Best Practice Report

The Zero Trust eXtended (ZTX) Ecosystem

Steve Turner
Chase Cunningham
 and  five contributors
Aug 23, 2021

Summary

In the past two years, Forrester’s Zero Trust information security model has exploded in awareness and plans for adoption. We’ve reached this market inflection because security vendors and security pros realize that perimeter-based security has failed. But with market hype comes the need for defenders to distinguish vendor hype from real capabilities and technology alignment with their Zero Trust strategy. This report helps security pros develop a roadmap to establish their program’s competence to select, implement, and operate technologies within the Zero Trust eXtended (ZTX) ecosystem.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).