In the past two years, Forrester’s Zero Trust information security model has exploded in awareness and plans for adoption. We’ve reached this market inflection because security vendors and security pros realize that perimeter-based security has failed. But with market hype comes the need for defenders to distinguish vendor hype from real capabilities and technology alignment with their Zero Trust strategy. This report helps security pros develop a roadmap to establish their program’s competence to select, implement, and operate technologies within the Zero Trust eXtended (ZTX) ecosystem.