Recently, secure access solution provider Pulse Secure released its 2020 Zero Trust Progress Report. This survey gauged cybersecurity professionals on their Zero Trust deployments and IT architecture.
The 2020 Zero Trust Progress Report determined an overwhelming 72 percent of businesses plan on deploying Zero Trust in 2020. However, around 47 percent of professionals lack confidence in applying Zero Trust to their IT infrastructures.
In fact, Pulse Secure discovered that Zero Trust proves challenging to deploy in complex IT environments. Additionally, the 2020 Zero Trust Progress reported found:
- Over 40 percent of cybersecurity professionals express concern with vulnerable mobile and at-risk devices as found in bring-your-own-devices (BYOD) and Internet of Things (IoT) trends.
- 45 percent express concern with public cloud application access security.
- Meanwhile, 43 percent expressed concerns with BYOD enablement issues.
- More than 70 percent of businesses aim to advance their identity and access management capabilities.
- Also, 30 percent of businesses seek to simplify secure access delivery including enhancing user experience and optimizing administration and provisioning.
What the 2020 Zero Trust Progress Report Tells Us
Scott Gordon, Chief Marketing Officer at Pulse Secure, gave a statement based on these findings. “The sheer volume of cyberattacks and enormity of data breaches in 2019 has challenged the veracity of secure access defenses, even in well-funded organizations.”
“Zero Trust holds the promise of vastly enhanced usability, data protection, and governance. However, there is a healthy degree of confusion among cybersecurity professionals about where and how to implement Zero Trust controls in a hybrid IT environment—which is clearly reflected in respondents’ split confidence levels.”
Moreover, these findings confirm a trend previously reported on by Solutions Review; namely, the blurring of the line between endpoint security and Identity Management.
As identity management begins to claim domain over the digital perimeter and device security, the lines between the two become harder to distinguish. This should serve as a warning to enterprises simply seeking out antivirus solutions; that may no longer suffice. You need to monitor and restrict access as well in a manner that fits your IT infrastructure.
Latest posts by Ben Canner (see all)
- How Identity Management Interacts with Human Resources (HR) - July 14, 2020
- 2020 Vendors to Know: Identity Management - July 13, 2020
- 2020 Vendors to Know: Identity Governance - July 9, 2020