On Trend With Zero-Trust Architecture & Multi-Cloud Environments

Global cyber security company AlgoSec has published its annual report The State of Network Security Report, which provides an comprehensive analysis of today’s network security landscape. It does this by identifying key market trends, highlighting in demand solutions and technologies and the most popular strategies being adopted by security professionals.  

The report identifies significant shifts in cloud platform adoption, deployment of firewalls and Software-Defined Wide Area Networks (SD-WAN), as well as Secure Access Service Edge (SASE) implementation and AI. 

Based on comparative findings from 2024 and 2025, AlgoSec’s research includes responses from security, network and cloud professionals across 28 countries and evaluates market leaders including Cisco, Microsoft Azure, AWS, Check Point, Palo Alto Networks and more. 

Key findings from the report include: 

 

  • Security visibility gaps are driving a shift in security management - 71% of security teams struggle with visibility, which is delaying threat detection and response. The lack of insight into application connectivity, security policies and dependencies are proving to be a significant risk.
  • Multi-cloud and cloud firewalls are now standard – Businesses continue to adopt multi-cloud environments, with Azure becoming the most widely used platform in 2025.  
  • Firewall and SD-WAN adoption grow despite complexity – Multi-vendor strategies make firewall deployment more challenging. In terms of customer base, Palo Alto Networks took the lead, but Fortinet’s NGFW is gaining traction. SD-WAN adoption jumped, with Fortinet rising from 19.1% in 2024 to 25.8% in 2025. 
  • Zero-trust and SASE gain momentum – Zero-trust awareness is at an all-time high, with 56% of businesses fully or partially implementing it, though 20% are still in the learning phase. SASE adoption is also growing, with Zscaler leading at 35%, while Netskope has gained 15% market share. 
  • AI and automation are reshaping security – AI-driven security tools are improving real-time threat detection, but implementation and privacy concerns remain a challenge. Automation is now critical, with application connectivity automation ranked as the top priority for minimizing risk and downtime.

In commet, Eran Shiff, VP of Product at AlgoSec said “As businesses expand their digital footprints across hybrid and multi-cloud environments, securing network infrastructure has become a top challenge... We are seeing a major shift toward automation, orchestration and risk mitigation as key security priorities. Adoption of SD-WAN and SASE continues to rise, while awareness of AI-driven security and zero-trust principles is stronger than ever.” Shiff concludes.

Image: Ideogram

You Might Also Read:

Increasing Software Cyber Resilience:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Britain Is Unprepared To Defend Itself From Nation-State Hackers
Neurodiversity - The Untapped Talent Pool Solving Cybersecurity's Skills Gap  »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

CyberArrow

CyberArrow

CyberArrow (formerly EBDAA) is a consultancy company providing high quality consultancy services in Risk & Compliance and Awareness & Education.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

ComoNExT Innovation Hub

ComoNExT Innovation Hub

ComoNExT is a Digital Innovation Hub and a startup incubator with a focus on the issues of digital transformation and Industry 4.0.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

AFRY

AFRY

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.

Cyber Security Unity (CSU)

Cyber Security Unity (CSU)

Cyber Security Unity (formerly the UK Cyber Security Association) is a new global community which has been set up to help unite the industry and combat the growing cyber threat.

MODUS X

MODUS X

MODUS X is a Ukrainian IT product and service company created from the IT department of the DTEK Group of Companies.