Cutting through the Acronyms: Finding a Path to Zero Trust

Technologies that can help implement Zero Trust

A Nemertes Research Report

When implementing a Zero Trust architecture, cybersecurity leaders run into an alphabet soup of technologies, none of which is a complete Zero Trust solution–but any or all of which can contribute to one. So, how do you cut through the acronyms to find a clear path to Zero Trust? Analysts at Nemertes Research guide the way with this report on technologies that can help with Zero Trust. You’ll walk away with:

  • The latest research on Zero Trust and its three major components
  • A guide to SASE, EDR, CASB, ZTNA and how technologies overlap
  • Key choices and a checklist to consider in evaluating technologies