Zscalerのブログ

Zscalerの最新ブログ情報を受信

Products & Solutions

81% of Companies Embrace Zero Trust: The New Cyber Defense Norm

image

A recent survey of cybersecurity professionals reveals that 81% of organizations are adopting zero trust as the cornerstone of their cybersecurity strategies. Driven by concerns over advanced threats, VPN security issues, network complexity, and adversarial AI, enterprises are shifting from firewall-and-VPN based architecture to a more robust zero trust approach.

Additionally, 62% of organizations plan to integrate AI into their defenses, and more than half intend to boost their security budgets. The survey highlights the current challenges and priorities of IT and security professionals. For deeper insights, download the Zscaler State of Cyberthreats and Protection Report, which analyzes the findings of a ViB survey commissioned by Zscaler.

In recent years, a surge in cyberattacks has left businesses grappling with financial losses and reputational damage. Ransomware in particular is causing significant anxiety among security professionals, with 72% of survey respondents listing it as their top concern. Zscaler ThreatLabz research confirms that ransomware attacks will become more advanced and persistent. The Zscaler ThreatLabz 2024 Ransomware Report revealed a record-breaking ransom payment of $75 million to the Dark Angels ransomware group last year.

Phishing (69%) and zero-day exploits (48%) were also major concerns. The Zscaler ThreatLabz team noted that phishing threats have reached new heights of sophistication in the past year, largely due to the rise of generative AI tools. This technological advancement is fundamentally transforming and reshaping the phishing threat landscape.

Image

This rise in cyberthreats isn't just about quantity; it reflects a dynamic and increasingly sophisticated landscape where attackers are continually refining their methods to outpace even the most well-defended networks.

In fact, the traditional VPN-based architecture emerged as a significant risk in 2024, with numerous vulnerabilities being repeatedly exploited. The recurring zero-day attacks on VPNs highlight that the core issue lies in the outdated architecture rather than any specific vendors. Survey responses underscore this concerning trend, with one in four respondents planning to transition away from a VPN-based architecture.

AI has transcended its role as a groundbreaking innovation to become an integral part of daily business operations, deeply embedded in the core of enterprise activities. However, the challenges of securely adopting AI tools and defending against AI-driven threats remain unresolved.

Cybercriminals are increasingly using sophisticated AI methods to bypass traditional security protocols, crafting meticulously targeted and complex attacks that exploit vulnerabilities in security frameworks.

Security teams are taking notice. Over 95% of survey respondents are concerned about adversarial AI's ability to evade established cybersecurity defenses.

Image

The use of adversarial AI in cyberattacks is a growing threat that organizations must acknowledge and prepare to combat. As AI technologies become more accessible and powerful, the complexity and scope of these attacks are expected to increase. While AI poses a significant challenge to security teams, it also offers the potential for proactive prevention. The future will likely see organizations fighting AI with AI.

AI is revolutionizing security by offering unparalleled capabilities to identify, thwart, and address threats with speed and precision. As cyberthreats grow in complexity and agility, AI's real-time surveillance and swift response are invaluable. By analyzing vast amounts of data and uncovering subtle patterns that might elude traditional security measures, AI enables organizations to stay proactive and strengthen their defense strategies.

62% of survey respondents plan to leverage AI capabilities in their cyber defenses within the next two years. Implementing zero trust and smart vulnerability management can help prevent attacks by proactively reducing the attack surface and minimizing real risks.

Image

Zero trust, a cybersecurity strategy that employs least-privileged access controls, microsegmentation, and strict user authentication to minimize risk, is gaining traction among the companies surveyed. When asked about their zero trust approach, 81% of respondents reported that they are either rolling out, planning to implement, or have already deployed a zero trust approach to security. This high level of interest is likely due to the benefits of a well-tuned zero trust architecture, including simpler network infrastructure, a better user experience, and enhanced cyberthreat defense. Only 15% of respondents do not have plans to adopt zero trust this year.

Prospective buyers of zero trust solutions consider several factors. Price is the most important for 56%, followed by robustness (54%) and integration with existing security solutions (53%). Ease of use and scalability are also significant, as are a proven presence in a particular industry and the breadth of the platform. For more insights on zero trust and key implementation elements, check out the Seven Questions Every CxO Must Ask About Zero Trust ebook.

Image

Enterprises are becoming increasingly aware of the need to enhance and streamline their cybersecurity efforts in response to the growing number and sophistication of cyberthreats. Traditional VPN- and firewall-centric approaches are falling short due to limitations in scale, complex administration, and vulnerability to exploits.

Zero trust is expected to be a defining trend in the cybersecurity landscape by 2025. This proactive approach is not just a response to current challenges; it is a strategic investment in preparing for future threats.

The AI-powered Zscaler Zero Trust Exchange™ offers comprehensive zero trust cyberthreat protection at the speed and scale of the cloud. Built on the principle of least privilege, its proxy architecture minimizes the attack surface, prevents compromise, eliminates lateral movement, and stops data loss.

Access the full report for in-depth insights. Download the Zscaler State of Cyberthreats and Protection Report now.

form submtited
お読みいただきありがとうございました

このブログは役に立ちましたか?

免責事項:このブログは、Zscalerが情報提供のみを目的として作成したものであり、「現状のまま」提供されています。記載された内容の正確性、完全性、信頼性については一切保証されません。Zscalerは、ブログ内の情報の誤りや欠如、またはその情報に基づいて行われるいかなる行為に関して一切の責任を負いません。また、ブログ内でリンクされているサードパーティーのWebサイトおよびリソースは、利便性のみを目的として提供されており、その内容や運用についても一切の責任を負いません。すべての内容は予告なく変更される場合があります。このブログにアクセスすることで、これらの条件に同意し、情報の確認および使用は自己責任で行うことを理解したものとみなされます。

Zscalerの最新ブログ情報を受信

このフォームを送信することで、Zscalerのプライバシー ポリシーに同意したものとみなされます。