No More Chewy Centers: The Zero Trust Model Of Information Security
March 23, 2016
Why Read This Report
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Also in Collection: Zero Trust
Build Security Into Your Network's DNA: The Zero Trust Network Architecture
November 15, 2012 | John Kindervag
Applying Zero Trust To The Extended Enterprise
August 5, 2011 | John Kindervag
Table of Contents
- Wake Up: You Must Adapt To Sophisticated And Cunning Adversaries
- S&R Pros Must Recognize The Pitfalls Of A Broken Trust Model
- No More Chewy Centers: Understanding The Zero Trust Model
- Zero Trust Requires Network Analysis And Visibility
- Zero Trust Enables Digital Business
- Zero Trust Is Not A One-Time Project
- Supplemental Material
- Related Research Documents
Organize Your People For Digital Success
January 20, 2017 | Nigel Fenwick
Develop Your Information Security Management System
January 19, 2017 | Laura Koetzle
Digital Experience Technology Integration: Go Beyond Just A Basket Of Solutions
January 19, 2017 | Mark Grannan