Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we present a reference architecture and vendor shortlists to help security and risk (S&R) leaders and CIOs get Zero Trust projects moving quickly. Remember: You don't need a greenfield opportunity to get started with Zero Trust — you can build Zero Trust one data flow at a time.