{"id":92562,"date":"2021-01-25T11:00:14","date_gmt":"2021-01-25T19:00:14","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92562"},"modified":"2023-05-15T23:03:02","modified_gmt":"2023-05-16T06:03:02","slug":"how-companies-are-securing-devices-with-zero-trust-practices","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/","title":{"rendered":"How companies are securing devices with Zero Trust practices"},"content":{"rendered":"

Organizations are seeing a substantial increase in the diversity of devices accessing their networks. With employees using personal devices and accessing corporate resources from new locations in record numbers, IT leaders are seeing an increase in their attack surface area. They\u2019re turning to Zero Trust security models to ensure they have the visibility they need, and their data is protected as its accessed from outside the corporate network using a wider variety of devices.<\/p>\n

We surveyed IT leaders around the world to determine how they\u2019re using Zero Trust practices to protect their devices and enable access to the corporate network from unsecured devices.<\/p>\n

\"A<\/a><\/p>\n

    \n
  1. More personal devices are accessing corporate resources than ever.<\/strong> In response to the substantial shift to remote work, IT leaders report seeing more of their employees using personal devices to access their networks. As a result, they\u2019re prioritizing device management solutions to improve security and control on personal devices.<\/li>\n
  2. Devices accessing the network are monitored but often left out of access decisions.<\/strong> While most IT leaders report that they\u2019re monitoring device health and compliance, the majority aren\u2019t currently using that status in their access decision making. Preventing unauthorized and risky devices is critical to protecting corporate data in a modern environment.<\/li>\n
  3. Personal devices are widely agreed to increase risk exposure.<\/strong> Over 92 percent of IT leaders agree that a proliferation of personal devices is increasing their attack surface area. However, much less say they\u2019re prepared for managing access from unsecured devices.<\/li>\n<\/ol>\n

    Check out the infographic for more details<\/a>.<\/p>\n

    If you\u2019re looking at how to help prevent devices from being the weakest link in your security strategy, check out our Zero Trust deployment guidance for endpoints<\/a>.<\/p>\n

    To learn more about Microsoft Security solutions visit our website<\/a>.\u00a0 Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Organizations are seeing a substantial increase in the diversity of devices accessing their networks. With employees using personal devices and accessing corporate resources from new locations in record numbers, IT leaders are seeing an increase in their attack surface area. They\u2019re turning to Zero Trust security models to ensure they have the visibility they need, […]<\/p>\n","protected":false},"author":96,"featured_media":92563,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3670,3689],"products":[],"threat-intelligence":[],"tags":[3822,3809],"coauthors":[2174],"class_list":["post-92562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-device-management","topic-zero-trust","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\nHow companies are securing devices with Zero Trust practices | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How companies are securing devices with Zero Trust practices | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Organizations are seeing a substantial increase in the diversity of devices accessing their networks. With employees using personal devices and accessing corporate resources from new locations in record numbers, IT leaders are seeing an increase in their attack surface area. They\u2019re turning to Zero Trust security models to ensure they have the visibility they need, […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-25T19:00:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:03:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1152\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nupur Goyal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nupur Goyal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/nupur-goyal\/\",\"@type\":\"Person\",\"@name\":\"Nupur Goyal\"}],\"headline\":\"How companies are securing devices with Zero Trust practices\",\"datePublished\":\"2021-01-25T19:00:14+00:00\",\"dateModified\":\"2023-05-16T06:03:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/\"},\"wordCount\":330,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg\",\"keywords\":[\"Microsoft Security Insights\",\"Security strategies\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/\",\"name\":\"How companies are securing devices with Zero Trust practices | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg\",\"datePublished\":\"2021-01-25T19:00:14+00:00\",\"dateModified\":\"2023-05-16T06:03:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg\",\"width\":1152,\"height\":768,\"caption\":\"Two adults in an office adjacent to a warehouse setting collaborating while overlooking dual monitors.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How companies are securing devices with Zero Trust practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How companies are securing devices with Zero Trust practices | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/","og_locale":"en_US","og_type":"article","og_title":"How companies are securing devices with Zero Trust practices | Microsoft Security Blog","og_description":"Organizations are seeing a substantial increase in the diversity of devices accessing their networks. With employees using personal devices and accessing corporate resources from new locations in record numbers, IT leaders are seeing an increase in their attack surface area. They\u2019re turning to Zero Trust security models to ensure they have the visibility they need, […]","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-01-25T19:00:14+00:00","article_modified_time":"2023-05-16T06:03:02+00:00","og_image":[{"width":1152,"height":768,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg","type":"image\/jpeg"}],"author":"Nupur Goyal","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg","twitter_misc":{"Written by":"Nupur Goyal","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/nupur-goyal\/","@type":"Person","@name":"Nupur Goyal"}],"headline":"How companies are securing devices with Zero Trust practices","datePublished":"2021-01-25T19:00:14+00:00","dateModified":"2023-05-16T06:03:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/"},"wordCount":330,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg","keywords":["Microsoft Security Insights","Security strategies"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/","name":"How companies are securing devices with Zero Trust practices | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg","datePublished":"2021-01-25T19:00:14+00:00","dateModified":"2023-05-16T06:03:02+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/01\/SUR20_Pro7_Contextual_02555_RGB.jpg","width":1152,"height":768,"caption":"Two adults in an office adjacent to a warehouse setting collaborating while overlooking dual monitors."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/25\/how-companies-are-securing-devices-with-zero-trust-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"How companies are securing devices with Zero Trust practices"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/92562"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=92562"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/92562\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/92563"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=92562"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=92562"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=92562"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=92562"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=92562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=92562"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=92562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}