infographic
A new report which surveyed
more than 400 cybersecurity
decision makers has revealed
that 47% of cybersecurity
professionals lack confidence
applying a Zero Trust model to
their Secure Access architecture.
72% OF ORGANISATIONS
PLAN TO IMPLEMENT ZERO
TRUST CAPABILITIES THIS YEAR
As 72% of organisations plan to
implement Zero Trust capabilities
in 2020 to mitigate growing
cyber-risk, nearly half (47%) of
cybersecurity professionals lack
confidence applying a Zero Trust
model to their Secure Access
architecture, according to the
2020 Zero Trust Progress Report
released by Cybersecurity Insiders
and Pulse Secure, a leading
provider of software-defined
Secure Access solutions.
The report surveyed more than
400 cybersecurity decision makers
to share how enterprises are
implementing Zero Trust security
in their organisation and reveal key
drivers, adoption, technologies,
investments and benefits. The
report found that Zero Trust access
is moving beyond concept to
implementation in 2020, but there is
a striking confidence divide among
cybersecurity professionals in
applying Zero Trust principles.
“Zero Trust holds the promise of
vastly enhanced usability, data
protection and governance. However,
there is a healthy degree of confusion
among cybersecurity professionals
about where and how to implement
Zero Trust controls in a hybrid IT
environment – which is clearly reflected
in respondents’ split confidence levels,”
said Scott Gordon, Chief Marketing
Officer at Pulse Secure.
Of the organisations building out
Zero Trust capabilities in 2020, data
protection, trust earned through
entity verification and continuous
authentication and authorisation were
cited as the most compelling tenets of
Zero Trust. The report also discovered
nearly one-third of organisations
(30%) are seeking to simplify Secure
Access delivery, including enhancing
user experience and optimising
administration and provisioning.
Additionally, 53% of respondents plan
to move Zero Trust access capabilities
to a hybrid IT deployment.
More than 40% of survey respondents
expressed that vulnerable mobile and atrisk
devices, insecure partner
access, cyberattacks, over privileged
22 Issue 24 | www.intelligentciso.com