Zero Trust

Zero Trust is a security model that was developed in 2009 as an alternative to older perimeter-based security models. Since then, Zero Trust has evolved beyond its original focus on securing the network and is now being adopted by private-sector technology executives and by international and US government agencies. It is based on the principle of “never trust, always verify” and requires continuous verification of every user, device, and network request. The core principles of Zero Trust include eliminating implicit trust, enforcing least-privilege access, implementing comprehensive security monitoring, attaching cloud security to cloud management, and harnessing cloud-native deployment, rearchitecture, and migration initiatives. The model ensures comprehensive control over access to data and resources, regardless of where they are located. Learn more about Zero Trust and how it can be applied to your organization through Forrester Decisions For Security & Risk.

Insights

Blog

The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025 — A Market Transformed

Andre Kindness 4 days ago
We just released The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025, and the results mark a dramatic shift from the 2023 Wave on Zero Trust edge solutions.
Blog

When Buzzwords Collide: From A(I) To Z(ero Trust)

James Plouffe September 5, 2025
In the past 15 years, Zero Trust has become the dominant cybersecurity model. Now along comes AI. Find out what role generative AI and AI agents will play in driving Zero Trust adoption and maturity in this preview of our upcoming Security & Risk Summit.

Master Risk And Lead Through Uncertainty

Attend our Security & Risk Summit to get insider access to frameworks and tools that help security professionals navigate AI attacks, understand quantum risks, and redefine resilience.

Blog

Is Zero Trust Canceled? Revisiting DEF CON Research

James Plouffe September 3, 2025
Did AmberWolf’s talk at DEF CON 33 uncover any true fundamental flaws in Zero Trust? Although we think the research uncovered some significant issues, calling it a “total bust” is definitely overblown. Find out why.
Blog

Ongoing Government Uncertainty Around Cybersecurity Initiatives Is Putting Your Business At Risk

Paddy Harrington August 20, 2025
Government instability is undermining key cybersecurity programs like CyberSentry and MITRE’s CVE cataloging, putting critical infrastructure and business operations at risk. This post explores how funding cuts and conflicting AI directives are creating dangerous gaps in threat detection and response.
Blog

Announcing The Forrester Wave™: Privileged Identity Management Solutions, Q3 2025

Geoff Cairns August 7, 2025
Learn three important factors to consider when planning a privileged identity management (PIM) deployment or enhancement in this preview of our new report on the PIM solution market.
Blog

Introducing AEGIS — The Guardrails That CISOs Need For The Agentic Enterprise

Jeff Pollard August 4, 2025
AI agents aren’t coming — they’re already here. And they’re not waiting for your security architecture to catch up. Learn how Forrester's new AEGIS framework can help CISOs secure, govern, and manage AI agents and agentic infrastructure.
Blog

From The Basement To The Corner Office: Zero Trust Gets A “Promotion” In The DoD

James Plouffe August 1, 2025
Learn the implications of the new Zero Trust Portfolio Management Office and Chief Zero Trust Officer in the US Department of Defense.
Blog

Palo Alto Networks Enters The Identity Security Market With $25B Purchase Of CyberArk

Allie Mellen July 31, 2025
The third-largest cybersecurity M&A deal in history makes sense in some respects, but the track record on mega security and identity tie-ups is incomplete and unproven.
Blog

Announcing The Forrester Wave™: Unified Vulnerability Management Solutions, Q3 2025

Erik Nost July 29, 2025
Vulnerability management is undergoing a seismic shift. The risk-based prioritization from vulnerability risk management (VRM) has combined with attack surface management (ASM) to form exposure management and continuous security testing — two emerging practices that prioritize visibility and prioritization over remediation and response.
Blog

Academic Freedom And Security: What Hogwarts Can Teach Us About Cybersecurity In Education

Carlos Rivera July 23, 2025
As educational institutions become increasingly connected, the need for robust cybersecurity grows even greater. Learn how we can protect digital campuses without building walls so high that curiosity can’t climb over them.
Blog

Announcing The Forrester Wave™: Zero Trust Platforms, Q3 2025 — Choosing A Platform Solution For Your Zero Trust Journey

Carlos Rivera July 10, 2025
The latest edition of our Zero Trust platform vendor evaluation, The Forrester Wave™: Zero Trust Platforms, Q3 2025, published today. It highlights how this market continues to improve upon delivering unified solutions that help simplify and operationalize Zero Trust for organizations. Beginning with The Zero Trust Platforms Landscape, Q1 2025, we researched major players in […]
Blog

Your Zero Trust Strategy Needs An Adversarial Perspective

Tope Olufon June 30, 2025
As IT environments become more complex and alert fatigue grows, the solution isn’t more controls — it’s systematic testing through an attacker’s lens. Find out how your Zero Trust strategy can benefit from this approach in this preview of a new report.

New For 2026! Security Budget Planning Guide + Workbook

Prepare your 2026 security budget for critical risks. Get our budget planning guide and workbook to assess, prioritize, and implement investments for fortified security in uncertain times.

Blog

Datadog DASH: A Revolving Door Of Operations And Security Announcements

Carlos Casanova June 20, 2025
Datadog’s 2025 keynote showcased a bold vision for AI-driven observability and security, unveiling a sweeping array of autonomous agents and tools designed to transform IT operations. From Bits AI SRE and Security Analyst to LLM Observability and Code Security, Datadog is trying to position itself as a central hub for operational intelligence in an increasingly algorithmic tech landscape.
Blog

Key Takeaways From Cisco Live 2025: Cisco’s Big Bets For Unified Security And AI

Jitin Shabadu June 18, 2025
Cisco Live 2025 Focused On Three Main Themes: AI, Simplification, And Security At its annual Cisco Live event, the company delivered a clear message: It’s operationalizing AI across the core pillars of networking, security, and observability. Building on last year’s momentum with innovations like Hypershield and Splunk integration, the company has framed its vision around […]
Blog

Meet The New Analyst Covering Zero Trust And Microsegmentation

James Plouffe June 5, 2025
The 25-plus years of my career so far can be divided into two acts. Act I was enterprise IT, beginning with desktop support and progressing to network and security architecture at organizations ranging from small business to the Global 10. Act II opened with a move into technical alliance and ecosystem roles at security vendors […]
Blog

Public-Sector IT Leaders: It’s Time To Prioritize The Right Emerging Technologies

Sam Higgins May 29, 2025
Learn the 11 emerging technologies that all public-sector IT leaders should be watching and get insight on how these technologies will shape the next decade of government transformation.
Blog

Zscaler Snatches Up Red Canary: The Good, The Bad, And The Concerning

Jeff Pollard May 28, 2025
Find out what Zscaler's acquisition of Red Canary could mean for the cybersecurity market as a whole as well as for security leaders and their teams.
Blog

Government Leaders: Prioritize Cyber Efficiency Amid Federal Volatility

Cody Scott April 17, 2025
Government agencies at the federal, state, and local levels must prepare for a future where they experience uncertainty, headcount reductions, contract cancellations, and budget cuts. This is gut-wrenchingly difficult to process, yet remaining leaders must figure out how to move forward to serve the mission. For public sector cybersecurity leaders, this is even more paramount. […]
Blog

The Tech Exec’s Guide To Decoding Cybersecurity Vendor Performance

Madelein van der Hout April 15, 2025
Forrester analyzed the earnings calls of the 10 largest cybersecurity vendors by market cap and identified key trends for technology executives.
Blog

XR Steps Back, AI Steps Up: The Shake-Up In Our 2025 Emerging Technologies

Brian Hopkins April 14, 2025
Forrester’s 2025 top 10 emerging technologies report reveals a major shift in the tech landscape, driven by AI acceleration and changing market dynamics. Longtime list members extended reality and Zero Trust edge are stepping back, making room for two fast-moving innovations — one of which was virtually unknown just a year ago. The earlier release gives tech leaders more time to strategize and align with upcoming breakthroughs in AI and beyond.
More posts