Fortinet Zero Trust Report Global State Most organizations have a zero trust vision or are in the process of implementing a zero trust initiative, but more than half of organizations have revealed that they cannot convert to a solution that implements this vision. This is due to the lack of basic core fundamentals of Zero Trust.
A FortiGuard Labs Threat Landscape Report It has shown an increase in the amount and sophistication of attacks targeting individuals, organizations, and increasingly important infrastructure.
Organizations are looking for solutions to protect against these evolving threats, and while Zero Trust is a top priority, there are multiple reasons. In addition, organizations need to protect their critical assets from workers connecting from poorly protected home networks, so being able to work from anywhere puts the spotlight on Zero Trust Network Access (ZTNA) in particular. I was hit.
John Madison, Fortinet’s EVP and CMO of Products, said: For organizations. According to our research, most organizations implement some form of zero trust strategy, but fall short of the overall strategy and struggle to implement the core zero trust security basics. .. An effective solution requires a cybersecurity mesh platform approach that addresses all zero trust fundamentals across the infrastructure, including endpoints, cloud, and on-premises. Otherwise, you will end up with a partially unintegrated solution and lose wide visibility. “
Are you struggling to consistently authenticate users and devices? 👩💻📱🤷♀️# FortinetGlobal state of #ZeroTrust According to the report, more than half of organizations face gaps in implementing Zero Trust. Get more important findings. https://t.co/MAaDtYmnu4 #ZTNA pic.twitter.com/5kRM7qXSMG
— Fortinet (@Fortinet) January 12, 2022
The report shows confusion about what constitutes a complete zero trust strategy. Respondents said they understand the concepts of Zero Trust and ZTNA. Over 80% report that they are already implementing or developing a Zero Trust and / or ZTNA strategy. Still, more than 50% show that the core zero trust feature cannot be implemented. Nearly 60% show no ability to continuously authenticate users and devices, and 54% struggle to monitor users after authentication.
This gap is a concern as these features are an important belief in Zero Trust and question what the actual reality of these implementations is throughout the organization. Conducing confusion are the terms “zero trust access” and “zero trust network access,” which are sometimes used interchangeably.
Zero Trust’s priorities are “minimizing the impact of breaches and intrusions” followed by “protecting remote access” and “ensuring business or mission continuity”. Improving the user experience and gaining the flexibility to provide security everywhere was also a top priority. The most important benefit cited by respondents was security across the digital attack surface, improving the remote work (VPN) user experience.
The majority of survey respondents believe that it is essential to integrate a zero trust security solution with their existing infrastructure, work in cloud and on-premises environments, and be secure at the application layer. However, more than 80% of respondents say it is difficult to implement a zero trust strategy across the extended network.
For organizations where the strategy was not implemented or developed, the failure included a lack of skilled resources in which 35% of the organizations were using other IT strategies to address Zero Trust.
https://gulfbusiness.com/majority-of-organisations-face-gaps-in-their-zero-trust-implementations-survey/ The majority of organizations face gaps in the implementation of Zero Trust: Investigation