The State of Zero Trust Architecture in Organizations
Converge Cybersecurity CBI A Converge Company Check Point Ponemon Institute

Zero trust is both a cybersecurity buzzword and a strategy for securing the dissolving network perimeter. Is it overhyped, or does it offer a viable route for modern security? 600+ IT and security professionals share their zero-trust realities.

Get the Report

Sponsored by Converge Cybersecurity, CBI, A Converge Company, and Check Point
Independently conducted by Ponemon Institute

Zero-trust maturity is ready, set, and not yet.

The path to zero trust isn’t a straight shot. Research shows that zero-trust adoption is a graduated process and responding companies are in different stages.*

27%
Mature
33%
Full Adoption
19%
Early Adoption
21%
Planning

Believe their zero-trust adoption outpaces their competition
45%

*Percentages are based on organizations that have adopted a zero-trust strategy.

More than half adopted zero-trust network architecture.

But the top reasons for this aren’t primarily about security, with top responses favoring improved user experience and visibility.

  • 52%

    Indicated improved connectivity for users

  • 38%

    Cited better visibility into user and application activity

Zero trust significantly impacts the ability to minimize risk.

56%
Say zero trust effectively eliminates lateral movement between users and servers
53%
Responded that zero trust reduces attacker dwell time in the network.


Companies experience benefits beyond security.

Adopting zero trust produced additional advantages for companies.

  • 59%

    Saw increased productivity of their DevOps team

  • 54%

    Said IT security team productivity increased

  • 52%

    Experienced stronger authentication using identity and risk posture

Get the full report plus more.

Gain immediate access to the full report, our zero-trust whitepaper, on-demand webinar, and more by filling out the form below. From building a strategy to advancing maturity, our resources can help.

I Need To...