Zero Trust is a concept of blanket skepticism when it comes to network access, even from internal users, requiring verification at all entry points and never assuming access privileges. But while Zero Trust is gaining momentum as a strategic ideal, rearchitecting the network to achieve Zero Trust might not be straightforward. After a year of distributed workforces and numerous headline-making cybersecurity incidents across industries, are decision-makers adopting a Zero Trust security strategy?
Pulse surveyed over 200 digital decision-makers to understand:
Data collected from May 3 - June 13, 2021
Total respondents: 245 tech decision-makers
Most decision-makers (59%) are currently deploying a Zero Trust security strategy, but 41% have yet to.
Of those who aren’t currently deploying a Zero Trust security strategy, 79% have plans for adoption at some future point.
“Zero Trust has transformed (for the better) many processes and our ability to protect our internal assets."
- C-Suite, small-medium business
“I'm very interested in implementing [Zero Trust] at my organization, but we have such a complicated network architecture that I worry it might be impossible.”
- C-Suite, public sector
Improving risk management strategy (75%) and securing remote access (65%) are the top reasons to adopt a Zero Trust security strategy.
“[Zero Trust] is a business imperative driven by the explosive number of threat vectors and incidents. It is only a matter of time before every company is impacted. Zero Trust gives companies a fighting chance.”
- C-suite, start-up
As for the businesses, protecting customer data (63%) and a uniform security approach (51%) are the main drivers for Zero Trust adoption.
“Zero Trust is a perfect fit in companies where data sets are highly protected and usage patterns are consistent.”
- VP, large enterprise
A strong 95% of decision-makers agree that Zero Trust reduces security incidents.
A Zero Trust security strategy should mostly protect against accidental data leakage (68%), followed by malicious internal threats (68%) and third parties working within the network (64%).
87% of decision-makers believe that a Zero Trust security strategy will also simplify their organization’s security architecture.
“I’m sold [on Zero Trust], the non-technical [leadership] isn’t. Key materials to help win the battle are few and far between.”
- Director, small-medium business
Most decision-makers have the following security components in their security stack: Activity logs (69%), identity and access management (IAM) tools (68%), network segmentation (67%), and security information and event management (SIEM) (62%).
From the same list, decision-makers highlighted IAM tools (71%), SIEM (64%), and network segmentation (59%) as the top essential components of a Zero Trust security strategy, meaning that many already have these components in place.
When it comes to adoption challenges, however, cost concerns ranked highest (56%), followed by skills gaps (51%) and technology gaps (51%).
“Changing the culture of our organization has been challenging. So many users have had access privileges that they think they need but don’t.”
- Director, small-medium business
Pulse is a social research platform trusted by technology leaders around the world. These leaders rely on the community to make connections, share knowledge, get advice, and stay on top of current trends in the technology space. The questions, polls, and surveys posted in the platform are curated in Pulse's One-Minute Insight reports, which reflect what technology leaders care about right now—and in the rapidly evolving world of software, real-time data and insights in what matters most.