![]() ![]() A full 86% of those surveyed acknowledged that they do have legacy systems that need to be secured. One challenge in shifting applications to the cloud rests with legacy systems that can't easily be migrated. ![]() However, almost three-quarters admitted that they see an advantage in outsourcing their Zero Trust architecture components from fewer vendors as a way to simplify the strategy. Only 47% of the respondents said they've executed Zero Trust principles and policies. But Zero Trust, which increasingly is being advocated as a more effective strategy, is lower on the list. Among other security goals that have been initiated, multi-factor authentication has been started by 82% of those surveyed, single sign-on by 80%, identity access management by 74% and privileged access management by 60%.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |