The term Zero Trust has been used as a buzzword in the IT industry, but it continues to be considerably vague when it comes to adoption strategies.
According to NIST definitions, the main goal of Zero Trust is to “prevent unauthorised access to data and services, coupled with making the access control as granular as possible”, and this is very important for the modern workplace.
With the change in the traditional workplace, where the industry witnessed an explosion of remote staff and essential third-party remote connections (e.g. supply chain, IT support), deploying the Zero Trust fundamentals by limiting privileges has become more critical than ever.
To find out the state of Zero Trust in a perimeter-less digital world, BeyondTrust partnered with iTNews Asia to survey 102 IT and business leaders across Asia on their experiences with cyber security and their preparedness to mitigate the challenges.
The research found business and IT leaders are aware of Zero Trust, and increasing the implementation of Zero Trust is a top cyber security priority for the next 12 to 18 months.
However, while a third of respondents said reducing endpoint security threats is a priority, Windows endpoints still lag behind Mac endpoints and Linux servers when it comes to removal (or planned removal) of local admin rights from users.
This leaves organisations vulnerable to threats that leverage these very privileges.
To see what else we learnt, download the free infographic.