In the new EMA research report, Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation, the analyst Shamus McGillicuddy explores how network-based technology is the foundation of Zero Trust.
Shamus highlights that the Zero Trust model is a continuous cycle of establishing a proper asset inventory, verifying the legitimacy of network communications, evaluating device profiles and behaviors (make, model, serial number, location, recalls, security state, and more) with the ultimate goal of trusted automated segmentation and microsegmentation.
- IoT is one of the top drivers for enterprise interest and investment in zero-trust networking
- 36% of respondents tailor network access based on the device function and characteristics – leaving segmented VLANs with devices of varying risks and a need for device behavioral analysis
- 12% of respondents claim that devices without an associated user identity are banned from the corporate network – leading to operational impact