What is Zero Trust?

Forrester Research created the concept of Zero Trust. This began centered around protecting networks and underlying architecture. Microsoft and others have expanded the concept to include the following architectural components to protect: Applications, Data, Endpoints, Identities, Infrastructure, Network, Policy Optimization, Policy Enforcement, and Threat Protection.

"Is NIST adopting Zero Trust?"
Thomas Davies
Cyber Security Expert

NIST Zero Trust Architecture

“Is NIST adopting Zero Trust?” – NIST is working with Microsoft, The Open Group, CISA, and others to unify a Zero Trust approach security model. Click the link below to download the NIST white paper on Zero Trust Architecture.

What are the THREE MAIN CONCEPTS of Zero Trust?

  • Verify Explicitly
  • Least Privileged Access
  • Assume Breach
Read the Microsoft Zero Trust Adoption report to gain more insight into the main concepts associated with a Zero Trust journey and digital empathy.

What is the GOAL of ZERO TrUST?

The goal of Zero Trust deployments are to secure all threat vectors related to the new hybrid workspace that has emerged as a result of the shift in work due to the COVID-19 pandemic.

How to implement ZERO Trust?

JADEX believes that applying Zero Trust to your entire digital landscape is only possible through the use of Microsoft technologies and services.  Implementing Zero Trust will require a comprehensive plan with foresight and vision. First, you must prioritize milestones and assets.


It doesn't matter where you are on your Zero Trust Journey. Every step on a Zero Trust Journey will reduce risk!

“We transform how people work.”

Company Details


Codes & Certs