Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.


As 2022 quickly approaches, Symmetry Systems and Osterman Research have released a report detailing how organizations plan to deploy zero-trust architecture, with 53% of respondents citing high-profile ransomware attacks as their primary motivator.

Incorporating zero-trust principles into modern data security ensures no one point of failure when systems are breached. Zero-trust principles can ensure that even if attackers know the database location/IP, username, and password, they cannot use that information to access privileged information given to specific application roles, identity and access management (IAM), and cloud-network perimeters.

Today, we live in a hybrid-cloud environment where users, developers, supply-chain vendors, and contractors get data via a web of static infrastructure and cloud applications. Legacy control solutions for this data rely on internal developers’ IAM rules and authorization policies for customer-facing web services.

Figure 1. Trends That Impact The Decision To Embrace a Zero Trust Architecture. 53% of respondents say high-profile ransomware incidents is the trend having the largest impact on the decision to embrace zero trust.

Event

Intelligent Security Summit

Learn the critical role of AI & ML in cybersecurity and industry specific case studies on December 8. Register for your free pass today.

Register Now

According to the report, a zero-trust architecture is expected to increase cybersecurity protections’ efficacy to stop data breaches by 144%. The report also credits an emphasis on securing customer data as another motivator behind enterprise-wide deployment.

Other key highlights from respondents include barriers encountered when deploying a zero-trust architecture, their confidence level in existing cybersecurity protections, the top ten data sources in need of protection, and the total IT budget allocated for zero-trust initiatives by year.

This report references data from an in-depth survey of 125 IT and security decision-makers in midsize and large organizations, all of whom are knowledgeable about how their organization was using or planning to use a zero-trust architecture, or why their organization had intentionally chosen not to do so.

Read the full report by Symmetry Systems and Osterman Research.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.