Save or Share this Report

For Security & Risk Professionals

The Zero Trust eXtended (ZTX) Ecosystem: People

Develop Your Zero Trust Workforce Security Strategy

December 5, 2017

Primary author headshot

Authors

Why Read This Report

The concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve Zero Trust: securing your users. Today, most security teams fail to appreciate how much power and trust they grant users. This report will help you enhance your security posture and move your team closer to a complete Zero Trust architecture by guiding you through critical decisions and breaking down the essential strategies and technologies.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).

Purchase

Table of Contents

  • Most Breaches Are Ultimately An Inside Job
  • The Last Mile For Zero Trust Is The Workforce
  • Work With Business Leaders And HR To Develop Effective Policy
  • Recommendations

  • Take An Incremental Approach To Zero Trust Workforce Security
  • Supplemental Material
  • Related Research Documents

Recommended Research