Zero Trust Architectures for Securing Enterprise Networks: A Comparative Analysis
Abstract
Zero Trust Architecture (ZTA) represents a paradigm shift from traditional perimeter-based security models to a more granular, identity-centric approach to securing enterprise networks. This research paper provides a comparative analysis of various Zero Trust models, focusing on their effectiveness in securing enterprise networks against sophisticated cyber threats. The study evaluates key components such as identity and access management, network segmentation, and continuous monitoring while comparing frameworks from industry leaders like Google, Microsoft, and Cisco. The paper also discusses the challenges in deploying Zero Trust Architectures and offers recommendations for enterprises considering a transition to a Zero Trust model.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 MZ Computing Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.