International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 187 - Issue 16 |
Published: June 2025 |
Authors: Joy Awoleye, Sarah Mavire, Tafirenyika Bonfrey Chatukuta, Enock Katenda |
![]() |
Joy Awoleye, Sarah Mavire, Tafirenyika Bonfrey Chatukuta, Enock Katenda . AN ANALYTICS-DRIVEN, METRICS-BASED FRAMEWORK FOR OPTIMISING SECURITY AND PERFORMANCE IN HYBRID ENTERPRISE ZERO TRUST DEPLOYMENTS. International Journal of Computer Applications. 187, 16 (June 2025), 42-56. DOI=10.5120/ijca2025925221
@article{ 10.5120/ijca2025925221, author = { Joy Awoleye,Sarah Mavire,Tafirenyika Bonfrey Chatukuta,Enock Katenda }, title = { AN ANALYTICS-DRIVEN, METRICS-BASED FRAMEWORK FOR OPTIMISING SECURITY AND PERFORMANCE IN HYBRID ENTERPRISE ZERO TRUST DEPLOYMENTS }, journal = { International Journal of Computer Applications }, year = { 2025 }, volume = { 187 }, number = { 16 }, pages = { 42-56 }, doi = { 10.5120/ijca2025925221 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2025 %A Joy Awoleye %A Sarah Mavire %A Tafirenyika Bonfrey Chatukuta %A Enock Katenda %T AN ANALYTICS-DRIVEN, METRICS-BASED FRAMEWORK FOR OPTIMISING SECURITY AND PERFORMANCE IN HYBRID ENTERPRISE ZERO TRUST DEPLOYMENTS%T %J International Journal of Computer Applications %V 187 %N 16 %P 42-56 %R 10.5120/ijca2025925221 %I Foundation of Computer Science (FCS), NY, USA
The recognition of ZTA as a burgeoning cybersecurity paradigm essentially means that protection is being shifted from static network perimeters to continuous, identity- and asset-centric controls. The rapid adoption of remote working, cloud services, and mobile telecommunications has effectively "collapsed" the traditional perimeters, making organizations vulnerable to attacks that exploit excessive implicit trust. Zero Trust attempts to solve these challenges by enforcing a rigorous implementation of identity verification, device compliance checks, and fine-grain access policies on every session. But implementing ZT in hybrid enterprises (on-premises, cloud, and remote elements) is complicated. This paper presents a generalized evaluation framework for assessing ZTA maturity in multiple dimensions (identity management, multi-factor authentication, network/app segmentation, endpoint detection/response, and behavioral analytics). To illustrate how layered ZT controls provide more vigorous access enforcement and risk mitigation, consider real-world scenarios such as a user of a SaaS application and an IT administrator. Evaluation of case studies and pilot deployments demonstrates that higher ZTA maturity enables tighter access control, reduced lateral movement, and improved incident response times. Performance observations (such as those shown by optimized ZTNA architectures) and comparisons to legacy baselines are provided in tabular formats. A discussion on the main benefits (centralized policy making, least-privilege, and containment of attacks) and challenges (compatibility with legacy systems, user friction, and policy drift) of ZTA was held, along with recommendations for a phased adoption approach that integrates analytics. This review draws on NIST/SP800-207, industry reports, vendor experiences, and case studies to derive a plausible maturity model and realistic guides for hybrid enterprise zero trust implementations.