www.zscaler.com Open in urlscan Pro
2606:4700::6812:1d4a  Public Scan

Submitted URL: https://pages.zscaler.com/MzA2LVpFSi0yNTYAAAGJaeVNwE2BBSkbWLwah2G1I_SDOyYzyvRBKXQIawmJvogp-XZtGAc-1aBfn9wEOHcEH5EYMts=
Effective URL: https://www.zscaler.com/blogs/product-insights/briefer-history-zero-trust-major-milestones-rethinking-enterprise-securit...
Submission: On January 19 via manual from US — Scanned from DE

Form analysis 5 forms found in the DOM

POST https://www.zscaler.com/search

<form action="https://www.zscaler.com/search" method="post" id="nav-search-form" accept-charset="UTF-8" role="search" aria-label="sitewide" __bizdiag="1663869817" __biza="WJ__">
  <div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-keyword form-item-keyword form-no-label">
    <input placeholder="Enter search" data-drupal-selector="edit-keyword" type="text" id="edit-keyword" name="keyword" value="" size="60" maxlength="128" class="form-text">
  </div>
  <div class="submit-wrapper"><i class="fa fa-search fg-color-white"></i>
    <input data-drupal-selector="edit-submit" type="submit" id="edit-submit" name="op" value="Submit" class="button button--primary js-form-submit form-submit">
  </div>
  <input autocomplete="off" data-drupal-selector="form-zndoujrii12dy84maygf5wvtvba5xnp1tgvbjo-jhrq" type="hidden" name="form_build_id" value="form-zndoUJRii12dy84mAygf5wvtvBA5xNP1TgvBJO_jhRQ">
  <input data-drupal-selector="edit-nav-search-form" type="hidden" name="form_id" value="nav_search_form">
</form>

<form id="mktoForm_7140" data-formid="7140" class="subscription-form-blog-new  mkto-form-check mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;" __bizdiag="1714217501" __biza="WJ__">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoRound .mktoButton {
      color: #fff;
      border: 1px solid #a3bee2;
      -webkit-border-radius: 5px;
      -moz-border-radius: 5px;
      border-radius: 5px;
      background-color: #779dd5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
      background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
      background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
      background-image: linear-gradient(to bottom, #779dd5, #5186cb);
      padding: 0.4em 1em;
      font-size: 1em;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
      outline: none;
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
      background-color: #5186cb;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
      background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
      background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
      background-image: linear-gradient(to bottom, #5186cb, #779dd5);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 0px;">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="7140"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256">
</form>

<form id="mktoForm_1944" data-formid="1944" class="subscription-form mkto-form-check mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 414px;" __bizdiag="1714217501" __biza="WJ__">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoRound .mktoButton {
      color: #fff;
      border: 1px solid #a3bee2;
      -webkit-border-radius: 5px;
      -moz-border-radius: 5px;
      border-radius: 5px;
      background-color: #779dd5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
      background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
      background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
      background-image: linear-gradient(to bottom, #779dd5, #5186cb);
      padding: 0.4em 1em;
      font-size: 1em;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
      outline: none;
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
      background-color: #5186cb;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
      background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
      background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
      background-image: linear-gradient(to bottom, #5186cb, #779dd5);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 0px;">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="email" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="nurture" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1944"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256">
</form>

<form data-formid="1944" class="subscription-form mkto-form-check mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" __bizdiag="840173383" __biza="WJ__"></form>

<form data-formid="7140" class="subscription-form-blog-new  mkto-form-check mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" __bizdiag="840173383" __biza="WJ__"></form>

Text Content

Skip to main content

This site uses JavaScript to provide a number of functions, to use this site
please enable JavaScript in your browser.

Open Open Open

Search Toggle
 * Careers
 * Blog
 * Partners
 * Risk Assessment
 * Support
 * Contact Us
   * Get in touch
   * 1-408-533-0288
   * Chat with us
 * Sign In
   * admin.zscaler.net
   * admin.zscalerone.net
   * admin.zscalertwo.net
   * admin.zscalerthree.net
   * admin.zscalerbeta.net
   * admin.zscloud.net
   * Zscaler Private Access

 * en
   * fr
   * de
   * it
   * ja
   * es


The world’s largest security platform built for the cloud
 * See The Difference
    * Zero Trust
    * Zscaler Difference
   
    * What is Zero Trust The strategy on which Zscaler was built
    * How Zscaler Delivers Zero Trust A platform that enforces policy based on
      context
    * Zero Trust Resources Learn its principles, benefits, strategies
   
   See how the Zero Trust Exchange can help you leverage cloud, mobility, AI,
   IoT, and OT technologies to become more agile and reduce risk
   
   Learn More
    * Customer Success Stories Hear first-hand transformation stories
    * Analyst Recognition Industry experts weigh in on Zscaler
    * See the Zscaler Cloud in Action Traffic processed, malware blocked, and
      more
    * Experience the Difference Get started with zero trust
   
   See how the Zero Trust Exchange can help you leverage cloud, mobility, AI,
   IoT, and OT technologies to become more agile and reduce risk
   
   Learn More
 * Products & Solutions
    * Overview
    * Industries & Partners
   
    * Secure Your Users Provide users with seamless, secure, reliable access to
      applications and data. Secure Your Workloads Build and run secure cloud
      apps, enable zero trust cloud connectivity, and protect workloads from
      data center to cloud. Secure Your OT and IoT Provide zero trust
      connectivity for OT and IoT devices and secure remote access to OT
      systems.
    * Products Transform your organization with 100% cloud-native services
      * Secure Internet Access (ZIA)
      * Secure Private Access (ZPA)
      * Digital Experience (ZDX)
      * Posture Control
    * Solutions Propel your business with zero trust solutions that secure and
      connect your resources
      * Stop Cyberattacks
      * Protect Data
      * Zero Trust App Access
      * VPN Alternative
      * Accelerate M&A/Divestitures
      * Optimize Digital Experiences
      * Zero Trust SD-WAN
      * Build and Run Secure Cloud Apps
      * Zero Trust Cloud Connectivity
      * Zero Trust for IoT/OT
   
   Make hybrid work possible
   
   Secure work from anywhere, protect data, and deliver the best experience
   possible for users
   
   Get Started
    * Industries Our ecosystem of zero trust partners
      * Zscaler for Public Sector
      * Zscaler for Federal
      * Zscaler for State and Local
      * Zscaler for Education
      * Zscaler for Australian Government
      * Zscaler for China
      * Zscaler for Banking and FS
      * Zscaler for Healthcare
    * Partner Integrations Simplified deployment and management
      * Microsoft
      * CrowdStrike
      * AWS
      * Okta
      * Splunk
      * Aruba
      * Cisco
      * VMware
      * SAP
      * Salesforce
      * ServiceNow
   
   Secure your ServiceNow Deployment
   
   It’s time to protect your ServiceNow data better and respond to security
   incidents quicker
   
   Get Started
 * Platform
    * Platform
    * Technology
   
    * Platform Overview Unified platform for transformation
      * Zero Trust Exchange
      * Zscaler Client Connector
      * Compliance
      * Privacy
    * Capabilities Integrated services, infinitely scalable
      * SSL Inspection
      * Advanced Threat Protection
      * Bandwidth Control
      * Machine Learning Security
      * Security Service Edge
      * Secure Access Service Edge
      * Zero Trust Network Access
   
   Accelerate your transformation
   
   Protect and empower your business by leveraging the platform, process and
   people skills to accelerate your zero trust initiatives
   
   Learn More
    * Technologies Global proxy-based cloud architecture
      * Secure Web Gateway
      * Cloud Firewall
      * Cloud IPS
      * Cloud DLP
      * Cloud Sandbox
      * Cloud Browser Isolation
      * Cloud Configuration Security (CSPM)
      * Cloud Identity and Entitlements (CIEM)
      * Cloud Access Security Broker (CASB)
      * Cloud Native Application Protection Platform (CNAPP)
      * Deception
   
   Gartner Magic Quadrant Leader
   
   Zscaler: A Leader in the Gartner® Magic Quadrant™ for Security Service Edge
   (SSE) New Positioned Highest in the Ability to Execute
   
   Read Report
 * Resources
    * Learn
    * Act
    * Engage
   
    * Content Library Explore topics that will inform your journey
    * Blog Perspectives from technology and transformation leaders
    * Security Assessment Toolkit Analyze your environment to see where you
      could be exposed
    * Webinars and Demos A first-hand look into important topics
    * Executive Insights App Security insights at your fingertips
    * Ransomware ROI Calculator Assess the ROI of ransomware risk reduction
    * Training and Certifications Engaging learning experiences, live training,
      and certifications
    * Customer Success Center Quickly connect to resources to accelerate your
      transformation
    * Customer Success Stories Hear first-hand transformation stories
   
   Customer Success Center
   
   All your Zscaler essentials in one place
   
   Get Started
    * Security & Threat Analytics Threat dashboards, cloud activity, IoT, and
      more
    * Security Advisories News about security events and protections
    * Vulnerability Disclosure Program Webinars, training, demos, and more
    * Trust Portal Zscaler cloud status and advisories
   
   Zero Trust Content Library
   
   Dive into the latest security research and best practices
   
   Get Started
    * The Cloud-First Architect Tools and best practices for the cloud
    * Zenith Community Discuss ideas and issues with peers
    * CXO REvolutionaries Events, insights, and resources for CXOs
    * Cloud Security Alliance Securing the cloud through best practices
    * Events Upcoming opportunities to meet with Zscaler
   
   Zero Trust Content Library
   
   Dive into the latest security research and best practices
   
   Get Started
 * Company
    * About
    * Media
    * Partners
   
    * About Zscaler How it began, where it’s going
    * Leadership Meet our management team
    * Investor Relations News, stock information, and quarterly reports
    * Compliance Our adherence to rigorous standards
    * ESG Our Environmental, Social, and Governance approach
    * Events Upcoming opportunities to meet with Zscaler
   
   Zscaler Careers
   
   Join a recognized leader in Zero trust to help organization transform
   securely
   
   Apply Now
    * Media Center News, blogs, events, photos, logos, and other brand assets
    * News and Press Zscaler in the news
   
   Zscaler Careers
   
   Join a recognized leader in Zero trust to help organization transform
   securely
   
   Apply Now
    * Partner Portal Tools and resources for Zscaler partners
    * Summit Partner Program Collaborating to ensure customer success
    * System Integrators Helping joint customers become cloud-first companies
    * Service Providers Delivering an integrated platform of services
    * Technology Deep integrations simplify cloud migration
    * Partner Inquiry Become a Zscaler partner
   
   Zscaler Careers
   
   Join a recognized leader in Zero trust to help organization transform
   securely
   
   Apply Now
 *  * Request a demo

 * Request a demo

ZSCALER CLOUD PLATFORM

May 25, 2022


A BRIEF(ER) HISTORY OF ZERO TRUST: MAJOR MILESTONES IN RETHINKING ENTERPRISE
SECURITY




WHY TELL THE STORY OF ZERO TRUST?

Many in IT security believe zero trust is a game-changer, a fundamental rethink
about enterprise security and protection of the networks and resources that
house our best ideas, connect our brightest talent, and grant access to
transformative productivity tools. 

But to understand how truly revolutionary the zero trust model is in
cybersecurity, it’s necessary to understand how the idea of zero trust
architecture evolved into one that fundamentally overhauls decades-old
thinking. 

What follows is a brief history of some of the key moments in the making of the
zero trust movement.

Key moments in the history of zero trust

1987 – Engineers from the Digital Equipment Corporation (DEC) publish the first
paper on firewall technology, ushering in decades of "castle-and-moat" network
security thinking

2001 – IEEE Standards Association publishes the 802.1X protocol for network
access control (NAC

2004 – The Jericho forum is chartered, introducing the principle
of de-perimeterization

2007 - The Defense Information Systems Agency (DISA) publishes its "black core"
model for a software-defined perimeter, which struggled to gain traction. 

2009 – Google's BeyondCorp is founded to reimagine security architecture in the
wake of Operation Aurora

2010 – Analyst John Kindervag coins the term "zero trust" in a paper for the
Forrester Research Group

2013 - The Cloud Security Alliance's software-defined perimeter, dependent on
SPA, flounders due to tech limitations; The Jericho Forum declares
de-perimeterization a “fact” and disbands

2017 – Continuous Adaptive Risk and Trust Assessment (CARTA) is designed as a
risk management framework by Gartner

2019 – Gartner introduces the concept of the secure access service edge (SASE)

2020 – NIST publishes SP 800-207 as a unified framework for establishing zero
trust architecture (ZTA)

2021 – Gartner specifies the security components of SASE are a new market
category, known as the secure service edge (SSE)

2022 – The U.S. Government's Office of Management and Budget mandates the
adoption of zero trust principles for all agencies by 2024


 


802.1X AND NETWORK ACCESS CONTROL

The 802.1X protocol was released in 2001 as a standard regulating network access
control (NAC) for wireless devices. The increasing adoption of these wireless
devices was complicating notions of a strictly defined corporate perimeter, and
organizations were feeling a need to address their growing use.

The 802.1X supplicant, or client, was meant to allow networks to authenticate an
endpoint before allowing a connection. Unfortunately, not all devices were
802.1X-capable. Printers, IoT systems, and other connected devices prevented
this method from serving as a universal solution to the problem of unauthorized
network access. 

 


THE JERICHO FORUM IMAGINES A BOLD WAY FORWARD

In 2003, a group of European technology leaders recognized the problems inherent
to castle-and-moat network architecture and began discussing ways to bring down
the network walls.  

They convened a working group in 2004 known as The Jericho Forum, which
introduced the idea of “de-perimeterization” and gave the world a set of
"commandments" that laid the groundwork for best practices for governing
perimeter-less networks.

 


MORE THAN A BUZZWORD: ENTER “ZERO TRUST”

In 2010, Forrester analyst John Kindervag published a paper titled “No More
Chewy Centers: Introducing The Zero Trust Model Of Information Security." More
than a buzzword, it gave the IT security industry something to latch onto when
architecting a new model for connectivity.

The premise was that presence on a network was not a sufficient basis for
granting trust. Identity – and the ability to verify it – replaced the perimeter
as the core criterion for access. Alas, up to this point, nothing fundamental
had shifted in the enterprise environment itself. Networks were still an
all-or-nothing, inside-or-out construct.

 


BEYOND (THE PERIMETER) CORP

As is so often the case in cybersecurity, threat actors drove the next evolution
in network security. China’s People’s Liberation Army conducted a major
operation against U.S. tech companies including Akamai, Adobe, and Juniper
Networks – and Google responded with  BeyondCorp. 

The intent, according to Google, was “shifting access controls from the network
perimeter to individual users…[enabling] secure work from virtually any location
without the need for a traditional VPN.” Zero trust, in its purest sense of
disregard for the on/off-network distinction, had arrived. 

But Google was seeking to address a difficult problem, and despite trying to
“pave the path for other organizations to realize their own implementation of a
zero trust network,” it was still a strategy beyond the capabilities of most
enterprises in 2010.

 


“THE MAN” WEIGHS IN ON ZERO TRUST

In 2020, the National Institute for Standards and Technology (NIST) reframed the
conversation with its NIST 800-207 standard for zero trust architecture. 

This new cybersecurity paradigm was focused on resource protection and the
premise that trust should never be granted implicitly, but must continuously be
evaluated. The shackles of the perimeter and the notion of the virtual private
network were discarded. 

Its essentials are key to understanding how zero trust operates, and why it’s a
departure from the approaches that came before it. The 800-207 standard
stipulates key tenets and assumptions for zero trust. Three of the most critical
points (from a much longer list) are:

 1. No resource is inherently trusted.
 2. All communication is secured regardless of network location.
 3. All resource authentication and authorization are dynamic and strictly
    enforced before access is allowed.

If this was a paradigm shift in terms of thinking about zero trust, the
revolution in terms of advancement came with the U.S. Office of Management and
Budget (OMB) M-22-09 directive, issued in 2022. Suddenly, zero trust became the
law of the land, at least where U.S. federal agencies were concerned. 

But the implications were broader. With executive endorsement – almost certainly
bearing in mind a high-profile 2021 supply chain attack that compromised federal
agencies including State, Treasury, Homeland Security, Commerce, and Energy –
the zero trust methodology had the weight of the American government behind it.

 


FURTHER REFINING ZERO TRUST

The U.S. government’s endorsement of zero trust principles didn’t mark the end
of advancement for this model. Zscaler's approach to zero trust architecture
aligns closely with NIST's ZTA framework and Gartner's definition for SSE. And
it goes beyond these standards, with three fundamental advancements in zero
trust thinking:

 1. All traffic is zero trust traffic
 2. Identity and context always come before connectivity
 3. Applications - and even app environments - should remain invisible to
    unauthorized users

To learn more about this modern approach to zero trust, including how Zscaler is
driving the next milestones in rethinking enterprise security, read the full
white paper “A brief history of zero trust: Major milestones in rethinking
enterprise security.”

You can also catch a recording of my LinkedIn Live presentation on the topic
with Greg Simpson.

 * Product Insights
 * Zscaler Cloud Platform

 * 
 * 
 * 
 * 
 * 


AUTHOR


LISA LORENZIN


RECOMMENDED FOR YOU

LEVERAGING ZSCALER FOR YOUR NEXT IT M&A INTEGRATION

ZERO TRUST IS HERE TO STAY. IS YOUR ORGANIZATION READY?

HERE COMES THE HYBRID OFFICE—AND IT’S GOING TO BE A NIGHTMARE FOR IT LEADERS

ZERO TRUST SUCCESS STORIES FROM SMALL AND MEDIUM-SIZED ORGANIZATIONS


GET THE LATEST ZSCALER BLOG UPDATES IN YOUR INBOX

*












Subscribe
Subscription confirmed. More of the latest from Zscaler, coming your way soon!

By submitting the form, you are agreeing to our privacy policy.

 * Platforms & Products
   * Zero Trust Exchange
   * Zscaler Client Connector
   * Zscaler Internet Access
   * Zscaler Private Access
   * Zscaler B2B
   * Zscaler Cloud Protection
   * Zscaler Digital Experience
 * Solutions
   * Secure Work-from-Anywhere
   * Modern Workplace Enablement
   * Security Transformation
 * Technologies & Capabilities
   * Secure Access Service Edge
   * Zero Trust Network Access
   * Secure Web Gateways
   * Cloud Firewall
   * Cloud Sandbox
   * Cloud IPS
   * Cloud DLP
   * Cloud Browser Isolation
 * Technologies & Capabilities
   * Cloud Identity and Entitlements
   * CASB
   * SSL Inspection
   * Advanced Threat Protection
   * Bandwidth Control
   * Machine Learning Security
 * Popular Links
   * Careers
   * About Zscaler
   * Leadership
   * Content Library
   * News and Press Releases
   * Media Kit
   * CXO REvolutionaries
   * Zenith Community
 * Information
   * Zpedia
   * Plans and Pricing
   * Virtual Briefing Center
   * Zscaler FAQs
   * Contact Us

*












Subscribe
Thanks for subscribing
 * 
 * 
 * 
 * 

 * Sitemap
 * Privacy
 * Legal
 * Security

©2023 Zscaler, Inc. All rights reserved. ZscalerTM and Zero Trust ExchangeTM are
either (i) registered trademarks or service marks or (ii) trademarks or service
marks of Zscaler, Inc. in the United States and/or other countries. Any other
trademarks are the properties of their respective owners.

Zscaler uses cookies to personalize content and ads, to provide social media
features and to analyze our traffic. We also share information about your use of
our site with our social media, advertising and analytics partners.Please review
our Cookies Policy for more information.

Cookies Settings Accept Cookies