Skip to main content

Save or Share this Report


Zero Trust Network Architecture

October 6, 2010

Primary author headshot
  • Presented by John Kindervag


The biggest issue facing information security professionals is that our traditional trust model is broken. Security devices have two interfaces: One interface is labeled "trusted," and the other is labeled "untrusted." In today's threat environment, which interface goes to the Internet? Threats from malicious insiders are growing at a rapid pace, but information security professionals are conditioned to think of the internal network as safe and the Internet as evil. Companies have invested great sums of money in technologies designed to protect them, but attacks still happen. To deal with this issue, Forrester has developed a secure network architecture that embraces the concept of the Zero Trust Model of information security." The Zero Trust Model is built on the idea that security must become ubiquitous throughout your infrastructure.


  • A broken trust model is the most urgent issue facing information security professionals today.
  • All users are effectively "untrusted."
  • Security must be embedded throughout the network, not just on the perimeter.
  • All resources must be accessed securely.
  • All traffic traversing the network must be inspected and logged.
  • We discuss our revolutionary new network architecture that builds security into the DNA of your network.

Get Access

Already a Client?

Log in to access this webinar.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.

Contact us to learn more.

Purchase Webinar

Price: $ 250.00(USD)


Webinar FAQs

See the Webinar FAQs for answers to technical and other Webinar questions.