Take the Zero Trust Assessment
The Zero Trust security model assumes breach and treats each access request as though it originated from an uncontrolled network.

Take the Zero Trust Assessment and see where you are in your journey

Take the assessment

Fill out the form below

* required fields

The Zero Trust security model assumes breach and treats each access request as though it originated from an uncontrolled network. It adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they are located.

Different organizational requirements, existing technology implementations, and security stages all affect how a Zero Trust security model implementation is planned and executed. The Zero Trust Assessment tool will help you determine where you are in your journey across your identities, devices, apps, infrastructure, network and data, and will tell you which maturity stage you are at (Traditional, Advanced, or Optimal).  The assessment will provide recommendations on how to progress to the next stage.    

https://www.microsoft.com/en-us/security/business/zero-trust/maturity-model-assessment-tool
Take the assessment