The state of zero trust transformation, 2023
From prevention to enablement: Leveraging the full potential of zero trust for the highly mobile and cloud-centric enterprise


Enterprises worldwide are racing to speed up innovation while becoming more agile and competitive. To do that while securing users, workloads, and devices in modern environments, IT leaders agree they need to rethink legacy networking and security approaches. The answer is a zero trust architecture.
Most IT leaders already have a zero trust security strategy in place, or in planning. However, only 22% are “very confident” their organization is using cloud infrastructure to its full potential. This tells us enterprises need to widen their lens to see the wealth of transformation opportunities zero trust supports beyond security: empowering hybrid workers, fostering emerging technologies like IoT/OT and 5G, and so much more.
Read this report to learn what 1,900 senior decision-makers around the globe had to say about how their zero trust deployments are progressing, the impacts of hybrid work and emerging technologies, and more. You’ll also find out:
- How zero trust transformation is progressing worldwide, with quantitative and qualitative insights across geographies
- Which technologies and initiatives are projected to be top priorities by 2025, including 5G and cloud-based OT/ICS access
- What’s holding enterprises back from taking full advantage of the cloud, from privacy concerns to poor user experience
- Where to start, and steps you can take to successfully enable greater agility, efficiency, and innovation with zero trust
Download the full report for a closer look at the progress of zero trust in today’s enterprises—and how you can stay a step ahead as you accelerate your own digital transformation.
Provided by Zscaler
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
LaunchDarkly to "double down" on observability with Highlight acquisition
News Highlight's observability tools will be integrated into LaunchDarkly's Guarded Releases software deployment service
By Daniel Todd
-
Samsung Galaxy Tab S10 FE review
Reviews The Tab S10 FE retains the feel and core capabilities of Samsung's high-end S10 tablets, but compromises on the display and the performance
By Stuart Andrews
-
5 Steps to Prioritize Based on Risk with Snyk
By ITPro
-
Beyond the Vulnerability Backlog: Building Risk-Based AppSec Programs
By ITPro
-
Why the Fastest Technology Companies choose Snyk Cheat Sheet
By ITPro
-
6 steps to a stronger security posture through automation
By ITPro
-
Edge devices are now your weakest link: VPNs, firewalls, and routers were the leading source of initial compromise in 30% of incidents last year – here’s why
News Compromised network edge devices have rapidly emerged as one of the biggest attack points for small and medium businesses.
By Bobby Hellard
-
IT & Security: The Critical Alliance Against Cyber Threats
Whitepaper Actionable tips for creating a unified defense
By ITPro
-
Device Management Is a Losing Battle
Whitepaper Discover the winning strategy to regain control
By ITPro
-
Stronger Together: Why IT-Security Collaboration Drives Greater Security and Efficiency
Whitepaper Discover why unification is the key to scalable, consistent security
By ITPro