Applying Zero Trust To The Extended Enterprise
Preparing Your Network For Any Device, Anywhere, Any Time
August 5, 2011
Why Read This Report
You are part of an extended enterprise — a new extended ecosystem of customers, clouds, service providers, partners, supply chains, and empowered users. The business expects you, the security professional, to somehow magically secure this ever-expanding universe despite budget restrictions and compliance pressures. This new reality will force security professionals to realign strategies in new and more efficient ways and discard many legacy world views. This is particularly true of network security. We can no longer control the perimeter, control the number of users that must access the network, or lock down the devices that connect to the network. We must take a fundamentally new approach to network and device security — we must take a data-centric approach, so that no matter where the data is, security travels with it.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Also in Collection: Zero Trust
No More Chewy Centers: The Zero Trust Model Of Information Security
March 23, 2016 | John Kindervag
Build Security Into Your Network's DNA: The Zero Trust Network Architecture
November 15, 2012 | John Kindervag
Beware The Pitfalls Within Networking For Hybrid Cloud
March 2, 2015 | Andre Kindness
The SAP/Ariba Merger Will Not Be Frictionless
August 3, 2012 | Duncan Jones
The Path To A New Supply Chain Management Software
May 10, 2016 | Phoenix Zhang