BEYOND THE PERIMETER: ASSESSING THE IMPACT OF ZERO TRUST ARCHITECTURE ON NETWORK LATENCY AND SECURITY RESILIENCE IN LARGE-SCALE ENTERPRISE ENVIRONMENTS
Abstract
Enterprise networks increasingly confront sophisticated cyber threats and complex operational demands, rendering traditional perimeter-based security models inadequate. Zero Trust Architecture (ZTA) has emerged as a paradigm that emphasizes continuous verification, granular access control, and micro-segmentation to enhance security resilience across hybrid and large-scale environments. This study investigates the dual impact of ZTA on network latency and security outcomes, providing empirical insights into performance-security trade-offs.The research aims to evaluate how ZTA implementation affects network latency, throughput, and packet integrity while quantifying improvements in security resilience, including reductions in unauthorized access and lateral threat propagation. Insights from this study are intended to inform enterprise decision-making regarding optimized ZTA deployment. A mixed-methods approach was employed, combining quantitative measurements of latency, throughput, and packet loss across six enterprise networks with qualitative security assessments, including penetration testing and attack simulations. Data were analyzed using statistical techniques and thematic evaluation to identify patterns and interdependencies. Findings indicate that ZTA increases network latency moderately (3–7 ms) and reduces throughput minimally, while significantly enhancing security resilience, with a 70–85% reduction in successful unauthorized access attempts. Correlation analysis reveals a positive trade-off between performance impact and security improvements, emphasizing the importance of configuration optimization. Results confirm that ZTA provides robust protection without critically impairing network performance, offering practical guidance for large-scale enterprise adoption and informing future security-policy strategies.
Full text article
References
Akiri, C. K., Jayabalan, K., Lopes, J., Kareem, S. A., & Tabbassum, A. (2025). Generative AI for Real-Time Cloud Security: Advanced Anomaly Detection Using GPT Models. 2025 IEEE Conference on Computer Applications (ICCA), 1–6. https://doi.org/10.1109/ICCA65395.2025.11011269
AlArfaj, L., & AlShuaibi, A. (2025). Critical infrastructure protection. In Q. A. Al-Haija, Y. Maleh, & A. Odeh, Intelligent and Secure Solutions for Digital Transformation (1st ed., pp. 107–130). CRC Press. https://doi.org/10.1201/9781003616511-7
Alluri, K., & Gopikrishnan, S. (2025). Enhancing IoT Security: A Review of Multi-factor Authentication Protocols and Their Effectiveness. In R. C. Poonia, S. Sharma, I. A. Hameed, & K. Upreti (Eds.), Smart Cyber Physical Systems (Vol. 435, pp. 619–630). Springer Nature Singapore. https://doi.org/10.1007/978-981-96-2182-8_46
Benzaïd, C., Guerd, N., El Houda Rehouma, N., Zeraoulia, K., & Taleb, T. (2025). A Multi-Layered Zero Trust Microsegmentation Solution for Cloud-Native 5G & Beyond Networks. 2025 IEEE Wireless Communications and Networking Conference (WCNC), 1–7. https://doi.org/10.1109/WCNC61545.2025.10978671
Cheimonidis, P., & Rantos, K. (2025). A Bayesian–Markov Framework for Proactive and Dynamic Cyber Risk Assessment Driven by EPSS. 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 281–286. https://doi.org/10.1109/CSR64739.2025.11130107
Elmaghbub, A., & Hamdaoui, B. (2024). Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security. IEEE Wireless Communications, 31(2), 42–48. https://doi.org/10.1109/MWC.001.2300420
Germanos, G., Lekidis, A., Brotsis, S., & Kolokotronis, N. (2026). Blockchain architectures for enhancing EV infrastructure security: A unified framework for addressing sophisticated cyber-attacks. Future Generation Computer Systems, 182, 108426. https://doi.org/10.1016/j.future.2026.108426
Goli, G., Shekhawat, P. S., Onapakala, K., Sidhu, K. S., Adudhodla, M., & S, S. (2025). Developments in AI and Cybersecurity Transforming the Evolution of Digital Payments Systems in finances. 2025 World Skills Conference on Universal Data Analytics and Sciences (WorldSUAS), 1–7. https://doi.org/10.1109/WorldSUAS66815.2025.11199062
Jain, S., Ashok, P., & Prabhu, S. (2024). Emerging Technologies for Cybersecurity in Healthcare: Evaluating Risks and Implementing Standards. 2024 International Conference on Cybernation and Computation (CYBERCOM), 725–731. https://doi.org/10.1109/CYBERCOM63683.2024.10803219
Javadnejad, F., Abdelmagid, A. M., Pinto, C. A., Mcshane, M., & Diaz, R. (2024). An exploratory data analysis of malware/ransomware cyberattacks: Insights from an extensive cyber loss dataset. Enterprise Information Systems, 18(9), 2369952. https://doi.org/10.1080/17517575.2024.2369952
Jeong, E., & Yang, D. (2025). A Trust Score-Based Access Control Model for Zero Trust Architecture: Design, Sensitivity Analysis, and Real-World Performance Evaluation. Applied Sciences, 15(17), 9551. https://doi.org/10.3390/app15179551
Joshi, H. (2025). Emerging Technologies Driving Zero Trust Maturity Across Industries. IEEE Open Journal of the Computer Society, 6, 25–36. https://doi.org/10.1109/OJCS.2024.3505056
Julio, Y. R., Viloria-Núñez, C., Sacoto-Cabrera, E. J., Ahumada-Tello, E., Mubarik, M., & Pinto, Á. (2025). AI-RMF-Governed, Zero-Trust Architecture for AI-Enabled IoTaaS: An Industrial Perspective. 2025 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), 1–6. https://doi.org/10.1109/GCAIoT68269.2025.11275565
Junejo, A. Z., Werthwein, M., & Annighoefer, B. (2025). A Comprehensive Analysis of Cybersecurity Challenges in Self-Adaptive Avionics: A Plug&Fly Avionics Platform Case Study. 2025 IEEE/ACM 20th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 133–139. https://doi.org/10.1109/SEAMS66627.2025.00022
Kaur, J., Sharma, R., & Chaudhary, V. K. (2025). Advanced Data Analytics for Proactive Security. In H. Razavi, M. Ouaissa, M. Ouaissa, H. Nakouri, & A. Abdelgawad, AI-Driven Cybersecurity (1st ed., pp. 92–101). CRC Press. https://doi.org/10.1201/9781003631507-5
Khule, M., Motwani, D., & Chauhan, D. (2025). A layered and integrative framework for Advance Persistent Threat detection and mitigation: Combining AI, Zero-Trust, and Advanced Threat Intelligence. Cluster Computing, 28(11), 740. https://doi.org/10.1007/s10586-025-05561-0
Kumar, R. G., Sambasiva, V., Lakshmi, K. H. R. R. S., Reddy, P. H., Hemanth, R., & Balaji, G. (2026). AI-Enhanced Security: Mastering Multi-Cloud Posture Management. 2026 9th International Conference on Computational Intelligence in Data Science (ICCIDS), 1–6. https://doi.org/10.1109/ICCIDS69108.2026.11407522
Liu, X., Zhou, Y., & Yuen, K. F. (2026). Assessing cybersecurity resilience of digital ports using a BN-FAIR framework. Transportation Research Part D: Transport and Environment, 156, 105379. https://doi.org/10.1016/j.trd.2026.105379
Mehrban, A., El Houda, Z. A., Moudoud, H., Brik, B., & Khoukhi, L. (2025). A Blockchain-Enabled Multi-Layered Zero-Trust Security Framework for O-RAN. 2025 International Wireless Communications and Mobile Computing (IWCMC), 1564–1569. https://doi.org/10.1109/IWCMC65282.2025.11059720
Neupane, S. R., Shrestha, N., & Sun, W. (2026). A Qualitative Synthesis of Cyberattack Trends in Managed Service Providers: Analyzing Multi-Tenant Vulnerabilities and Mitigation Strategies. Information, 17(4), 378. https://doi.org/10.3390/info17040378
Nkrumah, I. P., Sarpong, K. M., & Sowah, R. A. (2026). AI-Powered Intelligent Log Analysis and Zero Trust Frameworks: Revolutionizing Cloud Auditing for Real-Time Anomaly Detection and Compliance Assurance. In G.-N. Nguyen, A. Swaroop, & P. Shukla (Eds.), Proceedings of Fifth International Conference on Computing and Communication Networks (Vol. 1835, pp. 33–46). Springer Nature Switzerland. https://doi.org/10.1007/978-3-032-18211-1_3
Poduvu, S., Neupane, R. L., Esquivel Morel, A., Mitra, R., Anand, V., Chadha, R., & Calyam, P. (2024). Demonstration of Low-overhead Zero Trust at the Tactical Warfighting Edge. MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM), 682–683. https://doi.org/10.1109/MILCOM61039.2024.10773766
Sarela, H. I., & Lebea, K. (2026). Effects of Virtual Private Networks on Data Integrity and Data Encryption. In J. Chaudri, P. N. Mahalle, T. Perumal, & A. Joshi (Eds.), ICT for Intelligent Systems (Vol. 1519, pp. 389–398). Springer Nature Singapore. https://doi.org/10.1007/978-981-96-8901-9_34
Shipman, M. E., Millwater, N., Owens, K., & Smith, S. (2024). A Zero Trust Architecture for Automotive Networks. 2024-01–2793. https://doi.org/10.4271/2024-01-2793
Somayajula, R. (2025). Integrating Big Data Analytics and Devsecops: Adaptive LLM-Based Workflow for Resilient Multi-Cloud Environments. 2025 20th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP), 1–6. https://doi.org/10.1109/iSAI-NLP66160.2025.11320786
Sulfath, K. K., Ramakrishnan, P. R., Shareef, P. M., & Shanmugam, H. (2025). Enhancing IT Service Management in Indian IT Organizations: A Technological Integration of ISO 20000 with AI, Blockchain, Predictive Analytics, and Zero Trust Security. Indian Journal of Information Sources and Services, 15(1), 267–273. https://doi.org/10.51983/ijiss-2025.IJISS.15.1.34
Zhang, X., He, D., Song, X., Du, H., & Huang, D. (2026). Distributed MPC for Safe and Scalable Consensus of Heterogeneous Multi-Agent Systems in a Zero-Trust Environment. IEEE Transactions on Circuits and Systems I: Regular Papers, 73(2), 1367–1379. https://doi.org/10.1109/TCSI.2025.3590249
Zhang, Y., Lv, P., Hu, J., & Ren, H. (2025). A dynamic network security management method based on the zero-trust concept. In W. Mou (Ed.), International Workshop on Automation, Control, and Communication Engineering (IWACCE 2025) (p. 57). SPIE. https://doi.org/10.1117/12.3091375
Zyoud, B., & Lebai Lutfi, S. (2024). Adapting Zero Trust: Information Security Cultural Factors Considerations in the UAE Context. Asia-Pacific Journal of Information Technology and Multimedia, 13(2), 287–297. https://doi.org/10.17576/apjitm-2024-1302-09
Authors
Copyright (c) 2026 Hadi Mardiyanto, Zainal Syahlan, Isnadi Isnadi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.