The purpose of this document is to provide guidance on what to look for when choosing a security tool for remote access to internal applications. We will outline the four tenets of an ideal solution, which were developed by the Zscaler team over the last three years and served as the building blocks for our new secure remote access service, Zscaler Private Access. But before we go into detail, we’ll first discuss why these tenets became necessary.