s technical team. Documentation gaps can also make unlocking advanced functionality harder than it should be.
We think Cisco SD-Access is well worth considering if you already run Cisco infrastructure and want unified policy control across your environment. The network segmentation and continuous device posture verification are strong, and the automation capabilities help standardise configurations across sites. SMBs interested in the Cisco suite may wish to consider Duo Remote Access, which is aimed at smaller businesses but still offers integrations with Cisco’s other products.
Cloudflare is a cybersecurity provider that aims to secure anything connected to the internet. Designed to augment or replace traditional VPN solutions, Cloudflare Access is Cloudflare’s ZTNA solution that enables remote users to access all apps in their company’s on-prem, public cloud, or SaaS environment. The same infrastructure that handles DDoS protection for much of the internet powers the access layer. We think it suits organisations with capable IT teams who want VPN replacement backed by global infrastructure and strong performance.
Cloudflare Tunnel stands out as a key differentiator; it lets you expose internal apps securely without traditional VPN infrastructure, eliminating inbound firewall rules and reducing attack surface. Admins can configure fine-grained role-based access controls across all segmented SaaS and self-hosted apps. Identity provider integrations work smoothly across multiple providers, and device posture checks verify health using serial numbers, mTLS certificates, and integrations with CrowdStrike and SentinelOne. Cloudflare Access also offers detailed log functionality, with logging for all requests made in applications so admins can keep a tight eye on user activity throughout their sessions. Cloudflare has also rolled out post-quantum cryptography across its ZTNA stack, which is good to see for organisations planning long-term cryptographic resilience.
Customers describe Cloudflare Access as something that “just works” after deployment. Organisations consolidating from multiple open-source tools appreciate the simplified management, and the Cloudflare team gets high marks for responsiveness. Users praise the strong integrations with identity providers and reliability when it comes to threat prevention. With that said, setup complexity increases significantly in large or distributed environments, and the platform requires experienced IT teams to configure effectively.
We were impressed by the Tunnel-based approach, which eliminates inbound firewall rules and reduces attack surface. Cloudflare Access is delivered via Cloudflare’s globally distributed edge network, giving it the scalability to support organisations of any size with fast connections worldwide. If you already use Cloudflare services or need edge-optimised access across a global workforce, this integrates naturally and the post-quantum security support adds long-term value.
Microsoft Entra ID is an enterprise identity and access management platform delivering SSO, MFA, and conditional access. For organisations already running Microsoft infrastructure, it is the natural IAM choice. We think the adaptive access policies and deep ecosystem integration make it a strong foundation for identity-driven zero trust, particularly when paired with Microsoft Entra Private Access for full ZTNA capabilities.
The admin centre provides solid visibility across users, applications, and access activity. Risk-based adaptive policies adjust authentication requirements based on context, balancing security with usability. Time-limited privileged access adds governance controls when elevated permissions are needed. SSO eliminates multiple logins for end users, and MFA works well across both cloud and on-prem apps. Microsoft also offers Entra Private Access as a separate ZTNA component for securing access to private applications without traditional VPNs.
Customers report strong reliability and stability in production. The integration with other Microsoft tools gets consistent praise for keeping workflows connected. Something to be aware of is that initial setup and configuration complexity requires careful planning. Managing settings can feel overwhelming, especially for teams new to enterprise IAM.
We think Microsoft Entra ID is well worth considering for organisations already invested in Microsoft infrastructure. The risk-based adaptive access is a standout feature, and the integration benefits compound when you run Azure, Microsoft 365, and related services together.
Netskope One Private Access is a ZTNA solution within the Netskope One platform, combining zero trust access with DLP and threat protection across SaaS, web, and private applications. We think it stands out for organisations with mature security teams managing complex cloud environments who need unified visibility and strong data protection.
The single console delivers strong visibility across cloud, web, and private app traffic. Threat protection draws from 40 intelligence feeds to detect malicious behaviour and cloud-based malware. Fine-grained DLP policies let you enforce data protection rules tailored to different roles, with encryption and tokenisation for sensitive data. Recent updates have added Universal ZTNA capabilities, extending coverage to IoT and OT devices through the 5G Netskope One Gateway, and AI-powered policy optimisation through Copilot to simplify ZTNA management.
Customers praise the unified approach for simplifying operations. Real-time threat protection and DLP work effectively in hybrid environments, and support teams get consistently high marks for responsiveness. With that said, initial deployment and policy configuration requires significant time and expertise. Some users also report that the client agent occasionally disconnects or enters fail-closed states.
We were impressed by the breadth of the Netskope One platform and the consistency of positive support feedback. If you need unified visibility, strong DLP, and threat detection across SaaS and private applications, Netskope consolidates multiple security functions well.
Palo Alto Networks is a globally recognised and trusted provider of enterprise cybersecurity solutions. Prisma Access, formerly GlobalProtect, is Palo Alto’s cloud-delivered SASE solution combining ZTNA, secure web gateway, and CASB capabilities. It enforces continuous authentication and least privilege access to provide remote users with secure access to corporate applications, including web apps, TCP-based apps, and UDP-based apps. We think it is best suited for larger organisations already invested in Palo Alto infrastructure who want consistent security policies between on-prem firewalls and cloud-delivered access.
Prisma Access enables IT admins to implement least privilege user and device access at both app and sub-app levels, which is a level of policy depth that not all ZTNA platforms offer. The platform continuously monitors user and device activity throughout each session to identify anomalies such as changes in device posture and user and app behaviour, granting admins greater visibility into the security of each connection. Machine learning-powered firewalls and URL filtering extend the same security policies you use on-prem into the cloud. The platform supports managed devices, unmanaged endpoints, and IoT, with deployment flexibility spanning as-a-service, self-hosted, or hybrid models. Palo Alto has also introduced SASE Private Location for organisations needing to deploy Prisma Access within their own infrastructure for regulatory compliance or data sovereignty. Note that, in order to get the most out of the centralised management features, customers must invest in Palo Alto’s Panorama management portal.
Customers describe the solution as stable, secure, and able to scale with minimal operational overhead. Users praise the simplicity with which they can manage user access, and the high levels of security the platform provides. Teams consolidating legacy SWG and VPN services appreciate the unified approach. Something to be aware of is that the platform requires design effort and tuning to achieve optimal performance, and some users note that limited command line access restricts advanced troubleshooting.
We think Prisma Access is a very strong option for organisations with existing Palo Alto investments. The policy consistency between on-prem and cloud is a real advantage, and the sub-app level controls give security teams the control they need. The solution supports diverse environments, both in terms of combining on-prem and SaaS elements, and managed and unmanaged devices, including IoT.
Twingate is a remote access provider that focuses on enabling distributed workforces to securely access corporate resources without compromising their productivity. Twingate’s cloud-based ZTNA solution allows IT and security teams to implement a software-defined perimeter and centrally manage user and device access to corporate applications without using external hardware or changing their existing infrastructure. We think it is a good fit for small to mid-sized teams wanting straightforward remote access security with a software-first approach.
Once users have installed the Twingate app and signed in, the platform connects them to applications on the corporate network via the app’s FQDN or IP address with no interaction from the user, helping minimise friction in the access process. The admin experience is refreshingly simple; adding resources and managing policies takes minimal effort. Terraform support covers users, groups, connectors, and resources, which fits modern infrastructure-as-code workflows. Split tunnelling ensures quick, strong connections, and ViPR technology automatically makes authorisation and routing decisions, reducing alerts for IT teams. From the management console, admins can configure user access policies at an app level based on device posture, location, and time, helping stop the lateral spread of attacks. IdP integrations with Okta and OneLogin handle SSO cleanly. Admins can also gain insights into network access activity, and provision and deprovision users.
Customers praise the fast connectivity, easy MFA integration, and connection reliability. The alias feature handles multiple networks with overlapping IP schemes well. The platform’s ease of deployment is consistently highlighted. With that said, MDM deployment can be more challenging. MDM integration with Intune, Jamf, and NinjaRMM can be more complex for larger teams.
We think Twingate is well worth considering for small to mid-sized teams wanting VPN replacement without infrastructure complexity. The Terraform support is a real differentiator if your team works with infrastructure-as-code. Twingate also offers a broad range of support options, including priority support for businesses on their Enterprise subscription. For larger enterprise rollouts, we’d recommend testing MDM integration carefully before committing.
Zscaler is a market-leading provider of cloud-based web security solutions. Zscaler Private Access (ZPA) is their cloud-delivered ZTNA solution designed to provide secure, frictionless remote access to all private applications, services, and OT/IoT devices running in a public cloud or in a data centre. Part of Zscaler’s Security Service Edge (SSE) platform, ZPA’s cloud-based architecture makes it quick to deploy without the need for external hardware. We think it is best suited for larger enterprises needing zero-trust architecture with strong web threat protection as part of a broader SSE strategy.
ZPA hides the IP addresses of all applications on the corporate network, preventing unauthorised parties from discovering them. The platform creates a direct connection between each user and the resource they’re trying to access, reducing the risk of lateral attacks. User access is granted based on admin-configured authentication and access policies. Machine learning analyses indicators of anomalous access activity, such as app telemetry, user context, and location, to validate access policies. Content inspection controls sensitive data across user/app connections, and cloud browser isolation mitigates the risk of web-based threats by ensuring harmful content never interacts with the user’s device. The platform supports managed devices, BYOD, and third-party endpoints with consistent policies. Automatic connectivity handles location changes without manual VPN configuration, which removes friction for mobile workers.
Customers praise the VPN replacement benefits. Connections run fast with noticeably reduced latency compared to traditional tunnels, and the admin console provides solid visibility. Azure AD integration works smoothly, and documentation and community support help teams get running. Something to be aware of is that network switching can cause repeated connect/disconnect cycles, which disrupts user workflow.
We think Zscaler Private Access is a strong choice for large enterprises wanting VPN replacement with enhanced web security. ZPA is compatible with both managed and unmanaged devices, making it particularly strong for organisations with corporate-issued and BYOD devices in their fleet, or those using third parties and contractors. The hidden application architecture reduces attack surface effectively, and the browser isolation capabilities add a layer of protection that most ZTNA-only tools don’t offer.
Software-defined perimeter for dynamic, secure remote access.
Simplifies secure access with user- and device-based policies.
Cloud-delivered ZTNA with granular access controls.
Integrated ZTNA as part of a secure access service edge platform.
Zero trust access with threat protection for private applications.
We assessed each platform across deployment flexibility, access policy depth, device posture verification, identity provider integrations, reporting and analytics, performance and latency, and real-world customer feedback. Products were evaluated on how effectively they enforce least privilege access while maintaining a frictionless experience for remote and hybrid users.
When selecting a ZTNA solution, consider your deployment model preferences (cloud-only, hybrid, or self-hosted) and the devices in your fleet (managed, BYOD, IoT). Evaluate identity provider integrations, device posture verification capabilities, and whether the platform offers micro-segmentation at the app level. Reporting and audit trail capabilities matter for compliance, and additional security features like browser isolation, DLP, and web filtering can reduce the need for separate tools. Finally, consider whether the platform fits into your existing security stack or requires a standalone investment.
The ZTNA market has evolved well beyond simple VPN replacement. Modern platforms now combine identity-driven access with DLP, threat detection, and browser isolation as part of broader SASE and SSE strategies. The right choice depends on your existing infrastructure, the complexity of your cloud environment, and whether you need a lightweight access solution or a full security platform. Organisations already invested in specific ecosystems like Cisco, Palo Alto, or Microsoft will find the most value in solutions that extend those investments, while teams starting fresh should evaluate deployment simplicity and time to value alongside feature depth.
Zero trust network access solutions enable remote users to securely access resources on their corporate network. They do this by creating an identity- and context-based boundary around individual network assets—such as files, servers, or applications—or groups of assets. If a user wants to access an asset, the ZTNA solution must first verify their identity and the context of their access attempt in line with pre-defined policies. If the user passes these checks, they’re granted permission to access only the requested asset or asset group. If they want to access another asset, the ZTNA solution must re-verify them.
The micro-segmentation employed by ZTNA solutions also gives admins continuous, real-time visibility into which users are accessing which assets and when. This enables them to quickly identify and anomalous activity, as well as identify applications that are rarely used or redundant, to help save subscription costs.
Zero trust network access, more commonly referred to as “ZTNA”, is a security solution that secures corporate assets by creating individual identity- and context-based boundaries around them, or groups of them. With ZTNA in place, the network IP address is hidden. This means that network assets, such as applications, are hidden from public discovery. Additionally, access to network assets is restricted by the ZTNA provider; trust is conditional. Before a user is granted access, the ZTNA provider verifies that user’s identity and the context of their access attempt in line with admin-configured policies. If they pass these checks, the user is granted only enough authority to access the requested asset or asset group, based on admin-configured roles—rather than to the entire network, as with traditional network perimeters. If the user wants to access another asset or asset group, the ZTNA provider re-verifies them.
Thanks to this continuous verification, ZTNA not only helps prevent attackers from gaining access to the network in the first place, but also prevents the spread of cyberthreats laterally through the network if an attacker does manage to gain access, greatly limiting the amount of damage they’re able to do before they’re detected.
With a ZTNA solution implemented, organizations can enable their users to seamlessly and securely access all of the data and applications they need for work, without having to grant them access to the entire network or expose those assets to potentially unsecure internet connections.
Traditionally, organizations have relied on virtual private networks (VPNs) to establish a secure connection between their remote users and the corporate network. Enterprise VPNs create a private network across a public internet connection, essentially creating an encrypted tunnel between the user and the network. They anonymize the user by hiding their IP address and prevent any third parties from spying on users by encrypting data. They also usually require the user to authenticate themselves via multi-factor authentication (MFA) before establishing the connection.
However, once authenticated, the user has free access to the entire corporate network. This means that, if an attacker gains access to a remote user’s credentials and logs into their VPN, or even just intercepts a user’s VPN connection, they too can access the entire company network.
ZTNA solutions differ from this by only giving users access to the resources they need, when they need them—and nothing more. This enables ZTNA solutions to prevent attacks from spreading laterally through the network should an attacker manage to gain initial access. This greatly limits the amount of damage an attacker can do if they compromise a user’s account.
TL;DR: if a VPN builds a wall around the castle of your network to keep out the bad guys, a ZTNA solution places a guard on every door within the castle.
There are five key features that you should look for when shopping for a ZTNA solution:
There are a lot of reasons why you might want to consider implementing a zero trust network access solution, or switching from your traditional VPN to ZTNA. Here are some of the top benefits of ZTNA:
Most businesses should consider implementing ZTNA, and there are two specific use cases where it should be a critical part of your security architecture.
The first of those is businesses with a distributed workplace. Modern networks and workplaces are incredibly distributed: they have both personal and corporate devices, they have on-premises and cloud applications, and they have remote and on-site employees. ZTNA offers protection for each of those attack surfaces, while also enabling productivity through remote and hybrid work.
The second use case is businesses with a complex supply chain or that work with lots of third parties. Third parties are often granted much higher permissions than they need to do their jobs, and they also tend to work via personal or unmanaged devices. This makes them the perfect target for an attacker trying to access company data. But with ZTNA, you can ensure that they are only granted the access they need, as well as verify the identities of any third parties that you are granting access to—and their devices.
Caitlin Harris is the Deputy Head of Content at Expert Insights. As an experienced content writer and editor, Caitlin helps cybersecurity leaders to cut through the noise in the cybersecurity space with expert analysis and insightful recommendations.
Prior to Expert Insights, Caitlin worked at QA Ltd, where she produced award-winning technical training materials, and she has also produced journalistic content over the course of her career.
Caitlin has 8 years of experience in the cybersecurity and technology space, helping technical teams, CISOs, and security professionals find clarity on complex, mission critical topics like security awareness training, backup and recovery, and endpoint protection.
Caitlin also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted.
Craig MacAlpine is CEO and Founder of Expert Insights. Before founding Expert Insights in August 2018, Craig spent 10 years as CEO of EPA Cloud, an email security provider that rebranded as VIPRE Email Security following its acquisition by Ziff Davies, formerly J2Global (NASQAQ: ZD) in 2013.
Craig is a passionate security innovator with over 20 years of experience helping organizations to stay secure with cutting-edge information security and cybersecurity solutions.
Using his extensive experience in the email security industry, he founded Expert Insights with the singular goal of helping IT professionals and CISOs to cut through the noise and find the right cybersecurity solutions they need to protect their organizations.