skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


At this year's edition of the RSA Conference, held in San Francisco March 4‒7, 2019, the "zero trust" approach to security was more visible than ever. Ovum highlights three areas of technology that embody zero trust, namely privileged access management (PAM), software-defined perimeter (SDP), and micro-segmentation.


  • Zero trust is a phrase originally coined by an analyst in 2010 to describe what he perceived as a new, more restrictive approach to security. It had evolved in response to an ever more active, complex, and dangerous threat landscape in which breaches were becoming more likely and more numerous, a trend which has only intensified in the years since.

Features and Benefits

  • Describes why and how zero trust has evolved.
  • Explains where zero trust is appearing now.

Key questions answered

  • What is SDP and how can it replace VPN?
  • What is PAM?

Table of contents

Ovum view

  • Summary
  • Zero trust is a response to a burgeoning threat landscape
  • PAM's least privilege is a zero trust approach
  • SDP takes zero trust in remote access
  • Micro-segmentation is zero trust applied to workloads


  • Author

Recommended Articles


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316

Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now