Securing the Borderless Digital Landscape
Ivanti’s Cybersecurity Research Report Series
Ivanti’s Cybersecurity Research Report Series
Share article
Weak access controls and unmanaged devices are forcing organizations to rethink the concept of a defined, defensible perimeter. The future belongs to software-defined security, not walls.
Unmanaged devices, such as shadow BYOD, are prime vectors for attacks and sensitive data loss. Organizations must identify these rogue endpoints and bring them under control.
Cybercriminals who steal sensitive data need a pathway into company networks. Increasingly, that pathway is through unmanaged devices — endpoints like personal devices that fall outside IT's direct control but still offer access to corporate networks and data.
A Microsoft study showed that in over 90% of ransomware cases, attackers used an unmanaged device to gain initial access to the organization's network. Ivanti's research identifies ransomware as the top predicted threat for 2025 (unsurprising given that 38% of security professionals expect AI to increase ransomware threats). Taken together, it's a one-two punch for opportunistic threat actors.
Ivanti’s research highlights the dimensions of the problem:
Remote network access is extremely common across office workers:
85% of office workers say they at times (or even often) work remotely during off hours — for example, checking emails in the evening or completing small tasks over the weekend. Each of these remote connections, particularly if they're using personal devices, potentially exposes corporate data to security risks.
Use of personal devices is widespread and hard to track:
Fully 3 in 4 IT workers say BYOD is a regular occurrence, though only 52% say their organizations explicitly allow it. Within organizations where BYOD is not permitted, 78% of employees disregard the prohibition.
Unmanaged BYOD devices lack essential security controls, making them attractive entry points for cybercriminals seeking to access valuable organizational data. And when organizations ban BYOD, they often fail to develop clear controls to manage the inevitable use of personal devices — as well as the networks those devices access.
IT lacks visibility into unmanaged devices and remote access:
More than 1 in 3 IT professionals (38%) say they have insufficient data about devices accessing the network. And 45% say they lack sufficient data about shadow IT.
These blind spots increase the risk of security breaches and compliance violations, as unauthorized or vulnerable devices may go undetected. Organizations cannot secure what they cannot see.
To effectively deal with widespread remote working and unmanaged devices, modern network perimeters are increasingly software-defined. Access and protections are governed by identity — essentially who the user, device or application claims to be (verified through authentication) — rather than where they are connecting from.
“IT and security leaders should focus on taking inventory of all IT assets and bringing them under management. This means ensuring you can discover all existing devices, enforcing a clear BYOD policy and making sure that BYOD policy includes the ability to manage a device that wasn’t procured by the company itself.”
— Daniel Spicer, Chief Security Officer, Ivanti
Edge devices operate at the edges of networks. Their well-known security gaps make them prime targets for attackers.
Edge devices like IoT sensors, smart cameras and remote equipment are increasing the risk at the edge of the network. Why?
Ivanti’s research shows that 44% of IT professionals believe the growth in data generated by edge devices increases risk for their organizations.
On average, organizations have just 60% of edge devices under management. This means that 2 out of every 5 edge devices are essentially operating as unmonitored entry points into organizational networks.
Some organizations are trying to close the gap:
Yet none of these actions will be effective if a sizable share of devices — by our count 40% — simply are not managed.
“To secure corporate networks against edge device vulnerabilities, organizations must keep edge devices upgraded to the latest release and push security validation to the user endpoint, making it harder for threat actors to steal credentials and gain unauthorized access. Additionally, implementing least privilege access further limits potential damage if credentials are compromised.”
— Mike Riemer, Senior Vice President, Network Security Group (NSG) and Field CISO, Ivanti
In a boundaryless threat landscape, a zero trust approach delivers software-driven, intelligent security.
Perimeter-based security measures assume threats originate from outside the network — and once entities are inside, they can be trusted. However, as employees become more mobile, and as companies grapple with the growing number of unmanaged devices, this approach proves inadequate.
Zero trust offers a fundamentally different approach: "Never trust, always verify." This means every user, every device and every application must be authenticated and authorized before accessing any system or data, regardless of their location.
Achieving zero trust rests on three foundational principles: identity access management (verifying that users really are who they claim to be), least-privilege access (limiting user access to only those resources they need to do their jobs) and data obfuscation through encryption.
Here's the disconnect: While 79% of IT professionals insist that access controls are more important when employees work outside the office, the reality on the ground tells a different story.
Only 34% of employers actually use zero trust network access for remote workers, and a mere 30% implement privileged access management. The gap between what IT leaders know they should do and what they're actually doing is striking.
In today’s security environment, the boundaries of the enterprise are blurred, and threats can emerge from anywhere. To safeguard critical assets, organizations need a two-pronged approach:
First, expand device management programs to cover devices anywhere on the network, ensuring they can be patched, updated and monitored for security telemetry.
Second, implement identity-based solutions and zero-trust access controls that continuously verify endpoint security before granting access to internal assets.
For companies of all sizes, adopting zero trust isn’t just a security upgrade; it’s a business imperative for minimizing risk and safeguarding critical data.
“Companies need to update their security mindset to a software defined perimeter perspective as part of their zero trust strategy. Using segmentation and a least privilege access model gives security the ability to individualize each user's access, meaning that you’re extending security all the way to individual endpoints that require users to validate their identity rather than potentially allowing threat actors to target your network from a single device.”
— Mike Riemer, Senior Vice President, Network Security Group (NSG) and Field CISO, Ivanti
This report is based on Ivanti’s 2025 State of Cybersecurity Report: Paradigm Shift and 2025 Technology at Work Report: Reshaping Flexible Work. These reports were conducted in October 2024 and February 2025 respectively and surveyed a combined total of over 600 executive leaders, 3,000 IT and cybersecurity professionals and 6,000 office workers around the world.
The research was administered by Ravn Research, and panelists were recruited by MSI Advanced Customer Insights. The survey results are unweighted.