The State of Zero Trust Architecture in Organizations
Converge Cybersecurity CBI A Converge Company Check Point Ponemon Institute

Zero trust is both a cybersecurity buzzword and a strategy for securing the dissolving network perimeter. Is it overhyped, or does it offer a viable route for modern security? 600+ IT and security professionals share their zero-trust realities.

Get the Report

Sponsored by Converge Cybersecurity, CBI, A Converge Company, and Check Point
Independently conducted by Ponemon Institute

Zero-trust maturity is ready, set, and not yet.

The path to zero trust isn’t a straight shot. Research shows that zero-trust adoption is a graduated process and responding companies are in different stages.*

Full Adoption
Early Adoption

Believe their zero-trust adoption outpaces their competition

*Percentages are based on organizations that have adopted a zero-trust strategy.

More than half adopted zero-trust network architecture.

But the top reasons for this aren’t primarily about security, with top responses favoring improved user experience and visibility.

  • 52%

    Indicated improved connectivity for users

  • 38%

    Cited better visibility into user and application activity

Zero trust significantly impacts the ability to minimize risk.

Say zero trust effectively eliminates lateral movement between users and servers
Responded that zero trust reduces attacker dwell time in the network.

Companies experience benefits beyond security.

Adopting zero trust produced additional advantages for companies.

  • 59%

    Saw increased productivity of their DevOps team

  • 54%

    Said IT security team productivity increased

  • 52%

    Experienced stronger authentication using identity and risk posture

Get the full report plus more.

Gain immediate access to the full report, our zero-trust whitepaper, on-demand webinar, and more by filling out the form below. From building a strategy to advancing maturity, our resources can help.

I Need To...