Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Gaping holes in South African government cyber defences

      Gaping holes in South African government cyber defences

      2 April 2026
      EV charging start-up Charge bypasses JSE for token-based raise - Joubert Roux

      EV charging start-up Charge bypasses JSE for token-based raise

      2 April 2026
      Ring, reject, repeat: South Africa's spam call crisis

      Ring, reject, repeat: South Africa’s spam call crisis

      2 April 2026
      Four astronauts begin humanity's return to the moon - Artemis II

      Four astronauts begin humanity’s return to the moon

      2 April 2026
      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      1 April 2026
    • World
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
    • In-depth
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
    • TCS
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Organisations face big gaps in their Zero-Trust implementations

    Organisations face big gaps in their Zero-Trust implementations

    By Fortinet19 January 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has unveiled the Global State of Zero Trust Report. The Fortinet survey reveals that while most organisations have a vision of Zero Trust or are in the process of implementing Zero-Trust initiatives, more than half of organisations cannot translate this vision into the solutions they are implementing because they lack some basic core fundamentals of Zero Trust.

    For a detailed view of the findings and some important takeaways read the blog. Highlights of the report follow…

    A FortiGuard Labs Threat Landscape Report demonstrated an increase in the volume and sophistication of attacks targeting individuals, organisations and, increasingly, critical infrastructure. Organisations are looking for solutions to protect against these evolving threats and Zero Trust is top of mind – albeit for multiple reasons. Additionally, the shift to work-from-anywhere has put a spotlight on Zero-Trust network access (ZTNA) in particular, as organisations need to protect important assets from workers connecting from poorly protected home networks.

    Confusion over defining Zero-Trust strategies

    The report illustrates some confusion about what comprises a complete Zero-Trust strategy. Respondents indicated they understand Zero Trust (77%) and ZTNA (75%) concepts and over 80% reported already having a Zero-Trust and/or ZTNA strategy in place or development. Yet over 50% indicated being unable to implement core Zero-Trust capabilities. Nearly 60% indicated they do not have the ability to authenticate users and devices on an ongoing basis and 54% struggle to monitor users post-authentication.

    This gap is concerning because these functions are critical tenets of Zero Trust and it brings into question what the actual reality of these implementations is across organisations. Adding to the confusion are the terms “Zero Trust access” and “Zero Trust network access”, which are used sometimes interchangeably.

    Source: Fortinet

    Zero Trust is top of mind and priorities are varied

    Priorities for Zero Trust are “minimising the impact of breaches and intrusions”, followed closely by “securing remote access” and “ensuring business or mission continuity”. “Improving user experiences” and “gaining flexibility to provide security anywhere” were also top priorities.

    Source: Fortinet

    “Security across the entire digital attack surface” was the single most important benefit cited by respondents, followed by a “better user experience for remote work (VPN)”.

    Source: Fortinet

    A vast majority of the survey respondents believe that it is vital for Zero-Trust security solutions to be integrated with their existing infrastructure, work across cloud and on-premises environments, and be secure at the application layer. However, more than 80% of respondents indicated that it is challenging to implement a Zero-Trust strategy across an extended network. For organisations without a strategy in place or development, obstacles included a lack of skilled resources with 35% of organisations using other IT strategies to address Zero Trust.

    About the Zero-Trust report

    The report is based on a global survey of IT decision makers aimed at better understanding how far along organisations are in their Zero-Trust journeys. The survey is intended to better understand the following:

    • How well Zero Trust and ZTNA are understood.
    • The perceived benefits and challenges in implementing a Zero-Trust strategy.
    • Adoption of and the elements included in a Zero-Trust strategy.

    The survey was conducted in September 2021 with 472 IT and security leaders from 24 countries, representing nearly all industries, including the public sector.

    Additional resources

    • Read the blog for valuable takeaways from this survey or to access the full report.
    • Learn about how to better secure access for remote users to applications anywhere with Fortinet Zero Trust Network Access.
    • Learn more about how the Zero Trust Education Pathway including certifications from the Fortinet NSE Institute can help you navigate the knowledge, skills and abilities needed to grow your career in Zero-Trust access.
    • Watch how Fortinet makes possible a digital world you can always trust, and view how the Fortinet Security Fabric platform delivers broad, integrated, and automated protection across an organisation’s entire digital infrastructure.
    • Read more about how Fortinet customers are securing their organisations.
    • Engage in the Fortinet User Community (Fuse). Share ideas and feedback, learn more about our products and technology, and connect with peers.
    • Follow Fortinet on Twitter, LinkedIn, Facebook and Instagram. Subscribe to Fortinet on YouTube.

    About Fortinet
    Fortinet (Nasdaq: FTNT) makes possible a digital world that we can always trust through its mission to protect people, devices and data everywhere. This is why the world’s largest enterprises, service providers and government organisations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated and automated protections across the entire digital attack surface, securing critical devices, data, applications and connections from the data centre to the cloud to the home office. Ranking number one in the most security appliances shipped worldwide, more than 550 000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programmes in the industry to make cyber training and new career opportunities available to everyone. Learn more at www.fortinet.com, the Fortinet Blog or FortiGuard Labs.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Fortinet Zero Trust
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleGet the best education tools through Huawei Petal Search
    Next Article 6 security trends for another year of Covid

    Related Posts

    NEC XON expands cyber shield with Fortinet-backed managed services - Grant Ferreira

    NEC XON expands cyber shield with Fortinet-backed managed services

    3 July 2025
    Zero trust: why the future of security starts with a fundamental shift in thinking

    Zero trust: why the future of security starts with a fundamental shift in thinking

    15 May 2025
    NEC XON welcomes HPE acquisition of Juniper Networks - Anthony Laing

    NEC XON and Fortinet join forces to strengthen telco, ISP cybersecurity

    25 February 2025
    Add A Comment

    Comments are closed.

    Company News
    Synthesis helps financial enterprises transform with new Gemini Enterprise - Digicloud Africa

    Synthesis helps financial enterprises transform with new Gemini Enterprise

    2 April 2026
    The next churn wave is already in your contact centre conversations - CallMiner

    The next churn wave is already in your contact centre conversations

    2 April 2026
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Gaping holes in South African government cyber defences

    Gaping holes in South African government cyber defences

    2 April 2026
    EV charging start-up Charge bypasses JSE for token-based raise - Joubert Roux

    EV charging start-up Charge bypasses JSE for token-based raise

    2 April 2026
    Ring, reject, repeat: South Africa's spam call crisis

    Ring, reject, repeat: South Africa’s spam call crisis

    2 April 2026
    Amazon in talks to buy satellite operator Globalstar

    Amazon in talks to buy satellite operator Globalstar

    2 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}