top of page

Securing the enterprise

Understanding the current landscape of zero trust security

free-reports copy2.png
8320.jpg

About this Report

To keep up with the rapidly evolving landscape of threats, enterprises must adopt modern approaches to security. The zero trust approach to security is designed to reduce the attack surface by establishing trust in users and machines/devices through authentication, access policies, and security monitoring. In this report, commissioned by Cisco and authored by SlashData, we investigate the adoption of different zero trust approaches and the challenges they present.

Key Questions Answered

  • What are the most common approaches to achieving zero trust security amongst enterprise developers?

  • What factors influence the adoption of zero trust security amongst enterprise developers?

  • What are the top challenges in addressing software security for enterprise developers?

Click to expand

Methodology

The findings of this report are based on data collected from an online survey designed, produced, and carried out by SlashData, which reached over 800 enterprise software developers worldwide over a period of four weeks in Q4 2022 (18th of November –16th of December).

RESEARCH_SPACE_8.jpg

Contact us

bottom of page