Menu

Zero Trust – Why Does It Matter, And What Is Data Protection’s Role?

Zero Trust – Why Does It Matter, And What Is Data Protection’s Role?

In the world of highly innovative attackers and the growing incidence of insider threats, the perimeter-based security approaches that IT has long relied upon are no longer sufficient. As a result, the topic of Zero Trust, which is defined by the National Institute of Standards and Technology as an architecture that “assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location or based on asset ownership”, has been getting headlines and executive-level attention.

Not simply a buzzword, Zero Trust was emphasized as a guiding principle of both federal sector and private sector IT systems in the Biden-Harris National Cybersecurity Strategy, which was released last month. Increasingly, Zero Trust principles will guide how IT infrastructures and networks are architected – including data protection implementations.

The Role of Data Protection in a Zero Trust Framework

Backup systems are increasingly the subject of cyberattacks because attackers know that companies will be less incentivized to pay ransoms if they can recover their data and applications. This is part of the reason why protecting critical data assets is a core component of a Zero Trust Framework. Specifically, the ability to recover the organization’s most critical data assets as quickly as possible is paramount to mitigating the effects of attacks.

From a Zero Trust perspective, backup and recovery tools are having capabilities built in to inhibit malicious access and to detect that an attack has occurred. Role-based access control (RBAC), multi-factor authentication (MFA), two-person concurrence for data deletion, and air gapping/data vaulting are just a few Zero Trust-related technologies that are established or are becoming table stakes for an effective data protection strategy.

The Role of Data Protection in a Zero Trust Approach and the Challenges Ahead

Although organizations are realizing that Zero Trust principles should guide IT architecture, there is not an overnight fix. It will take time for organizations to both understand the importance of Zero Trust and to embrace it, and there are potential issues standing in the way. First, it is not easy to integrate new technologies into the data protection ecosystem and data protection plays an outsized role. To complicate matters further, data protection has a very long tail of adoption.

Another challenge is that, historically, administrators have been extensively trained on specific solutions. Additionally, in many cases, data that has been backed up with a particular solution cannot be recovered by a different solution. Moreover, when looking at Zero Trust specifically, it is important that new technologies or processes do not inhibit the need for the right data getting to the right users in a timely manner; it can’t impede or slow down business processes by getting in the way.

Data protection by itself is not the end-all-be-all, for Zero Trust or for cyber resiliency, and attackers will continue to innovate. But understanding the role data protection plays in the process as a whole will help, and strides are being made, which is encouraging.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other insights from The Futurum Group:

The National Cybersecurity Strategy Proposed by the Biden-Harris Administration Portends Greater Scrutiny for IT Operations

World Backup Day: Taking Stock of Data Protection Best Practices

Fujitsu Enterprise Postgres: Delivering the Security Assurances Key to Protecting Data in Era of Mounting Cybersecurity Attacks

Related Insights
CIO Take Smartsheet's Intelligent Work Management as a Strategic Execution Platform
December 22, 2025

CIO Take: Smartsheet’s Intelligent Work Management as a Strategic Execution Platform

Dion Hinchcliffe analyzes Smartsheet’s Intelligent Work Management announcements from a CIO lens—what’s real about agentic AI for execution at scale, what’s risky, and what to validate before standardizing....
NVIDIA Bolsters AI/HPC Ecosystem with Nemotron 3 Models and SchedMD Buy
December 16, 2025

NVIDIA Bolsters AI/HPC Ecosystem with Nemotron 3 Models and SchedMD Buy

Nick Patience, AI Platforms Practice Lead at Futurum, shares his insights on NVIDIA's release of its Nemotron 3 family of open-source models and the acquisition of SchedMD, the developer of...
Oracle Q2 FY 2026 Cloud Grows; Capex Rises for AI Buildout
December 12, 2025

Oracle Q2 FY 2026: Cloud Grows; Capex Rises for AI Buildout

Futurum Research analyzes Oracle’s Q2 FY 2026 earnings, highlighting cloud infrastructure momentum, record RPO, rising AI-focused capex, and multicloud database traction driving workload growth across OCI and partner clouds....
Five Key Reasons Why Confluent Is Strategic To IBM
December 9, 2025

Five Key Reasons Why Confluent Is Strategic To IBM

Brad Shimmin and Mitch Ashley at Futurum, share their insights on IBM’s $11B acquisition of Confluent. This bold move signals a strategic pivot, betting that real-time "data in motion" is...
AWS re:Invent 2025: Wrestling Back AI Leadership
December 5, 2025

AWS re:Invent 2025: Wrestling Back AI Leadership

Futurum analysts share their insights on how AWS re:Invent 2025 redefines the cloud giant as an AI manufacturer. We analyze Nova models, Trainium silicon, and AI Factories as AWS moves...
Salesforce Q3 FY 2026 AI Agents, Data 360 Lift Bookings and FY26 Outlook
December 5, 2025

Salesforce Q3 FY 2026: AI Agents, Data 360 Lift Bookings and FY26 Outlook

Futurum Research analyzes Salesforce’s Q3 FY 2026 results, focusing on Agentforce and Data 360 traction, Informatica integration, and how pricing and GTM execution set up bookings momentum into 2H FY...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.