Here are the top statistics to help you build your Zero Trust Network Access (ZTNA) business case.

ZTNA trends

Many businesses are trialing ZTNA solutions as part of vendor selection.

  • By 2022, 80% of new digital business applications opened up to ecosystem partners will be accessed through zero trust network access (ZTNA) – Gartner
  • By 2023, 60% of enterprises will phase out most of their remote access virtual private networks (VPNs) in favor of ZTNA – Gartner
  • By 2023, 40% of enterprises will have adopted ZTNA for other use cases described in this research – Gartner

Remote access trends

Unlike the appliance architecture, Cloud-based ZTNA solutions can scale with the increasing demand from workers for connectivity.

  • 76% of enterprises expect to increase the amount of remote access over the next 2 years – IDC
  • Gartner CFO Survey Reveals 74% Intend to Shift Some Employees to Remote Work Permanently – Gartner
  • 68% of employees indicate that remote working benefits their life-work balance – Polycom
  • Overall, companies expect approximately 40% of employees to utilize a remote working model in the future – BCG

Cloud trends

SaaS and private cloud apps are hard to manage with boundary security solutions, ZTNA supports a perimeter-less security strategy and the protection of cloud resources.

  • Enterprises already run 77 percent of their workloads in the cloud – CIO.com
  • 58.4% of sensitive data in the cloud is stored in Microsoft Office documents – McAfee
  • By 2021, more than 70% of business users will be substantially provisioned with cloud office capabilities – Gartner

3rd party access trends

  • 42 percent of businesses worry about the loss of confidential information due to the use of contractors – Deloitte
  • 83% of business leaders believe that contractors are more or equally as productive as full-time employees – Workmarket
  • 48% of respondents believe that contractors leave their company exposed to significant compliance risk – Workmarket

Security challenges

Threats are becoming increasingly sophisticated and the architecture of traditional tools prevents them from sufficiently protecting businesses. ZTNA overcomes all of these weaknesses.

Endpoint security

Identity authentication is no longer enough, hackers are piggy-backing on the compromised devices of legitimate users to gain entry to corporate systems.

  • 40% of cyber breaches actually originate with authorized users accessing unauthorized systems – IDC
  • 87% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types – Verizon
  • 70% of Successful Breaches Originate on the Endpoint – IDC
  • By 2025, more than 85% of successful attacks against modern enterprise user endpoints will exploit configuration and user errors, rather than make use of advanced malware – Gartner

Lateral movement

With malicious groups navigating the enterprise network, the weakest link in a network can put the rest of the applications and data at risk.

  • 77% of IT professionals believe that network segmentation can help prevent server compromise – SANS Institute
  • Nearly 60% of attacks involve lateral movement – VMWare

Privilege access

Over privileged accounts with authorization to access too much are frequently exploited by attackers get access to sensitive information.

  • 71.4% of organizations have at least one compromised account a month – McAfee
  • 57.1% of organizations have at least one insider threat a month – McAfee
  • 45.9% of organizations have at least one privileged user threat a month – McAfee
  • Least privilege to be considered best practice by many CISOs, with 73% of them citing the implementation of least privilege as the top challenge – IDC
  • 73% of CISO identify least privilege access to cloud data as a critical challenge – IDC

Compliance

With increasing regulation organizations are being held to higher standards, but legacy tools do not provide sufficient visibility to verify compliance.

  • 65% of IT managers security and governance as the top cloud challenge (up from 58% in 2019) – Denodo
  • 66% of CISO identify visibility into structured data usage in the cloud as a critical challenge – IDC
  • 80% of systems have at least one CVE vulnerability – Edgesecure
  • 63% of CISO identify setting and enforcing data access policies across multiple clouds as a critical challenge – IDC
  • 63% of CISO identify tracking and monitoring privileged access and configuration changes in cloud environments as a critical challenge – IDC

VPN issues

Despite remaining popular, VPN is now over 25 years old and is frequently exploited during attacks.

  • VPN was being used in 68% of major incidents involving remote access tools – IDC

Operational challenges

Point solutions are making the technology stack increasingly complex and much harder for IT teams to manage effectively, ZTNA services offer integrated and automated workflows to streamline management.

  • 50%+ of businesses report they use more than 10 network and application components to add a new external user group to an organization -IDC
  • 39% of businesses juggle 11 to 30 monitoring tools in an effort to monitor their application, infrastructure and cloud environments – with 8% using between 21 and 30 tools – 451 Research
  • According to a Forrester survey of IT decision-makers, 55% of respondents report having 20 or more tools between security and operations, and 70% say these tools lack full integration – Forrester
  • 52% of businesses have difficulty integrating disparate security solutions – IDC
  • 66% of CISO identify lack of integration for data protection solutions as a critical challenge – IDC