Dec 8, 2021
92 Views
0 0

Zero Trust core to contemporary cybersecurity strategy, One Identity research finds

Written by

One Identity, the unified identity security company, has released global survey findings that unpack the current state of Zero Trust awareness and adoption across the enterprise. After a year plagued by one disastrous cybersecurity incident after another, new findings from One Identity reveal that only 1 in 5 security stakeholders are confident in their organisation’s understanding of Zero Trust.
According to the Dimensional Research-conducted survey of 1,009 IT security professionals, Zero Trust is a main security priority for most organisations, but comprehensive understanding and adoption of the Forrester-founded framework remains inconsistent. While 75% of organisations recognise Zero Trust as being critically or very important to bolstering overall cybersecurity posture, only 14% report that they have fully implemented a solution. Another 39% of organisations have begun to address this important need, and an additional 22% noted that they plan to implement Zero Trust over the course of the next year.
Among key barriers to widespread Zero Trust success is a lack of clarity on how adoption can be achieved. ​​61% of security professionals are focusing their implementation on reconfiguring access policies, while 54% believe it begins with identifying how sensitive data moves throughout the network. While 51% are implementing new technology to achieve Zero Trust.
In total, a substantial 32% of security teams lack a comprehensive understanding of how Zero Trust should be implemented within their organisation. Other key barriers to Zero Trust adoption include competing priorities (31% are too busy with other daily priorities), and beliefs that Zero Trust can hinder business productivity (for example, 31% erroneously believe that Zero Trust security models impact employee productivity).
“Organisations recognise that the traditional perimeter is no longer enough and that they will be best served by prioritising identity security and taking steps to ensure bad actors are limited once they gain access,” said Bhagwat Swaroop, president and general manager, One Identity. “Zero Trust is fast becoming an enterprise imperative because it eliminates vulnerable permissions and excessive access by delivering a continuum of different rights across the organisation to ultimately limit attack surfaces if they are breached.”
One Identity’s Unified Identity Security Platform enables organisations to make Zero Trust a reality. By providing 360-degree visibility across all identities (human, machine, and proliferating accounts caused by changes in how and where we work), the ability to verify everything before granting access, and adaptive security controls, organisations can reduce risk from cyberattacks, and limit damage from crippling and expensive breaches. To learn more, visit here.
A free executive summary and key findings of the survey results announced today is available online here. Dimensional Research conducted the One Identity-commissioned research, which surveyed 1,009 IT security stakeholders globally between September 8 and September 27, 2021.
The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY
Follow Us
© 2015 – 2019 IT Security Guru – Website Managed by Calm Logic
© 2015 – 2019 IT Security Guru – Website Managed by Calm Logic
This site uses functional cookies and external scripts to improve your experience.
Privacy Settings / PENDING
This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.
NOTE: These settings will only apply to the browser and device you are currently using.
GDPR Compliance

source

Article Categories:
Mobile Security

Comments are closed.