GoodAccess logo
Go back
Back
Go back
Back

68 % Companies See Zero Trust Network Access as Key to Mitigate Work-From-Anywhere Risks

White paper by EMA analysts show 68 % Companies See Zero Trust Network Access as Key to Mitigate Work-From-Anywhere Risks.

GoodAccess, the company reinventing secure cloud access for small and medium businesses, today announced a white paper presenting research from Enterprise Management Associates (EMA). According to EMA analysts, cloud-based zero-trust solutions minimize complexity and enable easy adoption by small and medium companies.

The paper also outlines how cloud-delivered solutions mitigate complexity and enable easy adoption by any type or size of company or organization. Cloud-based Zero Trust Network Access solutions eliminate the need for hardware and cumbersome software suites to simplify set-up and ongoing maintenance, so that even small and medium businesses can readily adopt its use. According to the white paper, “Cloud-delivered ZTNA can address many of the adoption barriers that smaller companies perceive with zero trust technologies in general.”

“Complexity has always been the enemy of security and the thing that keeps it from being implemented in the first place or used as directed in the second place,” said Michal Čížek, CEO and co-founder, GoodAccess. “GoodAccess has re-invented VPNs to be the means of providing Zero Trust Network Access to small and medium businesses by greatly reducing complexity, expense and necessary expertise. The research and white paper from EMA corroborate our strategy and underscore its necessity.”

While ZTNA provides a strong solution for “network-less” organizations where all or most employees are remote and applications and resources are cloud-based, many believe the technology is still out of reach of small and medium businesses. Results from a recent EMA survey show that:

  • 32% of IT organizations consider budget as a barrier to zero trust adoption. The subsequent white paper points out that, “A cloud-delivered ZTNA solution is typically priced for modest budgets since they require no capital outlay.”
  • 31% of IT organizations believe zero trust is too complex to implement. The white paper counters the concern, noting, “A cloud-based solution can mitigate the complexity because they require no on-premises hardware or software, aside from client agents. Also, cloud-delivered ZTNA technology is typically configured via a web-based or SaaS GUI console.”
  • 31% of the organizations believe that they lack personnel with zero trust skills. Again, the white paper answers those concerns, stating, “Cloud-delivered ZTNA offloads much of the engineering and administrative requirements to the provider.”

The paper shows how new solutions solve these traditional concerns by addressing cost, complexity and having necessary technological expertise. With cloud-based solutions, capital costs shift to affordable operational costs. Even more importantly, the complexity of installing and maintaining ZTNA becomes greatly simplified, with far less need for support time and expertise.

Commented Shamus McGillicuddy, vice president of Research, EMA, "The nature of work has permanently changed over the last few years. Hybrid and full remote work has become the standard for many companies. When businesses need to protect remote access to important business assets, cloud-delivered zero trust networking and security solutions are some of the main enablers of modern data security nowadays."

GoodAccess is a cloud-based SaaS application that enables organizations to create a resilient, Zero Trust network with identity- policy- and device-assessment-based access control and safe, deterministic connections to a company’s cloud-based applications and resources. GoodAccess provides physical and virtual network segmentation to reduce attack surface and resource access with protection from phishing and unwanted employee behavior. The solution enables compliance enforcement with user activity monitoring and storing logs for all the network communication and systems. A company’s risk and compliance administrator gain full visibility into who accesses your systems and when. Virtual access cards assign every user a private account and network identity.

Read a copy of the EMA white paper

Go back
Back
Go back
Back