Zero trust is a security model that focuses on the security of individual transactions. Legacy security models employ perimeter-based security models with implicit trust based on network location and the use of a static defense over a large network segment. Employing zero trust security is not something you can buy, but a set of principles to follow.
A zero trust approach has become necessary because of the way people, applications, and devices interact with each other. In the 90s, people had to go into the office and log into their computer to access applications and data. Today, people work in distributed environments with multiple devices and varying locations with almost ubiquitous access to data. By employing zero trust principals and evaluating trust on a per-transaction basis, organizations can more effectively protect their data against the most sophisticated and hardest to detect threats.