What is Zero Trust?
Forrester Research created the concept of a Zero Trust Architecture (ZTA). This began centered around protecting networks and underlying architecture. Microsoft and others have expanded the concept to include the following components to protect: Applications, Data, Endpoints, Identities, Infrastructure, Network, Policy Optimization, Policy Enforcement, and Threat Protection.
Is NIST adopting Zero Trust?
NIST is working with Microsoft, The Open Group, CISA, and others to unify a ZTA security model. Click the link below to download the NIST white paper on ZTA.
What are the THREE MAIN CONCEPTS of Zero Trust?
- Verify Explicitly
- Least Privileged Access
- Assume Breach
What is the GOAL of ZERO TrUST?
The goal of ZTA deployments are to secure all threat vectors related to the new hybrid workspace that has emerged as a result of the shift in work due to the COVID-19 pandemic.

How to implement ZERO Trust?
JADEX believes that applying a ZTA to your entire digital landscape is only possible through the use of Microsoft technologies and services. Implementing a ZTA will require a comprehensive plan with foresight and vision. First, you must prioritize milestones and assets.
START YOUR JOUNEY
It doesn't matter where you are on your journey. Every step forward will reduce risk!
Company Details
- DUNS Number: 078570307
- CAGE Code: 6TX26
- NAICS Codes: 541690, 541990, 541611, 54618, 611420, 541370, 541519
Contact
- HQS - Spring Lake, MI
- Phone: 1 (833) 568-3925
- Email: info@jadexstrategic.com
Codes & Certs
- VOSB - self-certified
- SBA 8(a) - pending
Services
- Microsoft 365 Solutions
- Assessments
- Security
- Training