For every ten data breaches, seven (68%) involved a non-malicious human element, such as a person victim of an attack, according to a 2024 Verizon Business report. This number shows that employees believe their corporate networks are protected against fraud and attacks — and it is precisely this false sense of security that the Zero Trust strategy aims to combat.
“To understand the concept, you first need to recognize the problem it aims to solve: excessive trust in corporate networks,” explains Luiz Wagner Grilo, head of the business unitnetwork & cybersecurityandYou are welcome., distributor of technological solutions for companies.
The premise “distrust everything and everyoneIt will ensure that every access, whether internal or external, is authenticated and monitored. According to Gartner estimates, 63% of companies worldwide have already adopted Zero Trust, either partially or fully. For 78% of these organizations, this strategy accounts for up to 25% of the total cybersecurity budget.
The concept emerged in 2010 with the proposal to complement the already traditional VPNs (virtual private networksvirtual private networks, in free translation) through the combination of administrative controls. Grilo also emphasizes that, unlike traditional approaches that segment the network into zones with different levels of trust, Zero Trust operates on the principle that no entity, whether internal or external, is trustworthy by default.
“Zero TrustIn addition to being a technological architecture, it is a change in organizational mindset that redefines how security controls are implemented. Contrary to what many believe, it is not just a cybersecurity solution, but rather a new culture to fix system flaws," analyzes the specialist innetwork & cybersecurity.
With the accelerated adoption of Cloud Services, Check Point's 2024 Global Cloud Security Report revealed a significant jump in the number of corporations concerned with enterprise protection, rising from 24% in 2023 to 61% in 2024 – a growth of 154%.
However, by adopting Zero Trust, organizations and their IT teams need to understand that this is an ongoing process, not a final destination. "The journey towards zero trust evolves as various factors change, such as the company's needs, the growth of network usage through applications, platforms, and new technologies, the evolution of connected devices, user profiles, and emerging threats that require new security solutions implemented by the responsible team," concludes the executive.