Approximately 84 percent of organizations have a zero trust security strategy in place or in development, according to the "The State of Zero Trust Report" from network security solutions provider Fortinet. However, most organizations also indicated that they struggle to authenticate users or devices and monitor users after authentication.
Other notable findings from Fortinet's report included:
- 59 percent of IT and security leaders said they don't have the ability to use their zero trust or zero trust network access (ZTNA) solutions to authenticate users and devices on an ongoing basis
- 54 percent indicated they are struggling to monitor users post-authentication.
- 42 percent stated they cannot create zones of control (microsegmentation).
- 33 percent noted their zero trust and ZTNA solutions are not integrated on-premises and in the cloud.
- 27 percent said these solutions do not provide secure access at the application level.
In addition, most respondents acknowledged that it is vital for zero trust security solutions to be integrated with their infrastructure, work across cloud and on-premises environments and be secure at the application layer, Fortinet indicated. But organizations often report a lack of qualified vendors as the biggest challenge they face to implement a complete zero trust solution.
Tips to Implement Zero Trust Security Solutions
Organizations must identify and implement zero trust security solutions that encompass authentication, access control and user identity, Fortinet noted. That way, they can verify all network devices and users remain secure.
Also, organizations should prioritize integrated security solutions for implementing zero trust on-premises and in the cloud, Fortinet said. This enables organizations to establish integrated systems to prevent security and management gaps now and in the future.