This document discusses moving beyond traditional perimeter-based security models to a zero trust security model. It notes that the traditional idea of a well-defined corporate network perimeter is outdated given today's distributed cloud environments and mobile workforce. The document advocates adopting a zero trust approach where no entity inside or outside the network is implicitly trusted, and all access must be verified. It presents Akamai's adaptive access and threat protection solution as an option to implement zero trust security by moving controls to the edge of the network.