Download PDFOpen PDF in browserSynergizing Security: Designing a Zero Trust Network Access Protocol in Patient MonitorsEasyChair Preprint 122007 pages•Date: February 20, 2024AbstractThis paper navigates the landscape of Zero Trust network security protocols, challenging conventional reliance on implicit trust within organizational networks. It specifically focuses on agent-based Zero Trust Network Access (ZTNA) solutions, redefining continuous monitoring, authentication, and compliance verification, particularly in healthcare devices like patient monitors. By delving into these agent-based solutions, this study scrutinizes their deployment across diverse domains. Through case studies and evaluations, it highlights the strengths, weaknesses, and amplified advantages of agent-based ZTNA adoption. These insights pave the way for future advancements, fortifying network security architectures to unparalleled resilience. Keyphrases: Cybersecurity Paradigm, Healthcare devices, Network Security Protocol, Zero Trust Security, keywords
|