• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Research: Zero Trust Expected to Double Cybersecurity Efficacy

Research suggests that IT experts predict zero trust to lead to a 144% increase in anticipated efficacy in stopping data breaches.

December 2, 2021 Zachary Comeau Leave a Comment

Zero Trust, Leostream, AWS
Olivier Le Moal/stock.adobe.com

If you were having doubts about the efficacy of a zero trust approach to cybersecurity, recently released research suggests that such a network architecture is expected to double the efficacy of cybersecurity products.

The research, conducted by Osterman Research on behalf of cybersecurity firm Symmetry Systems, found from a survey of 125 IT and security decision-makers that they expect a zero trust architecture to dramatically help stop data breaches.

According to the white paper, the highest anticipated increase is in the ability to stop data breaches—with a 144% increase in anticipated efficacy from the assessment of efficacy before zero trust (25%) to the assessment after zero trust (60%).

Zero trust is also expected to lead to an 83% increase in the ability to stop ransomware, the research found.

When asked what organizations are focusing on when designing its zero trust architecture, 73% of respondents say they are focused on identity and access management for employees as the key design modification.

According to the whitepaper, addressing internally-facing identity and access management concerns is viewed as almost twice as important as the same concerns for external entities, such as supply chain partners.

Read Next: Your Guide to Implementing a Zero Trust Network Architecture

“Every organization must start somewhere with zero trust, and strengthening internal issues is critical to get right,” the paper reads. “We hope that organizations do not neglect the other issues above as their internal strategies mature, because the external threats— including supply chain attacks—are increasingly significant.”

However, many organizations are struggling with implementing a zero trust approach due to existing legacy systems, such as the inability to leverage contextual signals to determine which micro-segmentation policy is appropriate. More than half (55%) of respondents said legacy systems were a key barrier.

The research identifies many recent trends impacting the decision to embrace a zero trust architecture, but high-profile cybersecurity incidents led the way, with 53% of respondents citing that as their reason for adopting zero trust.

Others cite remote work (51%), general ransomware attacks (51%), credential theft (45%), hybrid work (45%) and other factors.

However, just 18% said a previous data breach or security incident was impactful enough to move them toward zero trust, suggesting that significant media attention of cybersecurity incidents plays a larger role in an organization’s IT security strategy.

“Today’s threat environment is drastically different from what we have experienced even in recent years – with relentless cyberattacks, the adoption of cloud services and mass remote or hybrid work,” said Michael Sampson, senior analyst at Osterman Research, in a statement. “Many organizations have begun the transition to a zero trust architecture and those who have not are behind the curve.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Zero Trust

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.