{"id":19067,"date":"2021-08-25T22:42:58","date_gmt":"2021-08-25T22:42:58","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19067"},"modified":"2021-08-25T22:43:00","modified_gmt":"2021-08-25T22:43:00","slug":"zero-trust-challenges","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/","title":{"rendered":"Zero Trust Can&#8217;t Protect Everything. Here&#8217;s What You Need to Watch."},"content":{"rendered":"\n<p>Zero trust architecture is an emerging technology in cybersecurity that offers an alternative to the traditional castle-and-moat approach to security. Instead of focusing only on your perimeter to defend against attacks from the outside, zero trust assumes that threats are ubiquitous and pervasive. Therefore, each user, device, and application within your network must verify that it isn&#8217;t a threat before it can proceed.<\/p>\n\n\n\n<p>As Sam Ingalls writes in his <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-zero-trust\/\">How to Implement Zero Trust<\/a> article, &#8220;a zero trust strategy centers around refined controls to improve and rightfully restrict access to your network and applications. By limiting movement, you mitigate the risk of malicious actors accessing key segments.&#8221; Zero trust is a critical tool in the security defense arsenal, especially as more companies shift to a fully remote or hybrid work environment. However, zero trust also comes with its own set of challenges that are important to understand to ensure effective implementation.<\/p>\n\n\n\n<p>Jump to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#gaps\">Moving to zero trust can create cybersecurity gaps<\/a><\/li><li><a href=\"#maintenance\">Zero trust architecture requires perpetual maintenance<\/a><\/li><li><a href=\"#insider-threats\">Insider threats are still a risk<\/a><\/li><li><a href=\"#productivity\">Zero trust models can inhibit productivity<\/a><\/li><li><a href=\"#overcoming-challenges\">Overcoming zero trust challenges<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"gaps\">Moving to zero trust can create cybersecurity gaps<\/h2>\n\n\n\n<p>One of the fastest lessons to learn with zero trust is that implementation is often neither quick nor easy. It can be a very drawn-out process that requires your SecOps team to re-envision your business&#8217;s security model from top to bottom.<\/p>\n\n\n\n<p>This also means many IT and business professionals must adjust their way of thinking when it comes to cybersecurity. Instead of trusting that your security infrastructure is foolproof like they&#8217;ve been conditioned to believe, they must assume the opposite is true and that your systems are <em>already<\/em> in jeopardy.<\/p>\n\n\n\n<p>It&#8217;s usually best to move from legacy security systems to a zero trust framework gradually over time rather than abruptly implementing multiple changes at once. Prioritize the systems, users, and workflows that engage with the most sensitive data so that you can assign them the strictest access controls. A longer timeline will help the transition go more smoothly and give employees more time to adjust to the new security environment and related processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"maintenance\">Zero trust architecture requires perpetual maintenance<\/h2>\n\n\n\n<p>Many security professionals also underestimate the time and effort required to maintain a zero trust environment once it&#8217;s implemented. Unlike some security systems, zero trust is anything but a passive approach to defending against cyber threats.<\/p>\n\n\n\n<p>Most businesses are constantly growing and evolving, and it&#8217;s essential that the intricate <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-microsegmentation\/\">microsegmentation<\/a> permission structure keep pace with the rate of change. Relevant changes may include new hardware or software deployments, changes in an employee&#8217;s responsibilities, new customer or staff accounts, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patches<\/a> or updates to existing systems.<\/p>\n\n\n\n<p>User permissions must be precisely and appropriately defined at all times for a zero trust model to be effective. Otherwise, unauthorized users will be able to access data and resources they shouldn&#8217;t. In a best-case scenario, this may mean an employee has more privileges than they need, but it could also mean bad actors can reach deep into your business systems and hold them hostage\u2014or worse. Monitoring tools can help spot irregularities, but perpetual, proactive maintenance is required to prevent a worst-case scenario.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"insider-threats\">Insider threats are still a risk<\/h2>\n\n\n\n<p>Zero trust and microsegmentation are based on the premise of least privilege, which attempts to limit each user&#8217;s access to the bare minimum they need to do their job. However, this doesn&#8217;t address a glaring issue staring everyone in the face: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">social engineering<\/a>. Social engineering attacks like phishing, scareware, and deep fakes are frequent tactics hackers use to gain access to your business systems from the inside.<\/p>\n\n\n\n<p>These kinds of insider threats cost businesses an average of $2.79 million annually, according to the <a href=\"https:\/\/www.exclusive-networks.com\/uk\/wp-content\/uploads\/sites\/28\/2020\/12\/UK-VR-Proofpoint-Report-2020-Cost-of-Insider-Threats.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2020 Cost of Insider Threats Global Report<\/a>. This includes direct costs like stolen funds, lost or damaged data, and recovery efforts in the aftermath of an attack. It also includes indirect losses that can impact a business, such as reduced productivity, damaged reputation, and long-term lost revenue.<\/p>\n\n\n\n<p>Microsegmentation alone doesn&#8217;t address the impersonation and deception strategies hackers use with the end goal of stealing employees&#8217; credentials or damaging data. A formidable zero trust approach requires additional layers of security tools like <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity and access management (IAM)<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication (MFA)<\/a> to verify each user&#8217;s identity and minimize the risk of insider threats. A good zero trust tool should be able to detect when patterns near the critical zone have changed, but tools like <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">UEBA<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/data-loss-prevention-dlp-solutions\/\">DLP<\/a> can help\u2014and extend those capabilities throughout the organization, not just around the microsegmented zone.<\/p>\n\n\n\n<p><strong><em>Related: <\/em><\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-zero-trust-security-can-protect-against-ransomware\/\"><em>How Zero Trust Security Can Protect Against Ransomware<\/em><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"productivity\">Zero trust models can inhibit productivity<\/h2>\n\n\n\n<p>Because zero trust adds extra security layers to most workflows, it can sometimes become a productivity constraint. Security strategies are only effective if they support and protect the work of your business\u2014they otherwise become barriers that employees will try to circumvent. It <em>is<\/em> possible to be productive while also maintaining a strong cybersecurity posture, and finding that balance is a core tenet of the zero trust approach. Without both sides of the coin, your business won&#8217;t be able to flourish fully.<\/p>\n\n\n\n<p>The easiest way to avoid productivity pitfalls is to embrace a hybrid security environment that consists of zero trust and legacy systems until you fully transition to zero trust. As your security teams shift individual workloads, they can evaluate each segment to ensure it won&#8217;t cause a major disruption to individual employees&#8217; productivity or overall business performance. If something doesn&#8217;t go according to plan, the old model can be temporarily restored until your team is able to iron out the unexpected kinks.<\/p>\n\n\n\n<p>Keep in mind that communication and agility are critical to zero trust implementation. Adopting these new security practices and tools will impact everyone, so your teams should be aligned with what to expect at every step in the process. Not only will this minimize the surprises you may encounter, but it will also help you address potential <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerabilities<\/a> quickly and effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"overcoming-challenges\">Overcoming zero trust challenges<\/h2>\n\n\n\n<p>Zero trust isn&#8217;t an infallible strategy, but it&#8217;s certainly becoming the way of the future for cybersecurity. Thankfully, there are many things you can do to overcome any potential challenges.<\/p>\n\n\n\n<p>First, look at your cybersecurity infrastructure holistically and from multiple angles to make sure any gaps are covered during the transition to zero trust. During this time, it&#8217;s also important to make sure all stakeholders understand the value of moving to a zero trust model.<\/p>\n\n\n\n<p>When you&#8217;re ready to begin the microsegmentation process, use a phased approach to minimize blows to productivity. Adopt additional layers of security in addition to microsegmentation to prevent successful social engineering attacks, and don&#8217;t neglect <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">employee training<\/a> to make sure your staff is prepared with the right cybersecurity knowledge.<\/p>\n\n\n\n<p>Then, once your zero trust model is fully implemented, commit to routine maintenance and frequent internal audits. Doing so will help you maintain confidence that only your employees, partners, and customers have access to exactly what they need\u2014nothing more and nothing less. That&#8217;s the ultimate goal of zero trust security, after all.<\/p>\n\n\n\n<p><strong><em>Read next: <\/em><\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\"><em>Best Zero Trust Security Solutions for 2021<\/em><\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d703db0f74b-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d703db0f74b\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d703db0f74b\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d703db0f74b\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d703db0f74b\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d703db0f74b\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d703db0f74b\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Zero trust architecture is an emerging technology in cybersecurity that offers an alternative to the traditional castle-and-moat approach to security. Instead of focusing only on your perimeter to defend against attacks from the outside, zero trust assumes that threats are ubiquitous and pervasive. Therefore, each user, device, and application within your network must verify that [&hellip;]<\/p>\n","protected":false},"author":159,"featured_media":19068,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[30581],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[377],"class_list":["post-19067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-zero-trust-security","b2b_audience-awareness-and-consideration","b2b_product-gateway-and-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Overcoming Zero Trust Security Challenges | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Zero trust architecture is the way of the future for cybersecurity, but it comes with its fair share of challenges. Learn how you can overcome these challenges today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overcoming Zero Trust Security Challenges | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Zero trust architecture is the way of the future for cybersecurity, but it comes with its fair share of challenges. Learn how you can overcome these challenges today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-25T22:42:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-25T22:43:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kaiti Norton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaiti Norton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\"},\"author\":{\"name\":\"Kaiti Norton\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f\"},\"headline\":\"Zero Trust Can&#8217;t Protect Everything. Here&#8217;s What You Need to Watch.\",\"datePublished\":\"2021-08-25T22:42:58+00:00\",\"dateModified\":\"2021-08-25T22:43:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\"},\"wordCount\":1220,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg\",\"keywords\":[\"zero trust security\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\",\"name\":\"Overcoming Zero Trust Security Challenges | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg\",\"datePublished\":\"2021-08-25T22:42:58+00:00\",\"dateModified\":\"2021-08-25T22:43:00+00:00\",\"description\":\"Zero trust architecture is the way of the future for cybersecurity, but it comes with its fair share of challenges. Learn how you can overcome these challenges today.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg\",\"width\":1400,\"height\":933,\"caption\":\"Photo of chain with lock around green door. Meant to symbolize challenges with zero trust security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust Can&#8217;t Protect Everything. Here&#8217;s What You Need to Watch.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f\",\"name\":\"Kaiti Norton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g\",\"caption\":\"Kaiti Norton\"},\"description\":\"Kaiti Norton is a Nashville-based Content Writer for eSecurity Planet, Webopedia, and Small Business Computing. She is passionate about helping brands build genuine connections with their customers through relatable, research-based content.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/kaiti-norton\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Overcoming Zero Trust Security Challenges | eSecurity Planet","description":"Zero trust architecture is the way of the future for cybersecurity, but it comes with its fair share of challenges. Learn how you can overcome these challenges today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/","og_locale":"en_US","og_type":"article","og_title":"Overcoming Zero Trust Security Challenges | eSecurity Planet","og_description":"Zero trust architecture is the way of the future for cybersecurity, but it comes with its fair share of challenges. Learn how you can overcome these challenges today.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/","og_site_name":"eSecurity Planet","article_published_time":"2021-08-25T22:42:58+00:00","article_modified_time":"2021-08-25T22:43:00+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg","type":"image\/jpeg"}],"author":"Kaiti Norton","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kaiti Norton","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/"},"author":{"name":"Kaiti Norton","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f"},"headline":"Zero Trust Can&#8217;t Protect Everything. Here&#8217;s What You Need to Watch.","datePublished":"2021-08-25T22:42:58+00:00","dateModified":"2021-08-25T22:43:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/"},"wordCount":1220,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg","keywords":["zero trust security"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/","url":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/","name":"Overcoming Zero Trust Security Challenges | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg","datePublished":"2021-08-25T22:42:58+00:00","dateModified":"2021-08-25T22:43:00+00:00","description":"Zero trust architecture is the way of the future for cybersecurity, but it comes with its fair share of challenges. Learn how you can overcome these challenges today.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/zero-trust.jpg","width":1400,"height":933,"caption":"Photo of chain with lock around green door. Meant to symbolize challenges with zero trust security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Zero Trust Can&#8217;t Protect Everything. Here&#8217;s What You Need to Watch."}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f","name":"Kaiti Norton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g","caption":"Kaiti Norton"},"description":"Kaiti Norton is a Nashville-based Content Writer for eSecurity Planet, Webopedia, and Small Business Computing. She is passionate about helping brands build genuine connections with their customers through relatable, research-based content.","url":"https:\/\/www.esecurityplanet.com\/author\/kaiti-norton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19067"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/159"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19067"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19067\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19068"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19067"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19067"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19067"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}