Zero Trust Architecture requires proper authentication and authorization for each access request in the digital domain.  Access management tools must serve ever more complex environments ranging from contemporary cloud hosted applications as well as legacy on-premises applications that do not conform to current access control standards in order to meet strategic Zero Trust initiatives.