Reset

Study Finds Growth in Zero Trust Network Architecture Since Pandemic, Aims to Address Security Vulnerabilities & Concerns

November 18, 2020

Hikvision HikWire blog article Growth in Zero Trust Network Architecture Since Pandemic

Hikvision Senior Cybersecurity Director on Zero Trust to Reduce Vulnerabilities

 

A new report covered in the Security magazine article, “Sixty percent of organizations have accelerated zero trust projects in response to COVID-19,” found the majority of respondents are seeking to improve network security with Zero Trust since the pandemic hit.

Zero Trust is a security approach that aims to improve network architecture, making it more secure and reducing the chances of a successful security breach.

The “Enterprise Zero Trust Networking Strategies” survey covered in Security magazine was conducted by Enterprise Management Associates and Pulse Secure and includes feedback from more than 250 IT professionals.

“Enterprises are clearly accelerating efforts to adopt Zero Trust networking initiatives. The survey shows that organizations that move forward with formal initiatives and budget are more likely to achieve implementation success and operational gain. We appreciate Pulse Secure’s support and sponsorship of this report that organizations can use to benchmark and progress their Zero Trust programs,” said Shamus McGillicuddy, VP of research at Enterprise Management Associates, in the article.

The research also found that:

  • 85 percent of respondents have defined their Zero Trust plans.
     
  • The majority of organizations, 94 percent, stated their Zero Trust initiatives have been positive and successful.
     
  • 45 percent of Zero Trust projects were implemented using formal tools and processes for sharing across teams.

Hikvision’s senior director of cybersecurity, Chuck Davis, wrote about using the Zero Trust Network architecture to improve cybersecurity and address security concerns in SecurityInfoWatch.com. Davis confirmed that applying the architecture of Zero Trust is a sound approach to cybersecurity. Referencing insights from IBM, network compromises can come from nearly any source, and insider threats “account for 60 percent of cyberattacks.” Read more here.

IMPORTANT! This model requires non-standard firmware. Do Not Install standard firmware (e.g. v.4.1.xx) on this model. Doing so will permanently damage your system. You must use custom firmware v.4.1.25 from the iDS-9632NXI-I8/16S product page.

By downloading and using software and other materials available via this website, you agree to be legally bound by HIKVISION General Terms of Use . If you don’t agree to these terms, you may not download or use any of those materials.

If you are agreeing on behalf of your company, you represent and warrant that you have legal authority to bind your company to the General Terms of Use above. Also you represent and warrant that you are of the legal age of majority in the jurisdiction in which you reside (at least 18 years of age in many countries).