$ 0 0 Watch this video to see what happens when a threat attacks a Zero Trust environment compared to a perimeter-based one.