Best Practice Report

Introducing The Zero Trust Edge Architecture For Security And Network Services

Strategic Plan: The Zero Trust Security Playbook

August 2nd, 2021
David Holmes, null
David Holmes
With contributors:
Joseph Blankenship , Paul McKay , Renee Taylor-Huot , Glenn O'Donnell , Steve Turner , Alexis Tatro , Peggy Dostie

Summary

Historic security and networking approaches don’t support today’s distributed enterprises, which demand competent, secure connectivity from virtually anywhere. A new architecture, the Zero Trust edge (ZTE), combines network functions and security capabilities, delivered from and managed in the cloud. Organizations are using ZTE to protect remote workers, retail outlets, and branch offices in the short term. In five years, they will use ZTE to securely connect data centers, factories, and hospitals. In its final form, ZTE will fully converge networking and security, combining Zero Trust security principles and software-defined networking into a cohesive set of cloud-delivered and managed services.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.