Assessment and benchmark
research powered by ESG
Assessment and benchmark
research powered by ESG
Thank you for taking Illumio’s Zero Trust Segmentation assessment. The goal of this assessment is to give you data driven insights about your organization’s progress toward achieving Zero Trust Segmentation, complete with recommendations specific to your current state.
To power this assessment, we partnered with ESG to survey 1,000 of your peers across the globe. Based on this benchmark dataset, we identified 5 critical aspects of technologies needed to become a Pioneer on Zero Trust Segmentation. And the research validated that organizations with segmentation technologies that deliver these key capabilities enjoy dramatically improved security outcomes.
Below you will see how your organization compares to the market in general, as well as surveyed Pioneers on key questions. By working to close the gaps you see, your organization will move up the maturity curve so you can gain better visibility to network activity and traffic patterns in your environment, segment and protect your organization’s mission-critical digital assets, and limit the scope of inevitable security incidents to respond faster and keep incidents from becoming cyber disasters.
Based on your responses your organization is
Where you stand: 99% of respondents we surveyed are at least interested in Zero Trust as a broad concept, though just 36% have implemented or begun to implement Zero Trust across their entire IT footprint. This tells us two things:
Why it matters: Breadth of segmentation is one aspect of achieving Zero Trust Segmentation. But just as important are the capabilities of your organization’s segmentation solutions.
To measure and organizations’ ability to deliver on the promise of Zero Trust Segmentation, this assessment looks at several key capabilities:
We hope this assessment, and the research that underpins it, has helped you better understand the state of the market with respect to cloud-native security maturity and your organization’s progress towards becoming a leader. As a cohort, leaders have identified the key security capabilities to embed into their cloud-native development processes: