In the new digital era, a company’s infrastructure involves every device that touches your environment. That would basically include managed and unmanaged devices, whether it be, devices on a network or in the cloud, often defined as end-user devices such as mobile devices, laptops, tablets, desktop PCs, servers, fixed function, IoT, IIoT, or OT systems.
In the ZeroTrust Security model you must evaluate and assess every device, to ensure its trustworthiness and authenticity, approve access, and then isolate, secure, and always control every device touching the network on a continuous basis.