EMA Zero Trust Networking Research Summary

Issue link:

Contents of this Issue


Page 0 of 31

In the new Enterprise Management Associates research report, Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation, Shamus McGillicuddy explores how network-based technology is the foundation of Zero Trust. The Zero Trust model is a continuous cycle of establishing a proper asset inventory, verifying the legitimacy of network communications, evaluating device profiles and behaviors (make, model, serial number, location, recalls, security state, and more) with the ultimate goal of trusted automated segmentation and microsegmentation. Key findings: IoT is one of the top drivers for enterprise interest and investment in zero-trust networking 36% of respondents tailor network access based on the device function and characteristics – leaving segmented VLANs with devices of varying risks and a need for device behavioral analysis 12% of respondents claim that devices without an associated user identity are banned from the corporate network – leading to operational impact

Articles in this issue

view archives of Reports - EMA Zero Trust Networking Research Summary