A Zero Trust strategy is appealing for an IT security team battling against a rising tide of attacks .
model . In that type of environment , access is granted via hardware gateways . More challenges mean more hardware stacks housed close to users , applications and data processing .
Significant changes to how trust is handled weren ’ t possible because infrastructure couldn ’ t scale to support it . More than a decade later , the cloud makes Zero Trust practical in the form of a Zero Trust Architecture ( ZTA ).
In a world where remote working has become a widespread trend , IT resources are located in a range of different places and cybercriminals are mounting more sophisticated attacks than ever , the case for Zero Trust has never been more compelling . Taking time to put a strategy in place is one of the most effective security measures an organisation can take . u trust to ‘ zero ’ significantly lowers the risk of a cyberattack .
Yet , despite its clear advantages , the concept of Zero Trust was ahead of its time and commercial adoption was very slow . Zero Trust clashed with a damning indictment of legacy network security models back then . While Forrester Research introduced the new Zero Trust information security model in 2010 , it wasn ’ t until 2020 that a Microsoft survey found that 94 % of respondents had embarked on a Zero Trust strategy .
After all , security based on machine identification and network access could still protect an enterprise . However , it became increasingly clear over the decade that legacy security architectures could not be readily scaled or easily re-engineered to accommodate a dynamic , follow-the-data security