Most companies are failing to implement their zero trust strategies effectively

DMCA / Correction Notice
- Advertisement -

Loading Audio Player…
- Advertisement -

Many businesses understand the concept and benefits of zero-trust network access (ZTNA), and also say they have implemented, or believe in, the process of implementing a zero-trust security model.

That’s the conclusion of a new report from enterprise security provider Fortinet, which says that many of these organizations are probably failing to properly implement ZTNA.


Fortinet’s report, a “state of zero trust,” surveyed 472 IT and security leaders from 24 countries representing nearly all industries and the public sector, finding that for nearly a quarter (22%) of respondents, the entire digital Security on the attack surface, and improved user experience for remote working (VPN), were the two biggest and most important benefits.

incomplete zero-trust deployment

In addition, a “vast majority” of respondents said that there is already or in development a zero-trust strategy. For 40%, the strategy is “fully implemented”.

The flip side is that more than half of the respondents said they were not able to authenticate users and devices on an ongoing basis. The survey also revealed that many people are struggling to monitor users after authentication.

With these two functions being “critical principles” of zero-trust philosophy, it leads researchers to wonder: “What kind of zero-trust implementation do these organizations actually have?”.

“It is possible that although survey respondents think they have applied zero trust, they may not have actually done so. Or perhaps, that they have an incomplete deployment,” he concluded.

Pursuing the minds of respondents on ZTNA, the researchers found that 80% felt that implementing a zero-trust strategy across an expanding network was never going to be easy. For over a fifth (21%), it would be extremely difficult.

However, it is almost universally accepted that the zero-trust security solution being fully integrated with the infrastructure, was critical to its success. So it’s working on cloud and on-premises, and making it secure at the application level.

  • You might also want to check out our list of the best proxies today

- Advertisement -

Stay on top - Get the daily news in your inbox

Recent Articles

Related Stories