Traditional zero trust stops at the door.
ZTNA, SSE, and SWG products verify who gets through the gate, but they have limited visibility into what authenticated users do inside web applications once access is granted. A trusted user on a malicious or compromised page is invisible to most access controls.
The browser is where authenticated sessions meet live web content. That intersection is where social engineering, data exfiltration, and credential theft actually occur.