Intelligent CIO Europe Issue 28 | Page 30

INFOGRAPHIC 72% of organisations plan to implement Zero Trust capabilities this year A s 72% of organisations plan to implement Zero Trust capabilities in 2020 to mitigate growing cyber- risk, nearly half (47%) of cybersecurity professionals lack confidence applying a Zero Trust model to their Secure Access architecture, according to the 2020 Zero Trust Progress Report released by Cybersecurity Insiders and Pulse Secure, a leading provider of software-defined Secure Access solutions. The report surveyed more than 400 cybersecurity decision makers to share how enterprises are implementing Zero Trust security in their organisation and reveal key drivers, adoption, technologies, investments and benefits. The report found that Zero Trust access is moving beyond 30 INTELLIGENTCIO concept to implementation in 2020, but there is a striking confidence divide among cybersecurity professionals in applying Zero Trust principles. “Zero Trust holds the promise of vastly enhanced usability, data protection and governance. However, there is a healthy degree of confusion among cybersecurity professionals about where and how to implement Zero Trust controls in a hybrid IT environment – which is clearly reflected in respondents’ split confidence levels,” said Scott Gordon, Chief Marketing Officer at Pulse Secure. Of the organisations building out Zero Trust capabilities in 2020, data protection, trust earned through entity verification and continuous authentication and authorisation were cited as the most compelling tenets of Zero Trust. The report also discovered nearly one-third of organisations (30%) are seeking to simplify Secure Access delivery, including enhancing user experience and optimising administration and provisioning. Additionally, 53% of respondents plan to move Zero Trust access capabilities to a hybrid IT deployment. More than 40% of survey respondents expressed that vulnerable mobile and at-risk devices, insecure partner access, cyberattacks, over privileged employees and shadow IT risks are top challenges to secure access to applications and resources. While 45% are concerned with public cloud application access security and 43% www.intelligentcio.com