Trends Report

Applying Zero Trust To The Extended Enterprise

Preparing Your Network For Any Device, Anywhere, Any Time

August 5th, 2011
John Kindervag, null
John Kindervag
With contributors:
Stephanie Balaouras , Lindsey Coit , Chenxi Wang

Summary

You are part of an extended enterprise — a new extended ecosystem of customers, clouds, service providers, partners, supply chains, and empowered users. The business expects you, the security professional, to somehow magically secure this ever-expanding universe despite budget restrictions and compliance pressures. This new reality will force security professionals to realign strategies in new and more efficient ways and discard many legacy world views. This is particularly true of network security. We can no longer control the perimeter, control the number of users that must access the network, or lock down the devices that connect to the network. We must take a fundamentally new approach to network and device security — we must take a data-centric approach, so that no matter where the data is, security travels with it.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.