A Closer Look at Zero Trust Cybersecurity Strategy Adoption

A Closer Look at Zero Trust Cybersecurity Strategy Adoption

As organizations seek to protect more open enterprise networks and more distributed workforces from ransomware, DDoS attacks, and other threats, Zero Trust has taken root as a foundational element of modern cybersecurity. The premise is simple: by requiring verification of every user, at every entry point—even inside the network—before granting access, companies can keep hackers out of their environment to protect sensitive data and applications. But for all the talk about Zero Trust security, how far have companies really come in making it a reality?

Recent Pulse Survey Results

A recent Pulse survey explores the current state of Zero Trust adoption across over 200 organizations, examining:

The results show both strong support and momentum toward the principles of a Zero Trust cybersecurity strategy, and considerable difficulties en-route to its implementation.

Zero Trust security Strategy Objectives and Obstacles

To enforce the “trust nobody” approach at the core of Zero Trust, organizations need to be able to do four things:

According to the Pulse survey, nearly two-thirds of decisions-makers are currently deploying a Zero Trust cybersecurity strategy, while a large majority of the rest plan to do so in the future. Confidence is high in the value of this approach, with nearly all respondents agreeing that Zero Trust reduces security incidents. Almost as many believe that it will also simplify their organization’s cybersecurity architecture. At the same time, adoption challenges remain, including cost, skills shortages, and technology gaps.

To explore the results of the Pulse survey in greater depth, including key drivers and business cases for Zero Trust adoption, which types of threats it should focus on, and essential tools for effective implementation, view the report here.


Babur Khan
November 5, 2021

About Babur Khan

Babur Nawaz Khan is a Technical Marketing Engineer at A10 Networks. He primarily focuses on A10's Enterprise Security and DDoS Protection solutions. Prior to this, he was a member of A10's Corporate Systems Engineering team, focusing on Application Delivery Controllers. Babur holds a master's degree in Computer Science from the University of Maryland, Baltimore County. READ MORE