There is no such thing as a “magic bullet” for realizing a ZTA, but that has not stopped cybersecurity vendors from trying to sell themselves as such.