Mind the zero trust gap!

TeleGeography’s WAN Manager Survey: Cloud Connectivity & Network Security Report reveals the gap between networking and security within enterprises.

  • 4 years ago Posted in
TeleGeography, a global telecommunications market research and consulting firm, has released its annual WAN Manager Survey: Cloud Connectivity & Network Security Report. The report reveals an opportunity for enterprises to further integrate networking and security and adopt new models to prevent data breaches. 

 

According to the survey, less than 20% of enterprises have fully or mostly integrated network and security teams. More than 40% have separate teams but work closely together on things like SD-WAN or hybrid network adoption. 15% have largely siloed networking and security operations. 

  

“Enterprises are re-evaluating where security responsibilities sit within their IT operations. They are looking at greater integration between security and networking teams that will reduce risk while accelerating the adoption of networking technologies like SD-WAN. WAN Managers recognize the need for stronger relationships between these teams and we anticipate fully or mostly integrated teams growing over time,” said Greg Bryan, Senior Manager, Enterprise Research at TeleGeography.

 

Interest in Zero Trust Security remains high among WAN managers, while only 8% have actually implemented the IT security model. 31% are considering Zero Trust Security, 19% are in the adoption phase with a fifth of respondents unfamiliar with the concept.

 

Zero Trust Security is an IT security model where, by default, no user or device is trusted inside or outside of the network. It offers policy-based controls rather than a legacy “castle and moat” architecture. It has been designed to prevent enterprise data breaches.

 

“Zero Trust Security is making the move from buzzword to serious consideration. WAN Managers recognize the opportunity in going beyond legacy models and exploring the potential of Zero Trust Security in their organizations,” said TeleGeography Analyst Elizabeth Thorne. “The challenge for CIOs is to understand the foundations necessary to make ZTS a viable security solution. For example, in order to have user or device-based security policies, you first need to identify every user and device on your network—no small task for many enterprises. Regardless, any time a new architecture is proposed there will be hesitation and a period of assessment before adoption ramps up.”    

 

The survey collects around 100 responses from companies ranging in size from SMEs to Fortune 500 enterprises. It includes in-depth interviews with 15 respondents across 2018-19 to contextualize survey answers. Participating companies had a median annual 2018 revenue of about $7 billion and most were multinational in scope. In addition to security, the report covers Wide Area Networking (WAN) technologies, data center trends, and cloud adoption.
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...