Connect with us

Hi, what are you looking for?

HEADLINES

More than half of organizations face gaps in Zero-Trust implementations – Fortinet

A survey reveals that while most organizations have a vision of zero trust or are in the process of implementing zero-trust initiatives, more than half of organizations cannot translate this vision into the solutions they are implementing because they lack some basic core fundamentals of zero trust.

Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, unveiled the Global State of Zero Trust Report. The survey reveals that while most organizations have a vision of zero trust or are in the process of implementing zero-trust initiatives, more than half of organizations cannot translate this vision into the solutions they are implementing because they lack some basic core fundamentals of zero trust.

A FortiGuard Labs Threat Landscape Report demonstrated an increase in the volume and sophistication of attacks targeting individuals, organizations, and increasingly critical infrastructure. Organizations are looking for solutions to protect against these evolving threats and zero trust is top of mind, but for multiple reasons.  Additionally, the shift to work-from-anywhere has put a spotlight on zero-trust network access (ZTNA) in particular, as organizations need to protect important assets from workers connecting from poorly protected home networks. 

Confusion Over Defining Zero-Trust Strategies 

The report illustrates some confusion about what comprises a complete zero-trust strategy. Respondents indicated they understand zero trust (77%) and ZTNA (75%) concepts and over 80% reported already having a zero-trust and/or ZTNA strategy in place or development. Yet, over 50% indicated being unable to implement core zero-trust capabilities. Nearly 60% indicated they do not have the ability to authenticate users and devices on an ongoing basis and 54% struggle to monitor users post-authentication. 

Advertisement. Scroll to continue reading.

This gap is concerning because these functions are critical tenets of zero-trust and it brings into question what the actual reality of these implementations is across organizations. Adding to the confusion are the terms “Zero Trust Access” and “Zero Trust Network Access,” which are used sometimes interchangeably. 

Zero Trust Is Top of Mind and Priorities Are Varied 

Priorities for zero trust are “minimizing the impact of breaches and intrusions” followed closely by “securing remote access” and “ensuring business or mission continuity.” “Improving user experiences” and “gaining flexibility to provide security anywhere” were also top priorities. 

“Security across the entire digital attack surface” was the single most important benefit cited by respondents, followed by a “better user experience for remote work (VPN).” 

A vast majority of the survey respondents believe that it is vital for zero-trust security solutions to be integrated with their existing infrastructure, work across cloud and on-premises environments, and be secure at the application layer. However, more than 80% of respondents indicated that it is challenging to implement a zero-trust strategy across an extended network. For organizations without a strategy in place or development, obstacles included a lack of skilled resources with 35% of organizations using other IT strategies to address zero trust. 

Advertisement. Scroll to continue reading.

The report is based on a global survey of IT decision-makers aimed at better understanding how far along organizations are in their zero-trust journey. The survey is intended to better understand the following: 

  • How well zero trust and ZTNA are understood 
  • The perceived benefits and challenges in implementing a zero-trust strategy 
  • Adoption of and the elements included in a zero-trust strategy 

The survey was conducted in September 2021 with 472 IT and security leaders from 24 different countries, representing nearly all industries, including the public sector. 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The certification and inclusion of ManageEngine as a Silver-tier member in PeopleCert's ATV program validates ManageEngine's efforts towards building an ITSM platform aligned with...

HEADLINES

The new plugins allow enterprises to safeguard mobile enterprise apps, harden remote access and protect mobile work from DeepSeek spyware.

APPS

Since launching Family Pairing - TikTok's parenting controls -  five years ago, TikTok continuously adds new features based on feedback from families, as well...

HEADLINES

“The Philippines is experiencing rapid digital growth, and with that comes the urgent need for stronger cybersecurity frameworks,” said Sun Yi, CEO of ABP...

HEADLINES

Over 4,000 MacBook devices were distributed to Elementary teachers and School Heads, and schools with computer laboratories across Bataan.

HEADLINES

By engaging in strategic partnerships like Rundown 2025, inDrive strengthens its ties with its various stakeholders, and the general public , while reinforcing its role in discussions...

HEADLINES

This interest in the potential of AI, cloud computing and other advanced digital technologies to support sustainable development varies across regions, with emerging Asian...

HEADLINES

ST Telemedia Global Data Centres (STT GDC) Philippines has reached a sustainability milestone by transitioning to 100% renewable energy across all its operational data centers...

Advertisement