{"id":118926,"date":"2020-09-24T10:15:00","date_gmt":"2020-09-24T17:15:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=118926"},"modified":"2020-09-24T09:59:47","modified_gmt":"2020-09-24T16:59:47","slug":"forrester-ztx-wave-2020","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/09\/forrester-ztx-wave-2020\/","title":{"rendered":"Palo Alto Networks Is a Forrester ZTX Wave Leader"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Zero Trust has always been inherently aligned to our goal of helping customers reduce risk. When applying Zero Trust principles, you cannot trust or make assumptions about what happens before or after each hop in the infrastructure. Every device, application and microservice must be responsible for its own security. With each step, you need to validate, authenticate and apply threat prevention capabilities across all locations. Our commitment to Zero Trust means we see the Forrester ZTX Wave as an important milestone each time it is released.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks was created to counteract the industry habit of introducing a new or separate product for each individual problem. We do this by innovating and consolidating functions to create a platform that customers can use to solve more and more of their cybersecurity challenges. The value of this vision? Fewer devices, systems and alerts, as well as better coordination for visibility and response. This approach extends to our practice of enabling <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/zero-trust\"><span style=\"font-weight: 400;\">Zero Trust<\/span><\/a><span style=\"font-weight: 400;\"> for our customers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We work to deliver solutions that address <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/network-end-to-end-zero-trust\/\"><span style=\"font-weight: 400;\">Zero Trust end-to-end<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/zero-trust-throughout-your-infrastructure\/\"><span style=\"font-weight: 400;\">spanning the infrastructure<\/span><\/a><span style=\"font-weight: 400;\"> and providing the capabilities necessary to secure all users, applications, data and devices with comprehensive context at all times, across all locations. This includes building products that are easy to use, going beyond integration and developing enhanced capabilities that provide the strongest offering; automating as much as possible; and partnering with our customers in implementation to ensure success in their <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/network-zero-trust-learning-curve\/\"><span style=\"font-weight: 400;\">Zero Trust journeys<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As part of our own Zero Trust journey as a Zero Trust provider, I am happy to share that Palo Alto Networks has been named a leader in The <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/2020-forrester-ztx-report?utm_source=social&amp;utm_medium=blog&amp;utm_campaign=FY21Q1%20Forrester%20Zero%20Trust%20eXtended%20Wave%20report\"><span style=\"font-weight: 400;\">Forrester Wave&#x2122;: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020<\/span><\/a><span style=\"font-weight: 400;\">. The Forrester ZTX Wave evaluated 15 vendors and scored them in the categories of current offering, strategy and market presence. As Forrester states in their recent report, \u201cPalo Alto Networks has a complete toolkit for Zero Trust,\u201d and we couldn\u2019t have said it better ourselves.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information, read the full <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/2020-forrester-ztx-report?utm_source=social&amp;utm_medium=blog&amp;utm_campaign=FY21Q1%20Forrester%20Zero%20Trust%20eXtended%20Wave%20report\"><span style=\"font-weight: 400;\">Forrester ZTX Wave<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\"  class=\"alignleft size-full wp-image-118927 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/09\/ZeroTust_blog.gif\" alt=\"The image expresses the idea that Zero Trust applies throughout your infrastructure, including for Endpoints, ZTNA, PaaS, etc. \" width=\"800\" height=\"615\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re honored to be a Leader in The Forrester ZTX Wave&#x2122;, which we believe highlights our commitment to enabling an end-to-end Zero Trust strategy.<\/p>\n","protected":false},"author":3,"featured_media":118990,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768,6765,6770],"tags":[6662,73],"coauthors":[1641],"class_list":["post-118926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","category-secure-the-enterprise","category-secure-the-future","tag-the-forrester-wave-zero-trust-extended-ztx-ecosystem-providers","tag-zero-trust","net_sec_category-zero-trust-security"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/09\/PAN_2020_Forrester_Zero-Trust_Social_blog-400x300-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=118926"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118926\/revisions"}],"predecessor-version":[{"id":118940,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/118926\/revisions\/118940"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/118990"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=118926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=118926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=118926"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=118926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}