Sunnyvale, CA — June 1, 2022 — Illumio, Inc., the Zero Trust Segmentation company, today released The Zero Trust Impact Report, the industry’s first research on market perspectives of Zero Trust strategies and the business impact of Segmentation technology. Conducted by The Enterprise Strategy Group (ESG), which surveyed 1,000 IT and security professionals in eight countries, the report discovered that 47 percent of security leaders do not believe they will be breached despite increasingly sophisticated and frequent attacks, broad adoption of Zero Trust technologies, and the proven business and security impact of Zero Trust Segmentation, which isolates workloads and devices across the hybrid attack surface to stop breaches from spreading. Key findings include:
- Severity and Frequency of Attacks Are Still Rising: In the past two years alone, more than three-quarters of organizations surveyed (76 percent) have been attacked by ransomware and two-thirds (66 percent) have experienced at least one software supply chain attack. More than half (52 percent) believe cyberattacks will result in catastrophic breaches.
- Zero Trust is Now the Standard: 90 percent state that advancing Zero Trust strategies is one of their top three security priorities this year as a way to improve cyber resiliency and reduce the rising threat of attacks turning into disasters.
- Segmentation is a Critical Pillar of Every Zero Trust Strategy: 75 percent of segmentation pioneers, those who are classified as advanced users, believe purpose-built segmentation tools are critical to Zero Trust and 81 percent say segmentation is an important technology to Zero Trust.
- Zero Trust Segmentation Has a Quantifiable Business Impact: Organizations that have adopted Zero Trust Segmentation as part of their Zero Trust strategy save an average of $20.1 million in application downtime, avert 5 cyber disasters per year, and plan to accelerate 14 more digital and cloud transformation projects over the next year.
“Catastrophic breaches keep happening despite another year of record cybersecurity spending. Money will not make the problem go away until security leaders move beyond the legacy approach to only focus on detection and perimeter protection,” said PJ Kirner, Illumio co-founder and CTO. “I’m shocked that nearly half of those surveyed in The Zero Trust Impact Report do not think a breach is inevitable, which is the guiding principle for Zero Trust, but I am encouraged by the hard business returns Zero Trust and Segmentation deliver. Zero Trust Segmentation is emerging as a true market category that is transforming business operations and strengthening cyber resiliency.”
Attacks Abound in a Hyperconnected World
Hyperconnectivity created by digital transformation has expanded the attack surface and exposed organizations to risks never faced before. While respondents have significant concerns about many attack types, supply chain, zero-day, and ransomware attacks top the list.
- Respondents say software supply chain attacks (48 percent), zero-day exploits (46 percent) and ransomware attacks (44 percent) are the three threats that keep them up at night.
- More than one-third of respondents (36 percent) have been the victims of a successful ransomware attack over the past two years.
- 82 percent of respondents who were victims of a successful attack paid a ransom (42 percent paid ransom directly; 40 percent paid via cyber insurance) with the average ransom netting $495,000.
Organizations Must Assume Breach and Adopt Zero Trust
A Zero Trust approach, rooted in an assume breach mindset, is the modern strategy to reduce risk and increase cyber resiliency. 52 percent of security teams believe that their organization is ill-prepared to withstand the cyberattacks to come (22 percent say a breach would “definitely” result in business disaster; 30 percent say it “probably” would be a disaster), but Zero Trust adoption is rising fast:
- Nine in ten (90 percent) report Zero Trust is one of their top three cybersecurity priorities, and 33 percent say Zero Trust is their top cybersecurity priority.
- 39 percent of all security spending over the next 12 months is earmarked to advance Zero Trust initiatives.
- Segmentation pioneers are nearly twice as likely to be able to stop breaches from spreading than peers who do not fully utilize segmentation (81 percent vs. 45 percent).
A whopping 96 percent of buyers prefer technologies with best-of-breed capabilities as opposed to broad platforms. 75 percent of segmentation pioneers believe purpose-built segmentation tools are critical to Zero Trust.
You Cannot Achieve Zero Trust without Zero Trust Segmentation
Zero Trust Segmentation is a modern approach to stop breaches from spreading across hybrid IT, from the cloud to the data center. Today, a vast majority of respondents consider Zero Trust Segmentation essential to any successful Zero Trust initiative (81 percent), and the report found that segmentation pioneers:
- Are 2.7X more likely to have highly effective attack response processes.
- Are 2.1X more likely to have avoided a critical outage during an attack over the last 24 months.
- Save $20.1M in annual cost of downtime.
- Are able to free up 39 person-hours per week.
- Avert 5 cyber disasters annually.
- Are accelerating digital transformation for competitive advantage with 14 more digital and cloud transformation projects planned over the next 12 months.
For more information, download a copy of The Zero Trust Impact Report.
In February 2022, Illumio commissioned ESG to conduct a 1,000-person global study on the current state of Zero Trust strategies and the impact of segmentation. The findings incorporate sentiment from senior information security and IT professionals across North America, Europe, Asia Pacific, and Japan.
Illumio, the Zero Trust Segmentation company, prevents breaches from spreading and turning into cyber disasters. Illumio protects critical applications and valuable digital assets with proven segmentation technology purpose-built for the Zero Trust security model. Illumio ransomware mitigation and segmentation solutions see risk, isolate attacks, and secure data across cloud-native apps, hybrid and multi-clouds, data centers, and endpoints, enabling the world’s leading organizations to strengthen their cyber resiliency and reduce risk.