According to Cost of data breach 2022 report from IBM, global average total cost of a data breach is 4.35M USD. Phishing accounts for more than 90% of data breaches, number of vulnerabilities keep rising (12% more CVEs in 2022) while still more than 20% of incidents take months or more to detect.

Organizations operate complex infrastructure that spans beyond traditional network perimeter – remote work and cloud workloads being just a fraction of overall picture.

Historically, companies have implemented multitude of security tools that often operate in isolation, multiplying challenges facing security operations teams and leading to increased burnout rates. In a never-ending rush to plug just another hole, it is hard to keep situational awareness and make strategic decisions. Decisions that can take back control into the hands of the team Blue.


Zero Trust is a security framework that has three main principles:

Verify continuously and explicitly

Use the least privileged access

Assume breach

The zero Trust model assumes

that there is no “trusted perimeter”, every connection comes from a potentially untrusted network. Authentication and authorization processes should consider additional information like device health, and location. The zero trust model also encourages strong authentication (incl. MFA), encryption, and network segmentation to minimize the impact when a breach occurs.

Zero Trust is not the product to buy

nor even the end state to achieve. Instead, it is a continuous improvement program that must be aligned across all pillars and implemented according to the above-mentioned principles. It is proven in the real world and even mandated by many governments (incl. US Federal). It has also proved to be an opportunity to consolidate security infrastructure, leading to average payback of under 6 months, 90%+ ROI, and an average global NPV of above 11M USD (source Forrester total economic impact study Dec 2021).

Our packaged Zero Trust assessment offer acts

as a starter kit for the Zero Trust journey. It assesses existing state, and major gaps and provides clear guidance for the next transformational activities that will provide the most impact specifically for your organization.

Zero Trust assessment is performed in following stages:


Perform interviews and collect information about existing IT environment, tools, and processes.


Analyze results and perform assessment according to Zero Trust maturity model.


Prepare assessment report.


Results are presented in an online meeting.

Assessment report

Includes following sections:


a. Summary
b. Most important recommendations, future roadmap
c. Detailed description of each component assessed and recommendations for each of more than twenty components



  • Cyber awareness platform


  • Implement key recomendations from assess phase


  • Continious cyber posture measurement and improvement process


5250 EUR + VAT

Depending on your preferences

we can provide follow-up activities after the initial assessment – starting from the implementation of specific recommendations from the report to Zero Trust managed services.

Zero Trust managed services

enable continuous cybersecurity improvement processes, incrementally implementing controls and processes, and rebalancing across all Zero Trust pillars. You will offload in-house staff from tedious technical tasks and receive continuous feedback, quantifying security posture changes.


How long will it take to implement Zero Trust?

Zero Trust is not a product to buy, nor even the end state to achieve. As such, it has no final implementation date. Instead, it is a continuous improvement process that must be continuously balanced across all Zero Trust pillars and implemented according to main principles, avoiding reliance on secure perimeter.

Does implementing Zero Trust imply that I distrust all users, vendors etc.?

No. Zero Trust name comes from the trust interval [-1; +1], where minus 1 denotes full distrust and plus 1 – complete trust. Both ends of this interval implies full knowledge on subject. You must know everything about the object to fully trust or distrust.

Instead, Zero Trust assumes that we do not have complete information about anything. It lies right in the middle of trust interval [-1;+1] – the zero point. Thus, Zero Trust means that you neither trust nor distrust – you live with the fact that you do not have complete information about the object under consideration.

Do I have to discard all the previous investments in defensive infrastructure to implement Zero Trust?

Studies show that Zero Trust has probably the highest ROI from any tech investment (see Forester Research link). While you may need to have additional technical controls implemented and processes adjusted, Zero Trust program is also a consolidation opportunity.

Opportunity to simplify your infrastructure and defense stack to decrease running costs. Zero Trust assessment will measure your existing Zero Trust posture and provide specific guidance on next steps that matter specifically for your organization.

Will I be on my own to implement Zero Trust after assessment is complete?

No. Squalio provides holistic Zero Trust managed service. Depending on assessment outcome and your preference, we are happy to provide you with specific transformation implementation services (e.g. implementing MFA, device management etc.) and up to continuous Zero Trust program management.

Remember, Zero Trust is not a destination, it is continuous incremental improvement process according to a set of main principles, avoiding reliance on secure perimeter.