4 of 5 Businesses Plan to Adopt Zero Trust within One Year

Zero Trust Security Framework is Appealing, Yet Key Challenges Complicate Adoption

New York, NY – September 14, 2021 – Ericom Software, a leader in cloud cybersecurity solutions for secure web and application access and developer of the ZTEdge™ Cloud Security Platform, today announced publication of the results of its inaugural Zero Trust Market Dynamics Survey. Conducted by Dr. Chase Cunningham, Ericom’s Chief Strategy Officer and former Forrester Analyst focused on Zero Trust security, the survey was designed to assess the market’s perception of the Zero Trust security framework, explore organizations’ plans for adoption and implementation, and identify key issues that inhibit their moves to Zero Trust.

Over a decade after the Zero Trust security concept was first introduced, survey results indicate that Zero Trust solutions are being widely adopted. Spurred by the recent sharp increase in ransomware and other sophisticated cyberattacks, the majority of organizations – 80% – have concrete plans to enable Zero Trust security solutions within the next year, with over half planning to begin implementation during 2021.

Of the almost 1300 security and risk professionals who participated in the July 2021 survey, 83% indicated that they consider Zero Trust to be an essential strategy for their organizations, according to Dr. Cunningham.

Almost all respondents believe that adopting a Zero Trust cybersecurity approach is essential for preventing or limiting the success of cyberattacks. The most popular area of initial focus for respondents’ Zero Trust security programs is Identity and Access Management, followed by Network Security and Web Security.

While respondents are bullish on the necessity of adopting a Zero Trust security approach, they are less confident in their abilities to successfully implement solutions. Over 70% feel that having a partner to help implement Zero Trust would speed the process, while budget restrictions and prioritization of other strategic security initiatives are most likely to delay Zero Trust programs from the business perspective. On the IT side of the ledger, respondents identified legacy technology and complexity associated with defining and implementing Zero Trust security policies as significant barriers to successful implementation.

“I was pleased to see the survey results reported significant market momentum around the Zero Trust security framework and am excited about its ability to make a real difference in the security posture of the organizations that adopt it,” said Dr. Cunningham. “Security vendors that can help organizations address their pain points around budget, complexity, and flexibility will be in a strong position to partner with businesses as they implement their Zero Trust programs.”

Ericom plans to execute the Zero Trust Market Dynamics Survey each year in order to assess changes and trends in the market over time. More information on Zero Trust security can be found on Dr. Cunningham’s Zero Trust website.

A summary and an infographic of the survey findings can be viewed here.

The detailed 2021 Zero Trust Market Dynamics report can be downloaded here.

About Ericom Software and the ZTEdge Cloud Security Platform

Ericom Software is a leading provider of cloud-delivered, Zero Trust cybersecurity solutions that protect today’s digitally distributed organizations from advanced security threats. The company’s ZTEdge™ platform is the industry’s leading Secure Access Service Edge (SASE) solution developed specifically for midsize enterprises and small businesses. Ericom solutions leverage innovative remote browser isolation, application isolation, microsegmentation, and virtualization technologies, and are delivered on the Ericom Global Cloud, a distributed high-availability elastic cloud platform. Ericom’s cybersecurity solutions protect thousands of businesses and millions of end users worldwide. The company has offices around the world and a global network of distributors and partners.

Moving to a Zero Trust isolation-based security approach is faster and easier than you think.

Get a 1:1 Demo