Zero Trust technology is more important than ever

security
(Image credit: Shutterstock)

Although organizations are increasingly aware of the benefits of Zero Trust technology and even plan to adopt it, new research from One Identity has revealed that only 14 percent of businesses have implemented a Zero Trust strategy.

Following the release of the White House's “Executive Order on Improving the Nation's Cybersecurity” back in May, Zero Trust awareness continues to rise in the US and around the world. For this reason, One Identity commissioned Dimensional Research to conduct a survey of 1,009 IT security professionals to learn more about the current state of Zero Trust awareness and adoption across the enterprise.

Surprisingly, the survey revealed that only one in five security stakeholders are confident in their organizations' understanding of Zero Trust.

For those unaware, the concept of Zero Trust was created by Forrester's John Kindervag and is based on the realization that traditional security models operate on the outdated assumption that everything inside an organization's network should be trusted. Instead, the Zero Trust model recognizes that trust can be a vulnerability as once inside an organization's network, users including threat actors and malicious insiders, are free to move laterally and access or exfiltrate whatever data they are not limited to according to a blog post from Palo Alto Networks

Implementing Zero Trust

Despite the fact that 75 percent of organizations recognize Zero Trust as being critically or very important to bolstering their cybersecurity posture, only 14 percent have fully implemented a solution according to One Identity's research.

However, 39 percent of organizations have begun to address this important need with an additional 22 percent planning to implement Zero Trust over the course of next year.

A lack of clarity on how adoption of this technology can be achieved is one of the key barriers to widespread Zero Trust success along with competing priorities and the belief that it can hinder business productivity. Of those surveyed, 61 percent of security professionals are focusing their implementation on reconfiguring access policies while 54 percent believe it begins with identifying how sensitive data moves throughout a network.

President and general manager of One Identity, Bhagwat Swaroop provided further insight on the survey's findings in a press release, saying:

“Organizations recognize that the traditional perimeter is no longer enough and that they will be best served by prioritizing identity security and taking steps to ensure bad actors are limited once they gain access. Zero Trust is fast becoming an enterprise imperative because it eliminates vulnerable permissions and excessive access by delivering a continuum of different rights across the organization to ultimately limit attack surfaces if they are breached.”

We've also rounded up the best endpoint protection software and best firewall

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
Dr Chase Cunningham speaking at ZTW25
The grand delusion: endpoint protection isn’t the magic pill, says Dr Zero Trust
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Security padlock in circuit board, digital encryption concept
Best Zero Trust Network Access Solution of 2025
ThreatLocker CEO Danny Jenkins speaking at ZTW25
“It’s made our jobs harder, not easier” - ThreatLocker CEO Danny Jenkins on AI
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
Latest in Security
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Latest in News
Xbox Series X and Xbox wireless controller set to a green background
Xbox Insiders are currently testing a new Game Hub feature that looks useful, but I've got mixed feelings about it
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Microsoft Surface Laptop and Surface Pro devices on a table.
Hate Windows 11’s search? Microsoft is fixing it with AI, and that almost makes me want to buy a Copilot+ PC
Oura Ring 4
Activity tracking on Oura Ring is about to get a whole lot better, but I've got bad news about your step count
Google Pixel Buds Pro 2
Cleaned your Pixel Buds Pro 2 recently? If not, you might be getting worse sound
Google Maps on a phone being held in someone's hand
Google Maps is getting two key upgrades, for easier route planning and quicker access to Gemini AI