A zero trust network is exactly what it sounds like. The network trusts no one and no machine, demanding that everyone on the network be authenticated, authorized, and continuously validated. Prior to zero trust networks, IT environments didn’t need to authenticate every single interaction within their network. But things have changed. Imagine a small office with a single security guard. He checks IDs at the door but sometimes waves through people he recognizes.