The network plays a unique role in the shift from traditional perimeter-based security strategies to zero trust (ZT). On one hand, the network itself moves from being the primary focus of security activity to one of six interrelated pillars, and traditional network-centric security professionals and organizations can find this loss of primacy difficult to absorb.
On the other hand, the network is central to critical ZT security functions and to delivering on the foundational requirements shown in the “ZT Strategic Technology/Management Priorities” graphic. De-perimeterization—a concept espoused by the Jericho Forum (which first advanced key ZT principles)—may be the basis for zero trust, but ZT network plays an essential role in establishing ZT as a functional strategy.
In analyzing network technologies required for zero trust success, Stratascale security SMEs highlighted four key categories:
The Stratascale team assessed 120 vendors to identify those who provide a starting point for firms looking to enhance network security as part of a broader ZT strategy. Across the four categories, our team identified 67 vendors in one of two categories:
Stratascale’s cross-functional group of security and networking experts contributing to these reports included:
To access one of the Zero Trust Vendors to Watch, Know, Understand: ZT Network reports, please click on the linked titles:
Please note that no recommendation or warranty is implied by the inclusion of any vendor within these reports.
Readers interested in specific executive-level perspectives on zero trust may wish to explore the other publications in this series:
Michael is a world-leading IT industry analyst. He has led North American and global initiatives focused on developing insights and strategies that connect technology solutions with business needs, combining data, knowledge, analysis and advanced content delivery to define options for IT and buy-side businesses.