Trends Report

Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

December 11th, 2014
John Kindervag, null
John Kindervag
Rick Holland, null
Rick Holland
With contributors:
Eve Maler , Tyler Shields , Kelley Mak , Josh Blackborow

Summary

Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect your organization's intellectual property and sensitive customer data, implicit trust assumptions are dangerous because they: 1) leave your organization vulnerable to so-called "trusted insiders" and 2) become obsolete when the environment or technology changes — and in a world defined by continued digital disruption, your environment and your technology are always changing. This report provides security and risk (S&R) professionals with an overview of how security architectures and operations are evolving to support today's digital businesses and implementing the core concepts and tenets of the Zero Trust Model. This report was originally published on September 12, 2013; Forrester reviews and updates it periodically for continued relevance and accuracy.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.