• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Gartner: Zero Trust Implementations are Slowly Gathering Steam

Gartner predicts that 10% of large enterprises will have a mature and measurable zero trust program by 2026, up from less than 1% today.

January 23, 2023 Zachary Comeau Leave a Comment

zero trust
stock.adobe.com/Alexander

A common buzzword popular among IT and cybersecurity professionals over the last few years is zero trust, a security strategy designed to reduce risk by implementing granular controls over users and apps.

However, Gartner predicts that just 10% of large enterprises will have a mature and measurable zero-trust program in place by 2026, up from less than 1% today. The IT analyst firm says many organizations want to adopt those principles, but very few organizations have completed the scope of their zero trust implementations.

To move past the “hype” stage and make zero trust a reality in their organizations, chief information security officers (CISOs) and IT security leaders must first develop an effect zero-trust strategy that balances both security needs and business needs.

“It means starting with an organization’s strategy and defining a scope for zero-trust programs,” says John Watts, vice president analyst at Gartner, in a statement. “Once the strategy is defined, CISOs and risk management leaders must start with identity – it is foundational to zero trust. They also need to improve not only technology, but the people and processes to build and manage those identities.”

However, organizations should avoid the thinking that adopting this security architecture solves every security problem, as Gartner predicts that more than half of cyberattacks will be aimed at areas where zero-trust controls can’t protect.

With enterprise attack surfaces expanding faster than network defenders can protect, attacks are quickly pivoting to other assets and vulnerabilities outside of the scoop of zero trust architectures, says Jeremy D’Hoinne, a Gartner vice president analyst.

“This can take the form of scanning and exploiting of public-facing APIs or targeting employees through social engineering, bullying or exploiting flaws due to employees creating their own ‘bypass’ to avoid stringent zero-trust policies,” D’Hoinne says.

Gartner’s recommendations

Gartner recommends first defining a strategy and baseline identity processes and tools before embarking on a wider implementation program.

In addition, the firm urges organizations to tailor fit their zero-trust strategy to the organization that aligns zero trust to threat mitigation. This should be done first with a smaller subset of people, devices and applications before rolling it out to the entire organization.

When purchasing new technology, it should first be evaluated for the vendor’s support of zero-trust capabilities. Be wary of vendors that say they deliver complete zero-trust solutions, Gartner says.

Tagged With: Gartner, Zero Trust, ZTA

Related Content:

  • Sony SRG A PTZ Cameras Sony Introduces Two New AI-Enabled PTZ Cameras
  • Microsoft Office 365 Government Secret cloud, MIcrosoft Microsoft Makes Office 365 Secret Cloud Available for…
  • Concept of File management. Searching files in database., 3d vector illustration. Gen Z vs. Baby Boomers: Which Generation Has…
  • Wesco Conference Room as a Service, hybrid work, Fintech Company Standardizes on Wesco’s Conference Room as…

Free downloadable guide you may like:

  • Harnessing the Power of Digital SignageHarnessing the Power of Digital Signage

    Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Guide to creating a ransomware response plan download
Blueprint Series: Creating a Ransomware Response Plan

Chances are ransomware hackers are researching your company right now. They’re investing time and money to choose the most profitable targets and a...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.