Securing the enterprise
Understanding the current landscape of zero trust security
About this Report
To keep up with the rapidly evolving landscape of threats, enterprises must adopt modern approaches to security. The zero trust approach to security is designed to reduce the attack surface by establishing trust in users and machines/devices through authentication, access policies, and security monitoring. In this report, commissioned by Cisco and authored by SlashData, we investigate the adoption of different zero trust approaches and the challenges they present.
Key Questions Answered
What are the most common approaches to achieving zero trust security amongst enterprise developers?
What factors influence the adoption of zero trust security amongst enterprise developers?
What are the top challenges in addressing software security for enterprise developers?
Click to expand
Methodology
The findings of this report are based on data collected from an online survey designed, produced, and carried out by SlashData, which reached over 800 enterprise software developers worldwide over a period of four weeks in Q4 2022 (18th of November –16th of December).