- The majority of Fortinet survey respondents I already have a zero trust And / or implementation or development of ZTNA strategy
- More than half of the respondents are unable to continuously authenticate users and devices, struggling to monitor users after authentication.
- Over 80% found it difficult to implement a zero trust strategy across their extended network.
For the past two years, Zero Trust has been a cybersecurity buzzword. Given the concerns that have arisen from remote working and speed businesses due to pandemics, many organizations have seen Zero Trust as an answer to better understand who has accurate access to company data and workloads. rice field.
Most technical professionals and executives Zero trust security model. In fact, Gartner says that by 2022 80% of new digital business applications will be accessed via Zero Trust Network Access (ZTNA) and 60% of enterprises will phase out remote access virtual private networks by 2023. I am reporting.
The concept of zero trust is simple. This assumes that no one or anything else accessing the network is trusted. Nothing can be trusted anywhere, outside or inside a network boundary.
Interestingly new Survey from Fortinet Many organizations have a vision of zero trust, but have shown that that vision is not necessarily transformed into an deployable solution. Simply put, companies are still giving trust, and giving too much trust can have disastrous consequences.
Studies show that organizations recognize the benefits of the Zero Trust security model, and the majority of survey respondents report that the Zero Trust and / or ZTNA strategy has already been implemented or developed. And 40% report that their strategy is fully implemented.
At the same time, more than half of the respondents do not have the ability to continuously authenticate users and devices, making it difficult to monitor users after authentication. These features are an important belief in the Zero Trust philosophy, and I wonder what kind of Zero Trust implementation these organizations actually do.
Survey respondents may feel that they have implemented Zero Trust, but have not. Or perhaps their deployment is incomplete. In any case, there are concerns about the resulting lack of security.
80% of respondents Extended network It wasn’t easy. Most of them (60%) reported it was moderate or very difficult, and another 21% said it was very difficult.
Survey respondents almost universally acknowledge that it is essential to integrate a zero trust security solution with the infrastructure, work in cloud and on-premises environments, and be secure at the application layer.
However, even recognizing the importance of integration, the most prominent challenges facing organizations are: Building a ZTNA strategy There is a shortage of qualified vendors with complete solutions.
Zero trust should occur
As more organizations support remote work and initiatives that can work from anywhere, Zero Trust will not go away. The more people who work from anywhere, the less secure the traditional boundary-based approach. Since the philosophy is “get work and learn everywhere,” it’s a great way to protect your hybrid work model and should be included as part of your comprehensive cybersecurity strategy.
effective Zero Trust Solution To prevent the types of security and management gaps that challenge survey respondents, we need elements designed to work together as an integrated system.
A good zero trust solution is always knowing exactly who has what on the network, and authenticated users and devices are provided with minimal access to work. Therefore, if your organization reports that it is unable to continuously authenticate users and devices and is struggling to monitor user authentication, Zero Trust is not playing that role.