Zero Trust Security, also referred to as Zero Trust Networks or Zero Trust Architecture is a security model which states that ‘trust’ is a vulnerability which, if exploited, can lead to data-breaches. In short, the basic principle of Zero Trust is that you should not trust any user, device or connection with access to your corporate network, whether external or internal, without constant verification.
As part of this, Zero Trust recommends monitoring, segmenting, and limiting the amount of access each user has to only what is essential, across all areas of the organization. It recommends that organizations use multi-layered security technologies to implement strict access controls, and continuously authenticate anyone with access to a network, in order to limit security risks as far as possible.
The Zero-Trust technologies showcased in this category includes a range of different software solutions that help organizations to implement a Zero Trust security framework. This may include identity and access management technologies, network monitoring software and managed endpoint detection and response technologies. Many of the solutions shown can be described as a "stack" of security technologies, each containing multiple components to help security teams implement Zero Trust as a core pillar of their ongoing cybersecurity strategy