The Forrester Wave™️: Zero Trust eXtended (ZTX) Ecosystem Platform Providers,Q3 2020 | Download your copy now | Read to find out which vendor’s system makes granular authorization easy and helps make encryption more achievable at scale.

Ionic Security Named in Forrester Wave™ Report on Zero Trust eXtended Ecosystem (ZTX) Providers

Report Reprint


“The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020” report evaluates the current offering, strategy and market presence of 15 vendors selected based on specific inclusion criteria.

Dr. Chase Cunningham, Forrester Research principal analyst and author of the report, writes in it that Ionic has “significant chops for those seeking to enable Zero Trust for developers, contractors, and third parties. The vendor’s system makes granular authorization easy and helps make encryption more achievable at scale.”

Orchestrating the definition and enforcement of policy from a central layer enables automated responses to threats, business drivers, and regulations. NIST SP 800-207 on “Zero Trust Architecture” discusses authorization as a method of reducing implicit trust, and with Machina, authorization is controlled through a patented key release process — even if encryption is not applied — which binds policy to resources, including when they travel beyond network boundaries. Exfiltrated data secured with Machina is of zero use to anyone else.

Data is the central pillar of the Zero Trust eXtended ecosystem framework, and MachinaTM earned the highest marks possible in the criteria of data security and APIs. Start securing what you value with Machina, the developer-first authorization platform of choice.

Learn more about using Machina to prepare, implement, and maintain your ZTX security strategy.

Zero Trust eXtended (ZTX) ecosystem diagram | Four circles on the outside of the diagram are labeled, 'People', 'Workloads', 'Networks', and 'Devices'. Two big rings connect the four circles, labeled 'Automation and Orchestration' and 'Visibility and Analytics'. In the center, touching each of the four circles is a hexagon labeled, 'Data'.
Download