The combination of zero trust (ZT), secure access service edge (SASE), and microsegmentation is fairly complex but can deliver real added value to companies’ cyber security. PAC expects high market demand for the whole package within the next two years as security threats are increasing and the number of cyber attacks is growing. This Expert View looks at all the different security models, explaining why the combination is a good fit, in what order it should be implemented, and how to select suitable vendors.
SHARE :
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : October 07, 2025
This Excel document delivers market figures broken down by products and services. Figures cover a seven-year time frame (results from the past two ...
Event Date : January 22, 2026
To provide guidance against a highly dynamic IT landscape, PAC conducted the 2024/25 edition of its annual SITSI® CxO Investment Priorities Survey, ...
Event Date : March 07, 2025
This document provides market volumes, growth rates and forecasts for the Public and Hosted Private Cloud in Austria for the 2024-2030 period.
Event Date : January 21, 2026
The objective of this report is to provide a comprehensive overview of average daily rates in the UK IT services market, their development, and ...
Event Date : February 13, 2023
How to Attract Developers to the Network API Opportunity – InBrief Analysis
Market Reports January 29, 2026
Wipro - Figures - Switzerland - FY 31-Mar-2025
Datamart January 29, 2026
Retail & Wholesale - InBrief Analysis - Belgium
Market Reports January 29, 2026
Wipro – Vendor Profile – Switzerland
Vendor Profile January 29, 2026
Wipro - Figures - UK - FY 31-Mar-2025
Datamart January 29, 2026
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Blog Post January 29, 2026
Identity & Access Management as an Enabler of Digital Transformation
Blog Post January 27, 2026
Leaders in SAP Services 2026: PAC Launches Its New RADAR Series
Press Releases January 20, 2026
Part 8: The Future of Infrastructure Security: What's Next After Integration?
Blog Post January 20, 2026
Part 7: Bringing It All Together: Developing a Unified Infrastructure Security Strategy
Blog Post January 12, 2026