The zero trust model is based on the concept that any user attempting to access resources is assumed to be untrustworthy, but that trust can be established based on context (identity, device, location, etc.) to allow users to access the data and applications needed to do their jobs.
New research by Cybersecurity Insiders proves that there’s a widespread movement to replace VPNs with ZTNA. This is most likely the result of recent malware outbreaks and attacks on VPN servers.
The 2019 Zero Trust Adoption Report discovered:
- 47% say their existing technology will not help them embrace a zero trust strategy
- 50% of enterprises view minimizing exposure of internal apps to the internet as a top challenge
- 37% will adopt zero trust by securing access to apps running across multi-cloud environments
Read this report to learn what your peers are doing—their concerns, priorities, and most common use cases.