Zero Trust Architectures for Securing Enterprise Networks: A Comparative Analysis

Authors

  • Mahmoud Khalil Department of Computer Engineering, Alexandria University, Egypt

Abstract

Zero Trust Architecture (ZTA) represents a paradigm shift from traditional perimeter-based security models to a more granular, identity-centric approach to securing enterprise networks. This research paper provides a comparative analysis of various Zero Trust models, focusing on their effectiveness in securing enterprise networks against sophisticated cyber threats. The study evaluates key components such as identity and access management, network segmentation, and continuous monitoring while comparing frameworks from industry leaders like Google, Microsoft, and Cisco. The paper also discusses the challenges in deploying Zero Trust Architectures and offers recommendations for enterprises considering a transition to a Zero Trust model.

Downloads

Published

2021-05-13

How to Cite

Khalil, M. (2021). Zero Trust Architectures for Securing Enterprise Networks: A Comparative Analysis. MZ Computing Journal, 2(1). Retrieved from http://mzresearch.com/index.php/MZCJ/article/view/297