The explosion of mobile and cloud technologies has dissolved the traditional perimeter. People – and their identities – are now the single control point across users, devices, and networks. Identity is the foundation of a Zero Trust strategy, ensuring only the right people have access to the right resources. Zero Trust has been a hot topic for some time now, and many say it’s even starting to enter buzzword territory. But when putting it into practice: Is it actually achievable? Are organizations explicitly going down a Zero Trust path? What technologies are being implemented during Zero Trust journeys? And what steps are they taking to implement a Zero Trust architecture?