{"id":94833,"date":"2021-07-28T09:00:40","date_gmt":"2021-07-28T16:00:40","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=94833"},"modified":"2023-05-15T23:13:16","modified_gmt":"2023-05-16T06:13:16","slug":"zero-trust-adoption-report-how-does-your-organization-compare","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/07\/28\/zero-trust-adoption-report-how-does-your-organization-compare\/","title":{"rendered":"Zero Trust Adoption Report: How does your organization compare?"},"content":{"rendered":"
From the wide adoption of cloud-based services to the proliferation of mobile devices. From the emergence of advanced new cyberthreats to the recent sudden shift to remote work. The last decade has been full of disruptions that have required organizations to adapt and accelerate their security transformation. And as we look forward to the next major disruption\u2014the move to hybrid work\u2014one thing is clear: the pace of change isn\u2019t slowing down.<\/p>\n
In the face of this rapid change, Zero Trust<\/a> has risen as a guiding cybersecurity strategy for organizations around the globe. A Zero Trust security model assumes breach and explicitly verifies the security status of identity, endpoint, network, and other resources based on all available signals and data. It relies on contextual real-time policy enforcement to achieve least privileged access and minimize risks. Automation and machine learning are used to enable rapid detection, prevention, and remediation of attacks using behavior analytics and large datasets.<\/p>\n Early adopters are seeing the benefits\u2014organizations operating with a Zero Trust mindset across their environments are more resilient, responsive, and protected than those with traditional perimeter-based security models.<\/p>\n Today, we are publishing our Zero Trust Adoption Report 2021<\/a>. In this report, we surveyed or interviewed more than 1,200 security decision-makers over a 12-month timeframe about their Zero Trust adoption journey. Highlights from our research include:<\/p>\n <\/a><\/p>\n This report showcases the Zero Trust adoption progress for organizations across diverse markets and industries. We hope that this research can help you accelerate your own Zero Trust adoption strategy, uncover the collective progress and prioritizations of your peers, and gain insights into the future state of this rapidly evolving space.<\/p>\n Read the full Microsoft Zero Trust Adoption Report<\/a> for full details.<\/p>\n For an in-depth look at our latest updates that will help accelerate your Zero Trust journey, check out Vasu Jakkal\u2019s blog,\u00a0How to secure your hybrid work world with a Zero Trust approach<\/a>, from earlier this month.<\/p>\n For technical guidance, visit our\u00a0Zero Trust Guidance Center<\/a>, a repository of information that provides specific guidance on implementing Zero Trust principles across their identities, endpoints, data, applications, networks, and infrastructure.<\/p>\n Check out the Microsoft Zero Trust Assessment tool<\/a> to help you determine where you are in your Zero Trust implementation journey and offer action items to help reach key milestones.<\/p>\n For more information about Microsoft Zero Trust, please\u00a0visit our website<\/a>, and check out our deployment guides<\/a> for step-by-step technical guidance.<\/p>\n To learn more about Microsoft Security solutions,\u00a0visit our\u00a0website<\/a>.\u00a0Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" The last decade has been full of disruptions that have required organizations to adapt and accelerate their security transformation. As we look forward to the next major disruption\u2014the move to hybrid work\u2014one thing is clear: the pace of change isn\u2019t slowing down.<\/p>\n","protected":false},"author":106,"featured_media":94842,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3665,3689],"products":[],"threat-intelligence":[],"tags":[3824,3822],"coauthors":[2400],"class_list":["post-94833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-analyst-reports","topic-zero-trust","tag-hybrid-work","tag-microsoft-security-insights"],"yoast_head":"\nZero Trust adoption is accelerating<\/h2>\n
\n
Additional resources<\/h2>\n