Four requirements for a zero trust branch
Effectively navigate the complex and ever-changing demands of security and network connectivity


Traditional branch network architectures rely on implicit trust. This expands the attack surface to the furthest branch location and subsequently allows cyberthreats to move laterally throughout the organization.
By adopting a zero trust approach at the branch, enterprises can fortify their networks against threats and streamline connectivity for users, IoT/OT devices, and applications across diverse locations.
Download this eBook which outlines the four requirements for architecting a zero trust branch:
- Ensuring zero trust principles for your network
- Securing IoT/OT devices in your branch locations
- Supporting direct-to-cloud paths for SaaS/Internet traffic
- Enabling consistent user experience for in-office and remote employees.
Provided by Zscaler
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Cloudflare is cracking down on AI web scrapers
News Cloudflare CEO Matthew Prince said AI companies have been "scraping content without limits" - now the company is cracking down.
-
Swiss government data published following supply chain attack – here’s what we know about the culprits
News Radix, a non-profit organization in the health promotion sector, supplies a number of federal offices, whose data has apparently been accessed.
-
A sneaky cyber espionage campaign is exploiting IoT devices and home office routers – here's what you need to know
News Researchers at SecurityScorecard have issued a warning about a new China-linked threat campaign, dubbed 'LapDogs', targeting IoT devices and home routers.
-
Research shows the financial benefits of implementing zero trust
News With zero trust shown to drastically reduce the number of cyber incidents, insurers are catching on and lowering premiums
-
Microsoft ramps up zero trust capabilities amid agentic AI push
News The move from Microsoft looks to bolster agent security and prevent misuse
-
Edge devices are now your weakest link: VPNs, firewalls, and routers were the leading source of initial compromise in 30% of incidents last year – here’s why
News Compromised network edge devices have rapidly emerged as one of the biggest attack points for small and medium businesses.
-
Zero trust gains momentum amid growing network visibility challenges
News Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.