Chart Your Course Report

Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process

November 25th, 2019
Sean Ryan, null
Sean Ryan
With contributors:
Merritt Maxim , Chase Cunningham , Benjamin Corey , Peggy Dostie


With the loss of a physical perimeter in protecting applications and data from external and internal threats, the “people” domain of Zero Trust eXtended (ZTX) is one of the most dynamically changing and growing areas. ZTX IAM is a mosaic of identity management and access governance, web access management, privileged identity management, data identity, directory infrastructure, and identity-as-a-service (IDaaS) for workforce and consumer architectures and solutions. In this report, we look at major IAM areas and highlight best practices for S&R professionals to repeatably and robustly implement Zero Trust in the people domain.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.