Zero trust acknowledges there is no longer a traditional network perimeter to be defended because applications now exist in the cloud and users can log into the network from any location. Basically, the network edge extends to each user, and security is achieved by authenticating users’ identities. To secure the network edge under this new paradigm, school districts need better visibility and control of who’s using the network and what resources they have permission to access. Here’s what to look for in an authentication solution.