Enterprise Zero Trust Networking Strategies:
Secure Remote Access and Network Segmentation


The Zero Trust security model requires network access requests to be authenticated and authorized via strict and dynamic polices and controls, whether a user or device is connecting from outside or inside the network security perimeter. While information security drives Zero Trust initiatives, network engineering and operations teams own much of the technology involved. Network teams are essential players.

Leading IT research firm Enterprise Management Associates (EMA) surveyed 252 North American and European IT and security professionals about how they use network segmentation, microsegmentation, and secure remote access solutions to build Zero Trust networks. This webinar will highlight the essential findings of this new research and explore how networking technologies are essential to a Zero Trust initiative.  

Join EMA Vice President of Research Shamus McGillicuddy for an informative event. You will learn: 

  • Best practices for using Zero Trust network segmentation and remote network access solutions
  • Zero trust collaboration strategies for network teams and security teams
  • Emerging Zero Trust network technology requirements
  • Impacts of the COVID-19 pandemic on Zero Trust initiatives


By registering for this event, I agree to be contacted by EMA and EMA Research sponsors (Elisity, Ordr, Pulse Secure). I may unsubscribe at any time. Read EMA's Site Terms and Conditions.



Shamus McGillicuddy
VP of Research, EMA