Skip to main content

Save or Share this Report

For Security & Risk Professionals

Build Security Into Your Network's DNA: The Zero Trust Network Architecture

November 15, 2012

Primary author headshot


Why Read This Report

One of our goals with Zero Trust is to optimize the security architectures and technologies for future flexibility. As we move toward a data-centric world with shifting threats and perimeters, we look at new network designs that integrate connectivity, transport, and security around potentially toxic data. We call this "designing from the inside out." If we begin to do all those things together we can have a much more strategic infrastructure. If we look at everything from a data-centric perspective, we can design networks from the inside out and make them more efficient, more elegant, simpler, and more cost-effective. We designed this report so that security and risk (S&R) leaders can apply concepts of the Zero Trust Model to develop their security architecture and operations strategy.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).


Table of Contents

  • Zero Trust Will Change The Way We Design And Build Networks
  • Use Zero Trust To Build The Secure Network
  • The Zero Trust Network Is Poised To Transform Enterprise Networking
  • As IT Professionals Upgrade The Network, You Need To Be By Their Side

  • Today Is A Good Day To Take Action On Zero Trust Networking
  • Related Research Documents