BIG DATA ZERO-TRUST MODEL: Network security needs big data. As the inadequacies of perimeter-centric defenses become clearer, the zero-trust model grows more appealing. As for ZTM, it will need big data to succeed. This aggressive approach to network security monitors