Zero Trust offers measurably more
Cyber­security without
a major IT project.

The smart way to a Zero Trust IT architectur

You want to reduce IT security risks caused by overly broad access rights, gain visibility, and implement a Zero Trust architecture pragmatically — without months-long transformation programmes? With the ero Trust Rapid Pilot, we implement a clearly scoped Zero Trust use case in 4 to 6 weeks as a proof of concept — including measurement, reporting and a solid basis for deciding on the next steps.

Who is the perfect match for the
Zero Trust Proof of Concept?

CISOs, Heads of IT, Security & Risk Managers in Manufacturing/Industrial, Products/MedTech/IoT, Financial Services, Healthcare, Transport and Energy environments with hybrid and critical infrastructures, multiple sites, partner access, remote work or increased audit/compliance pressure — and an interest in Zero Trust cybersecurity solutions. 

Many organizations are familiar with the IT security-related challenges mentioned below, which lead to a patchy IT security architecture and increase the cyber risk. Due to the increasing number of attack surfaces, the operational security effort required to reliably maintain the IT infrastructure is rising, while the need to provide evidence to internal and external stakeholders is also growing.

What is the Zero Trust "Rapid Pilot"? 

The Rapid Pilot is a focused proof of concept for a prioritised Zero Trust use case. Together with our technology partner Cloudflare we implement a clearly bounded scope — as small as possible, as effective as necessary.  

Three arguments in
favor of the Zero Trust "Rapid Pilot" 

Classic access methods such as VPN authenticate the user once and then grant broad network access — without continuous verification and without restriction to specific applications.

External partners often receive more access than necessary — without device control, without granular restriction, with full potential for lateral movement within the network.

Granular logs, clear authentication guidelines and device posture checks are part of the security-related challenges and provide the basis for robust audits. 

What is the scope of the
Zero Trust "Rapid Pilot"? 

At the beginning, the scope for the use case is defined and clearly staked out. That includes risk assumptions and the definition of success criteria (KPIs).

The scope of the initial rapid pilot is limited to: one or two applications, one user group (e.g. external partners, admins or business departments) and one or two locations or regions.

The scope of services excludes an enterprise-wide Zero Trust rollout, app refactorings, complete IAM reorganization and large-scale network conversions.

Within the integration phase, all relevant systems will be connected (e.g. identity/SSO, required accesses).

With the integration, continuously controlled and traceable access policies are defined, which form the framework for the security network of the IT infrastructure.

Throughout the pilot stadium, the KPIs defined at the beginning, will be determined in order to collect relevant data that will form the basis for decision-making for a potential company-wide Zero Trust Cybersecurity strategy.

Finally at the end of the Zero Trust pilot project, the collected data and results are evaluated in a workshop and recommendations are made for or against a further Zero Trust rollout. The next steps will be agreed based on that decision.

  • 1–2 applications
  • 1 user group (e.g. external partners, admins or departments)
  • 1–2 locations or regions

Rico Petrillo, Head of CDN & Edge Security, Swisscom Broadcast Ltd

Download

The factsheet gives you a quick overview of all relevant facts about the Zero-Trust Rapid Pilot.

Download now

Answers to frequently asked questions

A Zero Trust Rapid Pilot based on Cloudflare One can be brought online within 30 days. The implementation is phased and runs in parallel with the existing infrastructure—no maintenance window or full system migration is required. 
According to Cloudflare, the company operates one of the largest global networks with over 330 Points of Presence in more than 120 countries (cloudflare.com/network). This approach enables security features to be implemented as an upstream layer without affecting existing systems. 

According to Gartner, Zero Trust Network Access (ZTNA) will be the dominant method for secure remote access by 2025—and will structurally replace traditional VPN architectures (Gartner, Market Guide for Zero Trust Network Access, 2023).

The Zero Trust Rapid Pilot does not end with an expiration date, but with a result. After 30 days, a complete pilot evaluation is available—with measurable security gains, documented access patterns, and a clear recommendation for the next step. 

The evaluation is based on real operational data from your own company: Which access attempts were blocked? Where are there still gaps? Which applications would benefit most from an expansion? These insights form the basis for a structured rollout—at your own pace, with no upfront commitment. 

According to a study by IBM Security (Cost of a Data Breach Report 2023), companies with a mature Zero Trust architecture reduce the average cost of a data breach by up to $1.5 million compared to companies without Zero Trust. The pilot provides the first measurable step in this direction—and the basis for making the case internally for full implementation. 

Cloudflare documents in its own customer reports that, on average, companies begin a company-wide rollout within 90 days of a pilot project—driven by internal acceptance and proven performance advantages over the replaced VPN (cloudflare.com/case-studies).

Firewalls and VPNs were designed for a world where all employees sit in the same office and all data resides in the same data center. That world no longer exists. Today, teams work in a hybrid model, applications run across multiple cloud environments simultaneously, and external partners regularly access internal systems. The “trusted network” security model—where anyone inside has unrestricted access—is thus structurally obsolete. 

The key risk: If an attacker gains access to the network via a compromised VPN account or an infected device, they encounter minimal internal resistance. Lateral movement—the unnoticed spread within the network—remains one of the most common attack vectors in successful cyberattacks, according to the Verizon Data Breach Investigations Report 2024. On average, it takes 204 days for such a breach to be detected at all (IBM Security, Cost of a Data Breach Report 2023). 

The National Institute of Standards and Technology (NIST) has defined a binding framework for Zero Trust architectures in its publication SP 800-207, stating that perimeter-based security models are no longer sufficient as a sole protection strategy. Zero Trust addresses precisely this gap: Every access request is continuously verified regardless of location—based on identity, device status, and context. 

The market for Zero Trust and SASE solutions is fragmented: Many providers rely on product portfolios built up through acquisitions that were subsequently consolidated into a single platform. This often results in complex integration projects, multiple management consoles, and inconsistent policy engines. Cloudflare One was developed as a native platform—Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), and Remote Browser Isolation (RBI) are managed through a single console and a unified policy engine. 

The key infrastructure advantage: Cloudflare’s global network, with over 330 Points of Presence in more than 120 countries, means that authentication and inspection processes take place geographically close to the user—not in a central data center. This eliminates the classic “trombone effect” of hub-and-spoke architectures, where traffic is unnecessarily rerouted over long distances, causing latency. 

Forrester Research rates Cloudflare as a “Strong Performer” in the Zero Trust Edge Solutions Wave 2023, highlighting in particular its network performance, platform consolidation, and ease of use for mid-sized IT teams (Forrester, The Zero Trust Edge Solutions Wave, Q3 2023). Gartner also cites Cloudflare One as a representative example of a converged SASE platform in its current Market Guide for Single-Vendor SASE (Gartner, 2024). 

For companies headquartered in or storing data within the EU, another factor is crucial: With the Data Localization Suite, Cloudflare offers the ability to explicitly restrict data processing and log storage to European data centers—a requirement that is becoming increasingly contractually relevant in the context of GDPR and NIS2. 

The widespread assumption that Zero Trust leads to more friction in daily work is based on experiences with poorly implemented security solutions—not on the current state of technology. Modern Zero Trust based on the Cloudflare approach is fundamentally different: security decisions are made based on context and are generally not noticeable to the user. A known device, a familiar network, and normal behavior do not trigger any additional authentication requirements. Friction is introduced only where an increased risk is detected—such as when logging in from a new device or an unusual geographic location. 

The greatest UX benefit comes from replacing the VPN client. According to consistent user feedback, VPNs are slow, have unstable connections, and require manual intervention. Cloudflare’s ZTNA solution replaces the VPN client with a lightweight background process: applications are accessible directly and with significantly lower latency, without users having to establish a connection manually. 

A Total Economic Impact study conducted by Forrester Research on behalf of Cloudflare (Forrester TEI Study: Cloudflare Zero Trust, 2023) documents that surveyed IT teams reported an average 75% decrease in VPN-related help desk tickets following the implementation of Cloudflare One. Employees also reported a noticeably better access experience—especially when working from home and accessing SaaS applications. 

In its report “Zero Trust: Separating Hype from Reality” (EMA, 2023), market research firm EMA (Enterprise Management Associates) notes that companies implementing Zero Trust with a consolidated SASE platform achieve significantly higher user satisfaction scores than those relying on fragmented point solutions—a direct indication of the platform advantage of Cloudflare One. 

Regulatory requirements such as NIS2, GDPR, and ISO 27001 are not merely abstract compliance goals—they demand concrete technical and organizational measures that must be demonstrably implemented and documented. Zero Trust addresses several core requirements simultaneously, which can only be met in traditional perimeter-based architectures with significant additional effort. 

The European Union’s NIS2 Directive, which had to be transposed into national law by October 2024, explicitly requires affected companies to implement measures in the areas of access control, network segmentation, vulnerability management, and incident detection. Zero Trust addresses all four areas structurally: access is controlled granularly according to the least-privilege principle, networks are micro-segmented, device statuses are continuously monitored, and anomalies are detected in real time. The Federal Office for Information Security (BSI) explicitly recommends Zero Trust architectures as a suitable technical implementation framework for NIS2-compliant security strategies (BSI, Zero Trust Guide, 2023). 

For GDPR compliance, the issue of data processing and storage is particularly crucial. With the Data Localization Suite, Cloudflare offers a configurable solution that ensures metadata, access logs, and inspection processes are processed exclusively in European data centers. This is contractually relevant for companies that process personal data and must demonstrate to supervisory authorities that no uncontrolled data transfer to third countries takes place. 

ISO 27001 requires, among other things, verifiable access control processes (A.9), cryptography (A.10), physical and logical network segmentation (A.13), and monitoring and logging (A.12) as part of the Annex A controls. Cloudflare One generates automated, audit-ready logs for all these control areas—without manual follow-up work by the IT team. According to an analysis by IDC (IDC White Paper: The Business Value of Cloudflare One, 2023), companies using Cloudflare One reduced their internal effort for compliance documentation and audit preparation by an average of 40%. 

The investment in a Zero Trust Rapid Pilot consists of two components: the licensing costs for the Cloudflare One platform within the pilot scope, and the accompanying implementation and consulting services provided by the MSP partner. Both components are intentionally limited to a defined perimeter—typically a user group, a location, or an application segment—which significantly reduces the upfront costs compared to a full implementation. The pilot is not a proof of concept on paper, but a productive operation under real-world conditions—with real measurement data. 
For the internal business case, three ROI dimensions are particularly relevant and directly measurable. First, cost reduction through VPN replacement: licensing, hardware, and operating costs for traditional VPN infrastructures are gradually eliminated. Second, efficiency gains in IT operations: fewer help desk tickets, automated compliance documentation, and consolidated security management via a single platform. Third, risk reduction: A demonstrably reduced attack surface lowers the statistical probability of a costly security incident—and thus also the relevant insurance premiums in the area of cyber liability. 

In an independent Total Economic Impact study (Forrester TEI: Cloudflare Zero Trust Platform, 2023), Forrester Research determined an average ROI of 161% over three years. The break-even point was reached on average in less than six months for the companies surveyed. Forrester identified the elimination of VPN hardware and licenses, the reduction in incident response costs, and productivity gains from faster application access as the main drivers. The key difference of the Rapid Pilot approach: These figures are not taken from a study but generated from the company’s own operations—which significantly strengthens the internal case when presenting to the CFO and executive management. 

In its Cost of a Data Breach Report 2024, IBM Security estimates the average global cost of a data breach at $4.88 million—the highest figure ever recorded. Companies with a mature Zero Trust architecture recorded data breach costs that were, on average, $1.76 million lower than those of companies without Zero Trust. This figure makes the risk-avoidance ROI tangible—even for decision-makers without a technical background.

Hybrid infrastructures are the norm today, not the exception. According to the Flexera State of the Cloud Report 2024, 89% of surveyed companies operate a multi-cloud strategy—the majority of which is combined with remaining on-premises systems. It is precisely this scenario that presents classic security architectures with insurmountable problems: Perimeter-based models cannot enforce a consistent policy across environmental boundaries because there is no longer a common perimeter. 

Cloudflare One solves this problem through three technical components that work seamlessly together: 

  1. Cloudflare Tunnel: A lightweight, outbound connector that connects on-premises systems and private applications to the Cloudflare network—without inbound firewall rules or exposed ports. The system is thus not directly exposed to the internet but can be securely accessed via Cloudflare.  
  2. Cloudflare Magic WAN: A software-defined WAN solution that connects locations, data centers, and cloud environments via the Cloudflare backbone, replacing MPLS connections with a more cost-effective and flexible alternative. 
  3. Universal Policy Engine: The same access policies—based on identity, device state, and context—apply equally to on-premises applications, SaaS services, and cloud workloads in AWS, Azure, or GCP. 

In its publication “Implementing a Zero Trust Architecture,” the National Cybersecurity Center of Excellence (NCCoE) at NIST (NIST SP 1800-35, 2023), explicitly defined hybrid infrastructures as the primary use case for Zero Trust implementations, noting that Zero Trust is the only security model that can structurally ensure consistent control across heterogeneous environments. 

For companies with legacy applications—that is, systems that do not support modern authentication standards such as SAML, OAuth, or OIDC—Cloudflare Access provides an upstream authentication layer via protocol proxying. The application itself remains unchanged but gains full Zero Trust access control. This is particularly relevant for ERP systems, industrial control applications, or older in-house developments where code modification is not economically or technically feasible. 

In the Hype Cycle for Network Security 2023, Gartner notes that hybrid Zero Trust implementations—i.e., those covering both on-premises and cloud-native workloads—have the highest transformational relevance and are classified as a strategic priority for IT security leaders (Gartner, Hype Cycle for Network Security, 2023).

Jürg Stäuble

Arrange an appointment for a consultation and safe your Zero Trust Rapid Pilot ticket.

Jean-Louis Fantino

Sales Manager

Tel. +41 58 221 44 03