Get started - it's free!
Log in
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2025 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.
Blog|insightsJuly 22, 2025

“Zero Trust Is Dead”: Tailscale’s survey on secure networks

Image with a black background, Tailscale logo and nameplate, grayscale differentiated long pixels, and "The State of Zero Trust Report, 07.2025"

Zero Trust would be easy to implement, were it not for all those pesky humans.

As part of Tailscale’s report on the State of Zero Trust in 2025, Tailscale commissioned a survey of 1,000 IT, security, and engineering leaders, seeking to understand where their organizations stood in implementing secure access and adopting a true Zero Trust environment. The survey asked respondents what they wanted, what policies they were actually implementing, and what—or, often times, who—was blocking a real Zero Trust strategy.

Take security upgrades, for example. Why might networking and security upgrades have been delayed? 42% of those surveyed cited a “risk of disruption to workflows or integrations.” Another 39% (given multiple options to select) picked “leadership or organizational priorities.” One-third pointed to an “unclear business case” or an uncertain return on investment (ROI). And 31% suggested a “lack of clear direction or suitable solutions.”

Chart from "The State of Zero Trust 2025," showing "Reasons for delaying or deprioritizing networking or security upgrades," with answers spread from 10% to 42% of respondents.

Whatever the cause, when people encounter the slow, overly complicated security systems set up by other people, they can do some rather dangerous things. 83% of all respondents said they circumvented security measures to get things done, be it sharing credentials (23%), using unapproved software (28%), or resorting to “I’ll just use my personal device” (32%).

And those are just the current employees; the report has some eye-opening stats on how a majority of those surveyed retained some access to privileged systems after they left other jobs.

Bar chart showing how long access was retained among employees, taken from Tailscale's survey on ZTNA in 2025.

Many companies lean on legacy VPNs to defend against such oversights and failures, hoping to limit access to just the right things. How is that working out? Roughly 90% of those people surveyed reported one or more notable issues with their current VPN solutions. Maybe that’s not surprising, given that nearly 70% of them involve manual (read: human-driven) provisioning.

Chart showing "Current VPN limitations" as reported by Zero Trust survey respondents: 40% "Security risks," 25% "Inability to scale," 10% "It works well," and more.

While people will always find ways to be a problem, they’re also key to real Zero Trust solutions. Identity-native access, based on users and their authenticated devices instead of network location, is a pillar of Zero Trust systems. With an identity-centric access scheme, turning off an ex-employee’s account immediately revokes all related permissions. Eliminating lingering access closes security gaps and addresses compliance requirements. And building granular access controls based on users, not networks, creates the kind of consistency that Zero Trust demands.

For more insights into the challenges and rewards of building a Zero Trust system, read the full report in on our website, where you can explore interactive graphics and download a full PDF version. All humans are welcome.




Share

Author

Headshot of Kevin PurdyKevin Purdy
Loading...

Try Tailscale for free

Schedule a demo
Contact sales
cta phone
mercury
instacrt
Retool
duolingo
Hugging Face