Expert Panel: 3 Zero Trust Network Access Experts Share Their Predictions For 2025

Insights from leading ZTNA experts.

Last updated on Jan 31, 2025
Joel Witts
Written by Joel Witts
ZTNA Predictions 2025

With the rise of sophisticated insider threats and lateral movements across networks, Zero Trust Network Access (ZTNA) plays a crucial role in defending against unauthorized access.

In 2025, how will Zero Trust trends and innovations impact security strategies and reshape the cybersecurity landscape?

We asked 3 experts for their perspective and predictions:


Anupam Upadhyaya, VP, Products, Palo Alto Networks Prisma SASE: With the explosion of users, apps, and devices everywhere, we expect organizations to be more keen on implementing true zero trust. Organizations who are expanding and moving to the cloud will likely start to transition away from traditional VPN solutions and adopt a solution that can meet the needs of their evolving environment.

There will be a focus on effectively integrating AI into security tools and an emphasis on making sure users everywhere, whether at home or in an office, are secure and receive an exceptional user experience.

Adopting secure enterprise browsers will be another forward-thinking step for organizations in 2025, enabling stronger security measures to protect against increasing threats. Read the full Q&A.


Nirav Shah, SVP, Products and Services, Fortinet: ZTNA adoption will continue to grow in 2025 as organizations look for more ways to strengthen their security posture to protect against advanced threats and reduce their attack surface.

Many enterprises will also move from ZTNA, which enables secure access for remote employees, to Universal ZTNA, which provides secure access for all users no matter the location. Universal ZTNA provides consistent security and user experience across the entire network.

The last trend I want to touch on is privileged access for OT environments. Most OT devices don’t have an agent, which is the most common way ZTNA is applied to a device or system. Privileged access is a strategy that ensures all end user devices and accounts with key OT permissions have the proper ZTNA applied. It’s the best way to ensure OT environments are protected from improper access, and we’ll see its popularity continue to increase in the new year. Read the full Q&A.


Andrius Buinovskis, Head of Product, NordLayer: Threats evolve rapidly, so extra security measures are a must. Additional regulations, like NIS2, also indicate the importance of cyber security.

As bad actors have been increasingly adopting AI for targeted attacks, cybersecurity providers have been tirelessly catching up with this trend as well, and this will continue to remain a key topic for the upcoming years. The fundamentals for AI utilization are the ability to observe what is happening, detect anomalies, and respond immediately.

However, sometimes the response might be delayed, and the damage might be already done, so we have to take preventive measures to mitigate the threat faster to reduce the damage for the next time. So, from a solution point of view, in 2025, we’ll see more granular access control options. Read the full Q&A


Further reading: 


Written By Written By
Joel Witts
Joel Witts Content Director

Joel is the Director of Content and a co-founder at Expert Insights; a rapidly growing media company focussed on covering cybersecurity solutions. He’s an experienced journalist and editor with 8 years’ experience covering the cybersecurity space. He’s reviewed hundreds of cybersecurity solutions, interviewed hundreds of industry experts and produced dozens of industry reports read by thousands of CISOs and security professionals in topics like IAM, MFA, zero trust, email security, DevSecOps and more. He also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted. Joel is driven to share his team’s expertise with cybersecurity leaders to help them create more secure business foundations.