Zero trust architectures must cover both users and applications, and extend from the core network to the edge, all while giving all users an equal experience.