Getting to the Bottom of Zero Trust (ZT) Security
Viewpoint

7 Apr 2022
by Kumar Avijit, Arjun Chauhan, Sakshi Nigam

During the pandemic, enterprises had to shift to a work-from-home model, which required a security architecture that was independent of the perimeter-based security model. The Zero Trust (ZT) security architecture, which had been around for a long time, received its due share of attention during this time. Multiple other factors also drove ZT demand, including accelerated digital transformation, with a focus on moving security to the left of the development cycle, and the increased sophistication of cyberattacks.

While the market is abuzz with ZT security, much confusion abounds around what it really means. In this viewpoint, we clear the air around ZT to help enterprises understand what it is and how they can move to a ZT security architecture.

Scope

All industries and geographies

Contents

In this viewpoint, we explain:

  • ZT security as a concept
  • ZT adoption drivers and inhibitors
  • Steps for enterprises to move to a ZT security architecture
  • ZT security outlook

Membership(s)

Cybersecurity

Sourcing and Vendor Management

 

Page Count: 12