Chart Your Course Report

Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process

Sean Ryan
 and  four contributors
Nov 25, 2019

Summary

With the loss of a physical perimeter in protecting applications and data from external and internal threats, the “people” domain of Zero Trust eXtended (ZTX) is one of the most dynamically changing and growing areas. ZTX IAM is a mosaic of identity management and access governance, web access management, privileged identity management, data identity, directory infrastructure, and identity-as-a-service (IDaaS) for workforce and consumer architectures and solutions. In this report, we look at major IAM areas and highlight best practices for S&R professionals to repeatably and robustly implement Zero Trust in the people domain.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).