Finding the way to zero trust

Discussion Topics

If zero trust is so great, why isn’t everyone using it? That’s the general sentiment we’re hearing from our infosec audience regarding efforts to implement zero trust. They see zero trust as more important than in past years, but still not as urgent as competing priorities. Some have begun laying the groundwork for zero trust, but find their efforts stalled by concerns about the user experience and impact on the business. Even the quarter of respondents who’ve partially or fully implemented zero trust say they struggle to get full buy-in from other departments when it comes to scaling these ideas across the enterprise.

As one respondent put it, “completely transforming the technology infrastructure takes time. Even if an organization has a sound architecture model and support from the business, executing is what matters—and those that don’t execute accordingly will never meet the intentions of zero trust in the first place.”

This report helps cybersecurity teams to more fully:

  • Understand the principles and configuration requirements for establishing zero trust.
  • Address implementation concerns and ways to tackle if challenges arise
  • Formulate zero trust policies for those looking to secure remote employees in a work-from-anywhere environment, using IAM, MFA or least privileges access.


CRA | Business Intelligence