The state of zero trust transformation, 2023
From prevention to enablement: Leveraging the full potential of zero trust for the highly mobile and cloud-centric enterprise
Enterprises worldwide are racing to speed up innovation while becoming more agile and competitive. To do that while securing users, workloads, and devices in modern environments, IT leaders agree they need to rethink legacy networking and security approaches. The answer is a zero trust architecture.
Most IT leaders already have a zero trust security strategy in place, or in planning. However, only 22% are “very confident” their organization is using cloud infrastructure to its full potential. This tells us enterprises need to widen their lens to see the wealth of transformation opportunities zero trust supports beyond security: empowering hybrid workers, fostering emerging technologies like IoT/OT and 5G, and so much more.
Read this report to learn what 1,900 senior decision-makers around the globe had to say about how their zero trust deployments are progressing, the impacts of hybrid work and emerging technologies, and more. You’ll also find out:
- How zero trust transformation is progressing worldwide, with quantitative and qualitative insights across geographies
- Which technologies and initiatives are projected to be top priorities by 2025, including 5G and cloud-based OT/ICS access
- What’s holding enterprises back from taking full advantage of the cloud, from privacy concerns to poor user experience
- Where to start, and steps you can take to successfully enable greater agility, efficiency, and innovation with zero trust
Download the full report for a closer look at the progress of zero trust in today’s enterprises—and how you can stay a step ahead as you accelerate your own digital transformation.
Provided by Zscaler
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Hounslow Council partners with Amazon Web Services (AWS) to build resilience and transition away from legacy techSpomsored One of the most diverse and fastest-growing boroughs in London has completed a massive cloud migration project. Supported by AWS, it was able to work through any challenges
-
Salesforce targets better data, simpler licensing to spur Agentforce adoptionNews The combination of Agentforce 360, Data 360, and Informatica is more context for enterprise AI than ever before
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposedNews No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems
-
If you're not taking insider threats seriously, then the CrowdStrike incident should be a big wake up callNews CrowdStrike has admitted an insider took screenshots of systems and shared them with hackers, and experts say it should serve as a wake up call for enterprises globally.
-
Shai-Hulud malware is back with a vengeance and has hit more than 19,000 GitHub repositories so far — here's what developers need to knowNews The malware has compromised more than 700 widely-used npm packages, and is spreading fast
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible'News Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world
-
Thousands of ASUS routers are being hijacked in a state-sponsored cyber espionage campaignNews Researchers believe that Operation WrtHug is being carried out by Chinese state-sponsored hackers
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
