«  View All Posts

Why Zero Trust Network Access Is Worth It

October 27th, 2025 | 4 min. read

By Mark Sheldon Villanueva

“Why do I have to click one more thing just to access my system?” 

If you’ve asked yourself that, or heard your employees ask, it’s a valid question. As your business grows and you implement more robust cybersecurity measures, things can feel like they’re getting more complicated. 

But every extra step is intentional. 

At Intelligent Technical Solutions (ITS), we believe cybersecurity should be frictionless where possible, but never careless. And one of the best tools to achieve that balance is Zero Trust Network Access (ZTNA). 

As Francois Goosen, Lead Engineer of ITS’s Centralized Services team, put it: “We’re building an onion, not peeling one. Each layer shrinks the attack surface and makes it harder for the bad guys to get in.” 

Let’s break down what that means, and why Zero Trust is worth every extra click. 

What Is Zero Trust Network Access (ZTNA)? 

Zero Trust Network Access (ZTNA) is a modern security framework that assumes no one and nothing can be trusted by default, even if they’re already inside your network.

Unlike traditional perimeter security models that trust users once they’re in, Zero Trust requires continuous verification of identity, device health, location, and network path, before access is granted and every time it's used. 

In simple terms, think of ZTNA as: 

  • A smart bouncer that checks your ID every time you try to enter a room, not just the front door. 
  • It’s a system that ensures the right people, using the right devices, from the right place, get access to sensitive business data. 

At ITS, we implement ZTNA which securely connects users to internal systems and cloud services via encrypted tunnels and verified network pathways. It doesn’t just encrypt traffic, it ensures traffic only comes from trusted, pre-approved sources. 

“It functions like a next-generation, remote access VPN,” Francois explained. “But it's smarter, faster, and integrated with Microsoft 365 and Azure to enforce policies automatically.” 

With ZTNA, access to tools like internal servers or cloud platforms can be restricted to only trusted networks, even when employees are working remotely.  

Why SSO Alone Isn’t Enough 

Single Sign-On (SSO) is a great convenience, and it reduces password fatigue, improving overall user experience and security. But SSO is only one layer in the security stack. 

Attackers are exploiting SSO by stealing authentication tokens, essentially, a digital “pass” that proves you've logged in. These tokens can be captured through phishing or man-in-the-middle attacks. 

Francois shares, “In a lot of phishing or business email compromise cases, attackers use a fake login page to pass your credentials to Microsoft and capture your token. That token lets them log in as you, without needing your password or MFA.” 

That’s where ZTNA acts as a critical line of defence.  

Even if an attacker gets your token, they won’t be able to use it unless they’re connected through ZTNA from a trusted network. ITS policies enforce that authentication must originate from behind ZTNA, blocking unauthorized access, even if the credentials are technically correct. 

Minimize Impact, Whatever the Source 

Many executives think cybersecurity is about keeping external attackers out. That’s only half the story. 

ZTNA also prevents lateral movement within your systems. If one user or endpoint is compromised, attackers can’t hop from one system to another, because each request, each access attempt, is individually verified. 

“If someone gets remote access to your device, that's a problem,” Francois said. “But with ZTNA, even then, they can’t go far. Our layered model limits what they can access and flags suspicious behavior.” 

This containment approach is supported by other tools in ITS’s cybersecurity stack, like MDR (Managed Detection and Response) software, which monitors for suspicious activity and can isolate infected devices in real-time.

But ZTNA is a proactive step, it prevents many attacks from succeeding in the first place. 

The Real-World Risks of Skipping ZTNA 

Still wondering if ZTNA is right for you? Consider this: 

  • Microsoft 365 accounts are a top target for phishing attacks because of the sensitive data they hold. 
  • Token theft has become a preferred tactic because it bypasses even MFA. 
  • VPNs, once considered sufficient, have become outdated, they assume any device inside the network is trusted. 

Francois put it clearly, “ZTNA lets us make internet-facing systems accessible only to legitimate users. That drastically reduces risk from brute force attacks or zero-day vulnerabilities.” 

Without Zero Trust, your business is more exposed than you think, even if you’re using antivirus and firewalls. Those tools react after something happens. ZTNA prevents the breach from happening in the first place. 

Why the Extra Step Is Worth It 

We get it. Business leaders want speed and simplicity. Every time we add a new security tool, it must prove its value, not just slow people down. 

ZTNA adds a fraction of a second to your login process. But it adds exponential protection to your business operations. With it, you gain: 

  • Better protection against stolen credentials 
  • More control over who can access what, and from where 
  • Audit-ready logging for compliance requirements 
  • Reduced risk of insider threats and lateral movement 
  • Greater resilience against increasingly sophisticated attacks 

 

“Even if someone tries to log in with the right token from the wrong place, they’re blocked,” Francois said. “It’s not just a smart precaution, it’s a critical business safeguard.” 

The Bottom Line: Zero Trust Is Business-Ready Security 

Relying on outdated perimeter defenses or “good enough” security tools can leave your business exposed. Implementing ZTNA can help with that. By verifying every connection, it can limit exposure, and dramatically reduce your risk, even if your credentials are compromised. 

While it may feel like adding extra steps, ZTNA ensures that only the right people, using secure devices, from trusted locations can access your critical systems. That’s not just IT hygiene, it’s business survival. 

Thankfully, you don’t need to be a cybersecurity expert to implement ZTNA for your business. You just need to partner with a team that prioritizes protecting your business like it’s their own. 

Not sure if your current access model is exposing you to risk? Let’s find out. Schedule a free consultation with ITS today. 

MORE RESOURCES:  

Mark Sheldon Villanueva

Mark Sheldon Villanueva has over a decade of experience creating engaging content for companies based in Asia, Australia and North America. He has produced all manner of creative content for small local businesses and large multinational corporations that span a wide variety of industries. Mark also used to work as a content team leader for an award-winning digital marketing agency based in Singapore.