{"id":17550,"date":"2023-02-07T06:26:00","date_gmt":"2023-02-07T06:26:00","guid":{"rendered":"https:\/\/www.insentragroup.com\/nz\/?p=17550"},"modified":"2024-03-03T19:25:33","modified_gmt":"2024-03-03T19:25:33","slug":"the-ultimate-guide-to-zero-trust","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/the-ultimate-guide-to-zero-trust\/","title":{"rendered":"The Ultimate Guide to Zero Trust"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17550\" class=\"elementor elementor-17550\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf0d024 elementor-section-content-middle elementor-section-stretched elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf0d024\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-657b9e5\" data-id=\"657b9e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b221aad elementor-widget elementor-widget-heading\" data-id=\"b221aad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Ultimate Guide to Zero Trust<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c95529 elementor-widget elementor-widget-text-editor\" data-id=\"9c95529\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Everything you need to know about Zero Trust<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9931d8 elementor-widget elementor-widget-button\" data-id=\"e9931d8\" data-element_type=\"widget\" id=\"zerotrustdl-formBtn\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#zerotrustdl-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fcdd011\" data-id=\"fcdd011\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdb4715 elementor-widget elementor-widget-image\" data-id=\"bdb4715\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"750\" height=\"677\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-1024x925.png\" class=\"attachment-large size-large wp-image-14747\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-1024x925.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-300x271.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-768x694.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-1536x1387.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-1568x1416.png 1568w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9.png 1819w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:90.32%;max-width:1819px\" title=\"ultimate_zero_trust_img_9\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a1f109c elementor-section-content-middle elementor-section-stretched elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1f109c\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4738543\" data-id=\"4738543\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-429b6f4 elementor-widget elementor-widget-image\" data-id=\"429b6f4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"750\" height=\"678\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-768x694.png\" class=\"attachment-medium_large size-medium_large wp-image-14747\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-768x694.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-300x271.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-1024x925.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-1536x1387.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9-1568x1416.png 1568w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_9.png 1819w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:90.32%;max-width:1819px\" title=\"ultimate_zero_trust_img_9\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6543f2c elementor-widget elementor-widget-heading\" data-id=\"6543f2c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Ultimate Guide to Zero Trust\u200b<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6e8258 elementor-widget elementor-widget-text-editor\" data-id=\"e6e8258\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Everything you need to know about Zero Trust<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3062996 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3062996\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#zerotrustdl-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5674ccf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5674ccf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b0498ff\" data-id=\"b0498ff\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f2d28f elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9f2d28f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3bc2ff elementor-widget elementor-widget-html\" data-id=\"e3bc2ff\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<style>\r\n    body.blog-thank-you-page .elementor-location-header,\r\n    body.blog-thank-you-page .elementor-location-footer,\r\n    body.blog-thank-you-page #hs-eu-cookie-confirmation {\r\n        display: nones !important;\r\n    }\r\n    body.position-fixedform section {\r\n    -webkit-filter: blur(5px);\r\n    -moz-filter: blur(5px);\r\n    -o-filter: blur(5px);\r\n    -ms-filter: blur(5px);\r\n    filter: blur(5px);\r\n    }\r\n    body.position-fixedform.blog-form-submitted .elementor-section-wrap > section {\r\n    -webkit-filter: none;\r\n    -moz-filter: none;\r\n    -o-filter: none;\r\n    -ms-filter: none;\r\n    filter: none;\r\n    }\r\n    body.position-submittedform .elementor-section-wrap > section#zerotrustdl-form {\r\n        display: none !important;\r\n    }\r\n    body.position-fixedform section#zerotrustdl-form {\r\n    position: fixed !important;\r\n    top: 15% !important;\r\n    width: auto !important;\r\n    left: 10% !important;\r\n    right: 10% !important;\r\n    background: #fff !important;\r\n    box-shadow: 0px 0px 10px rgb(0 0 0 \/ 20%) !important;\r\n    z-index: 99999 !important;\r\n    border-radius: 12px !important;\r\n    overflow: hidden !important;\r\n    -webkit-filter: none !important;\r\n    -moz-filter: none !important;\r\n    -o-filter: none !important;\r\n    -ms-filter: none !important;\r\n    filter: none !important;\r\n    }\r\n    body.position-fixedform section#zerotrustdl-form section {\r\n    -webkit-filter: none !important;\r\n    -moz-filter: none !important;\r\n    -o-filter: none !important;\r\n    -ms-filter: none !important;\r\n    filter: none !important;\r\n    }\r\n    body.position-fixedform.blog-form-submitted section#zerotrustdl-form {\r\n    position: inherit !important;\r\n    top: inherit !important;\r\n    width: auto !important;\r\n    left: inherit !important;\r\n    right: inherit !important;\r\n    box-shadow: none !important;\r\n    border-radius: 0px !important;\r\n    overflow: inherit !important;\r\n    }\r\n    @media only screen and (max-width: 600px) {\r\n     \r\n    body.position-fixedform section#zerotrustdl-form {\r\n    position: fixed !important;\r\n    top: 15% !important;\r\n    width: auto !important;\r\n    left: 10px !important;\r\n    right: 10px !important;\r\n    }\r\n    body.position-fixedform section#zerotrustdl-form section {\r\n        max-height: 500px;\r\n        overflow-y: auto;\r\n    }\r\n    \r\n    }\r\n<\/style>\r\n<script>\r\n    jQuery(function($){\r\nvar isAlreadyPopUp = true;\r\nvar htmlContent = '<h6 style=\"font-weight:bold !important;\">Transform Your Reading Experience - eBook or Blog the choice is yours!<\/h6><p class=\"mb-4\">Take control of your reading with our engaging content, available in either eBook or blog format. Choose eBook for an easier read or continue with the blog for a classic feel.<\/p>';\r\n$(\"#zerotrustdl-form script:first-child\").before(htmlContent);\r\nvar curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n\/\/localStorage.setItem(curr_url, '');\r\nvar check_subms = localStorage.getItem(curr_url);\r\n\r\n\r\nif(check_subms != 'submitted'){\r\n    $(window).scroll(function () {\r\n        \/\/if(!isAlreadyPopUp){\r\n            if ($(document).scrollTop() >= $(document).height() \/ 5){\r\n                if(!$(\"body\").hasClass(\"position-submittedform\")){\r\n                    $(\"body\").addClass(\"position-fixedform\");\r\n                }\r\n                console.log(0);\r\n            } else {\r\n                $(\"body\").removeClass(\"position-fixedform\");\r\n                console.log(1);\r\n            }\r\n            \r\n        \/\/}\r\n    });\r\n} else {\r\n    $(\"body\").addClass(\"position-submittedform\");\r\n}\r\n    });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf322b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf322b6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-820e595\" data-id=\"820e595\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-def607b elementor-widget elementor-widget-heading\" data-id=\"def607b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Table of Contents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91643d9 elementor-widget elementor-widget-text-editor\" data-id=\"91643d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"#zerotrusttc_01\"><strong>Introduction<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_02\"><strong>A Quick Note on Terminology<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_03\"><strong>What is Zero Trust?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_04\"><strong>Why is Zero Trust so important?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_05\"><strong>How does Zero Trust Security work?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_06\"><strong>What are the Principles of Zero Trust?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_07\"><strong>What are the Pillars of Zero Trust Architecture?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_08\"><strong>What Impact will Zero Trust Security have on User Experience?\u00a0\u00a0 <\/strong><\/a><\/p><p><a href=\"#zerotrusttc_09\"><strong>What is the Cost Impact of Zero Trust Security?\u00a0\u00a0 <\/strong><\/a><\/p><p><a href=\"#zerotrusttc_10\"><strong>How to begin your Zero Trust Security Implementation\u00a0\u00a0 <\/strong><\/a><\/p><p><a href=\"#zerotrusttc_11\"><strong>How to develop a Long Term Zero Trust Security Strategy Roadmap in the Microsoft Ecosystem\u00a0 <\/strong><\/a><\/p><p><a href=\"#zerotrusttc_12\"><strong>What does a Zero Trust Maturity Model look like?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_13\"><b>How Insentra can help with your Zero Trust Security Strategy<\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a1fa8eb elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1fa8eb\" data-element_type=\"section\" id=\"zerotrusttc_01\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45ccff1\" data-id=\"45ccff1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da06ae7 elementor-widget elementor-widget-heading\" data-id=\"da06ae7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">INTRODUCTION<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a36c7 elementor-widget elementor-widget-text-editor\" data-id=\"a5a36c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>If you live in the Information Technology industry (or just visit from time to time) then you are fully aware of the rise in cybercrime over the last decade. Even those outside of the industry have heard about many high-profile breaches which have made headline news around the world. This trend shows no sign of slowing and, in fact, the great landscape continues to rapidly evolve.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>To combat the threat, companies have become hyper focused on cybersecurity. Terms like Zero Trust Architecture, Zero Trust Framework, Zero Trust Security, Zero Trust Model and Zero Trust Network are being used repeatedly. Most major security vendors, cloud platforms, management suites, networking companies and identity and access management providers are now integrating Zero Trust solutions into their existing security components and offerings.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Sometimes there are buzzwords just for the sake of buzzwords, but other times, such as this one, important sounding words or phrases can be valuable and have merit. In this guide we will explore why the Zero Trust concept\/model\/framework is essential, its core principles, the pillars it\u2019s built upon, the impact it can have on your business and how to begin to incrementally incorporate Zero Trust approaches into your existing architecture.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:616,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec0195c elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec0195c\" data-element_type=\"section\" id=\"zerotrusttc_02\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a1e0f7c\" data-id=\"a1e0f7c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebda914 elementor-widget elementor-widget-heading\" data-id=\"ebda914\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A QUICK NOTE ON TERMINOLOGY  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8299df9 elementor-widget elementor-widget-text-editor\" data-id=\"8299df9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>While most of the core concepts of Zero Trust Architecture are universally agreed upon, you will see various interpretations with subtle differences depending on which article you read. There may be different names for certain aspects or a slightly differing number of defined pillars. These variances are only minor and do not constitute a major deviation in the intent-of or approach-to implementation of a Zero Trust Security Model.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>This paper focuses on Microsoft\u2019s definition of Zero Trust Architecture and the related offerings available across the Microsoft 365 and Azure platforms at the time of this writing. While there are many good solutions on the market, organisations already consuming Microsoft cloud services may experience an easier time implementing the Zero Trust principles as the required products are already present and integrated into the platform.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>It is also worth pointing out some organisations choose to implement security tools using a best-in-breed approach leveraging analysis trends from trusted third parties such as Gartner Magic Quadrants. While this is certainly a valid approach, and you may see small gains in various feature sets, there is an overall loss of visibility and control when compared to a single platform managing the end-end solution of identity, applications, data, threat protection and device management. Yes, you are theoretically putting all your eggs in one basket, but you are certainly not alone. Many global organisations are doing just this and achieving successful outcomes. As is often the case, these decisions come down to the delicate balancing act of managing risk for your organisation.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9554f7f elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9554f7f\" data-element_type=\"section\" id=\"zerotrusttc_03\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2dfb52a\" data-id=\"2dfb52a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c93d50 elementor-widget elementor-widget-heading\" data-id=\"3c93d50\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT IS ZERO TRUST? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ece999f elementor-widget elementor-widget-text-editor\" data-id=\"ece999f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust is a philosophy first invented by John Kindervag when he was a principal analyst at Forrester Research. His famous quote is: \u201cWhen every user, packet, network interface and device is untrusted, protecting assets becomes simple.\u201d This ground-breaking concept was contrary to the industry-standard approach at the time which believed devices could be trusted by default and the network perimeter was sufficient to ward off any unsanctioned access to corporate resources.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Prior to Kindervag\u2019s observation, the approach to network security was known as the \u201cTrust but Verify\u201d method, where trust was the default posture. Once a person\u2019s identity had been validated, administrators would allow users unfettered access to the network. It also meant the endpoint the user was operating from would have unrestricted access to the entire infrastructure.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:141,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Zero Trust is effectively taking the opposite position and equates to a posture of \u201cNever Trust, Always Verify\u201d. The Trust but Verify approach can be considered fundamentally flawed if the primary goal is to prevent a compromise. By flipping this concept on its head and instead saying a device is untrusted by default, then protecting against a compromise becomes much more effective.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>To be fair, let\u2019s first understand how the old philosophy became commonplace.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Once upon a time, all the valuable data in the kingdom was stored in a beautiful walled garden and was protected by a mighty firewall. To access the data, a user had to be inside the walled garden, plugged into a known network port and had to know their password.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>The armour of this strategy eventually began to crack when the bad actors realised people were inherently gullible, inquisitive and could be easily persuaded to click on things they shouldn\u2019t. Once clicked, they could voluntarily install malware on their trusted devices thereby allowing uninvited guests inside the walled garden to pillage and plunder.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:10,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8329190 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8329190\" data-element_type=\"section\" id=\"zerotrusttc_04\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-05ca78d\" data-id=\"05ca78d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-655613c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"655613c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f90dff3\" data-id=\"f90dff3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fe1b1e elementor-widget elementor-widget-heading\" data-id=\"6fe1b1e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHY IS ZERO TRUST SO IMPORTANT? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db47aa9 elementor-widget elementor-widget-image\" data-id=\"db47aa9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"3804\" height=\"1523\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Hacker.png\" class=\"attachment-full size-full wp-image-15248\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Hacker.png 3804w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Hacker-300x120.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Hacker-1024x410.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Hacker-768x307.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Hacker-1536x615.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Hacker-2048x820.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Hacker-1568x628.png 1568w\" sizes=\"(max-width: 3804px) 100vw, 3804px\" style=\"width:100%;height:40.04%;max-width:3804px\" title=\"Hacker\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba930e1 elementor-widget elementor-widget-text-editor\" data-id=\"ba930e1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"NormalTextRun SCXW38981487 BCX0\">The proliferation of cloud computing in the early 2000s was a game-changer. It brought great benefits by relieving <span class=\"NormalTextRun SCXW38981487 BCX0\">organisations<span class=\"NormalTextRun SCXW38981487 BCX0\"> from the burden of having to continuously manage infrastructure and allowed them to enjoy the fruits of modern and always up-to<span class=\"NormalTextRun SCXW38981487 BCX0\">-date line of business applications through the Software as a Service (SaaS) model. From a security perspective, however, things became more complicated very quickly. Now, sensitive corporate data has left the building and is resident in someone else\u2019s net<span class=\"NormalTextRun SCXW38981487 BCX0\">work being accessed over the internet (aka the most untrusted network ever!).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83ec55 elementor-widget elementor-widget-heading\" data-id=\"c83ec55\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Enter Mobility <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51f87e4 elementor-widget elementor-widget-text-editor\" data-id=\"51f87e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW70093443 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW70093443 BCX0\">In addition to data now being distributed across cloud <span class=\"NormalTextRun SCXW70093443 BCX0\">datacentres<span class=\"NormalTextRun SCXW70093443 BCX0\">, technological advancements have equipped users to be more mobile. If the data lives in the clou<span class=\"NormalTextRun SCXW70093443 BCX0\">d, then why should the user be bound to an office building to access it? People are more productive when they can work from home, on the road, in a hotel, at a coffee shop or even at the gym. This was embraced by organisations since more productive <span class=\"NormalTextRun SCXW70093443 BCX0\">workers<span class=\"NormalTextRun SCXW70093443 BCX0\"> equal more output and more profits for the business. So now we have users accessing sensitive corporate data from anywhere using any device at any time over the most untrusted network ever\u2026 What could go wrong?\u00a0<span class=\"EOP SCXW70093443 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d29ddc elementor-widget elementor-widget-heading\" data-id=\"7d29ddc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">More Sophisticated Attacks <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33a5963 elementor-widget elementor-widget-text-editor\" data-id=\"33a5963\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cloud computing and mobility revolutionised how businesses operate by reducing their infrastructure footprint with cutting-edge cloud-based SaaS applications and empowering knowledge workers to be more productive by consuming data from anywhere.\u00a0\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>However, all this innovation came at a cost. It provided more opportunities for hackers to revolutionise how they can attack organisations for profit. The perceived small attack surface of yesteryear (the walled garden) has now expanded exponentially to the far reaches of the globe.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Money is the ultimate motivator and the bad actors haven\u2019t been resting on their laurels. Rather, they have been advancing alongside the rest of the industry. With more modern threats come more evolved attacks such as spear phishing and ransomware. The attackers graduated from just creating short-term havoc to holding data hostage and employing clandestine spying tactics to execute very targeted and well-planned attacks which are much more devastating and costly to businesses.\u00a0\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:10,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3867b8e elementor-widget elementor-widget-heading\" data-id=\"3867b8e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity, Identity, Identity <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-566ce4b elementor-widget elementor-widget-text-editor\" data-id=\"566ce4b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW42398624 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42398624 BCX0\">Did you ever hear the real estate expression \u201cLocation, Location, Location\u201d? It means more than anything else, the location of a property determines its value. Well in a Trust but Verify <span class=\"NormalTextRun SCXW42398624 BCX0\">approach,<span class=\"NormalTextRun SCXW42398624 BCX0\"> identity, more than anything else determines acces<span class=\"NormalTextRun SCXW42398624 BCX0\">s to resources. A credential (username and password) is the only information required to impersonate an identity. If the identity verifies the trust, then the identity is the key to the kingdom. Whether it is to use the identity to steal data, lay malware, encrypt <span class=\"NormalTextRun SCXW42398624 BCX0\">data for ransom or gather exploitable intelligence from the birds-eye-view of an insider, identity theft has become the number one manner <span class=\"NormalTextRun SCXW42398624 BCX0\">organisations<span class=\"NormalTextRun SCXW42398624 BCX0\"> have been breached in the current day. For this reason, identity has been coined the \u201cnew perimeter\u201d or <span class=\"NormalTextRun SCXW42398624 BCX0\">\u201cnew security boundary.\u201d<span class=\"EOP SCXW42398624 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-791d292 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"791d292\" data-element_type=\"section\" id=\"zerotrusttc_05\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ee433e5\" data-id=\"ee433e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2b954f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b954f7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e10d924\" data-id=\"e10d924\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4302891 elementor-widget elementor-widget-heading\" data-id=\"4302891\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW DOES ZERO TRUST SECURITY WORK? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4ff78c elementor-widget elementor-widget-text-editor\" data-id=\"c4ff78c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In a Zero Trust Security Model we treat every access attempt the same, regardless of where it originated. Don\u2019t blindly trust a device because it is within the corporate network boundary. Don\u2019t simply assume a correct password means the user must be who they say they are. Don\u2019t conclude someone connecting from an unknown location must be on an exotic vacation.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:341,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Do harden the estate and prepare for a compromise as if it is inevitable. Do apply containment strategies and limit exposure if\/when there is a breach of security by limiting what can be accessed, by whom, from where and from which device. Don\u2019t allow access to unnecessary resources or provide excess privileges above what are needed. Audit access and monitor and alert on anomalous behaviour.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>A walk in the park, right? Let\u2019s break things down.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce669a9 elementor-widget elementor-widget-image\" data-id=\"ce669a9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3946\" height=\"2639\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Verify.png\" class=\"attachment-full size-full wp-image-15249\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Verify.png 3946w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Verify-300x201.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Verify-1024x685.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Verify-768x514.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Verify-1536x1027.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Verify-2048x1370.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Verify-1568x1049.png 1568w\" sizes=\"(max-width: 3946px) 100vw, 3946px\" style=\"width:100%;height:66.88%;max-width:3946px\" title=\"Verify\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-75b01d7 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"75b01d7\" data-element_type=\"section\" id=\"zerotrusttc_06\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2862d2b\" data-id=\"2862d2b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e765257 elementor-widget elementor-widget-heading\" data-id=\"e765257\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT ARE THE PRINCIPLES OF ZERO TRUST SECURITY?  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a7bbea elementor-widget elementor-widget-heading\" data-id=\"9a7bbea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Never Trust, Always Verify (Verify Explicitly)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a00f65b elementor-widget elementor-widget-text-editor\" data-id=\"a00f65b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The first core principle of Zero Trust requires all touchpoints of an access request be scrutinised and forced to attest to their authenticity and level of trust. The manner of inspection can include the identity of the user, location the access is originating from, type of device used, security posture of the device, type of request, etc. With this approach, neither a compromised endpoint nor a stolen identity is enough to gain unauthorised access.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:184,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Only when all conditions of the request are satisfied will access be granted. This cycle is repeated for subsequent access requests and inherent trust is never implied.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:396,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b33840 elementor-widget elementor-widget-heading\" data-id=\"3b33840\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Apply Least Privilege Access  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afd7546 elementor-widget elementor-widget-text-editor\" data-id=\"afd7546\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW143289777 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW143289777 BCX0\">Another core principle of Zero Trust is to provide just enough access to data and<span class=\"NormalTextRun SCXW143289777 BCX0\"> applications as is necessary to perform a function. In this way, we apply the principle of Assume Breach (see below) on a micro-scale. If we assume an identity will be compromised, limiting its level of access reduces the attack surface and potential impa<span class=\"NormalTextRun SCXW143289777 BCX0\">ct of a breach.\u00a0<span class=\"EOP SCXW143289777 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:110,&quot;335559739&quot;:360,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7d4c64 elementor-widget elementor-widget-heading\" data-id=\"b7d4c64\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Assume Breach <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16bca21 elementor-widget elementor-widget-text-editor\" data-id=\"16bca21\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Another aspect of the principle of Zero Trust is to assume breach. This means the final core principle of Zero Trust is to assume a breach will occur rather than hoping the systems and data will always remain secure and protected. We must assume security controls will eventually be compromised (if they haven\u2019t been already). This requires organisations to incorporate layers of security to minimise the impact of an attack when it does happen.\u00a0\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>For example; segmenting networks to protect high-value server workloads from user networks where breaches are likely to occur. Only necessary traffic should be allowed between these network segments and it should be continuously monitored. Taken a step further, micro-segmentation (the concept of creating access policies between specific network interfaces on specific nodes within the individual segments) is gaining a lot of popularity as well.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:288,&quot;335559739&quot;:0,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71c0cbe elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71c0cbe\" data-element_type=\"section\" id=\"zerotrusttc_07\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ddb82e7\" data-id=\"ddb82e7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6f62ef elementor-widget elementor-widget-heading\" data-id=\"d6f62ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT ARE THE PILLARS OF ZERO TRUST ARCHITECTURE? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1bff57 elementor-widget elementor-widget-text-editor\" data-id=\"b1bff57\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW202523817 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW202523817 BCX0\">In this section, we will discuss the six <span class=\"NormalTextRun SCXW202523817 BCX0\">(6) pillars of Zero Trust where controls and technologies should be implemented, including examples of relevant Microsoft products <span class=\"NormalTextRun SCXW202523817 BCX0\">which <span class=\"NormalTextRun SCXW202523817 BCX0\">address the specific pillar.<span class=\"EOP SCXW202523817 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:930,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bc6839b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc6839b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-911e2d3\" data-id=\"911e2d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a40cb51 elementor-widget elementor-widget-image\" data-id=\"a40cb51\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1217\" height=\"240\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_2.png\" class=\"attachment-full size-full wp-image-14701\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_2.png 1217w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_2-300x59.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_2-1024x202.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_2-768x151.png 768w\" sizes=\"(max-width: 1217px) 100vw, 1217px\" style=\"width:100%;height:19.72%;max-width:1217px\" title=\"ultimate_zero_trust_img_2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b6126d elementor-widget elementor-widget-heading\" data-id=\"5b6126d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8e6806 elementor-widget elementor-widget-text-editor\" data-id=\"c8e6806\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Identity requires verification of people, service accounts and devices through strong authentication and access compliance. Taken a step further, leveraging a single identity store as the ultimate source of truth prevents \u201cidentity sprawl\u201d which happens when separate sets of credentials are maintained in various SaaS-based applications. Identity sprawl not only creates management headaches but also poses significant risk since it equates to multiple sets of vulnerable credentials per user.\u00a0\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Microsoft Azure Active Directory Single Sign-On (SSO) offers a robust solution to manage a single identity for all SaaS applications, monitored and protected by intelligent security telemetry with visibility and control.\u00a0\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Finally, a well thought out Role-Based Access Control (RBAC) strategy aligned to a least privilege approach is the mechanism used to define what level of access identities have across the other pillars.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>More on <a href=\"https:\/\/insentra.fyi\/Zero-Trust-and-Identity\" target=\"_blank\" rel=\"noopener nofollow\">Zero Trust Identity<\/a> can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-58efe79 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58efe79\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0234871\" data-id=\"0234871\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c803f95\" data-id=\"c803f95\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-993e48a elementor-widget elementor-widget-video\" data-id=\"993e48a\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/9oEyF2bdRXI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-36b1c4c\" data-id=\"36b1c4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c9d85a elementor-widget elementor-widget-heading\" data-id=\"7c9d85a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Endpoints (Devices) <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e336cf5 elementor-widget elementor-widget-text-editor\" data-id=\"e336cf5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Device Management (ZTDM) requires the ability to monitor, control and validate the level of trust of all devices in the organisation. This includes the ability to confirm the device meets a minimum set of standardised requirements which attest to its overall security posture and trustworthiness. ZTDM extends to user workstations, physical and virtual appliances and IoT devices.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Microsoft Endpoint Manager (Intune) offers a comprehensive cloud-first platform to manage endpoints including the ability to set Compliance Policies which will flag a device not aligned with a desired baseline.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Any device allowed to gain access to corporate resources must be considered within this pillar.<\/p><p>More on\u00a0<a href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/fasttrack\/microsoft-fasttrack-zero-trust-and-endpoints-secure-them-all\/\" target=\"_blank\" rel=\"noopener\" data-wplink-edit=\"true\">Zero Trust Endpoints<\/a>\u00a0can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-56442f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56442f9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0275656\" data-id=\"0275656\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0b63c0b\" data-id=\"0b63c0b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2601705 elementor-widget elementor-widget-video\" data-id=\"2601705\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/A74N3HKF-Jg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a1b4af1\" data-id=\"a1b4af1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-abdb7c5 elementor-widget elementor-widget-heading\" data-id=\"abdb7c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba54076 elementor-widget elementor-widget-text-editor\" data-id=\"ba54076\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Data Security (ZTDS) requires data to be categorised and only accessible to those authorised following a least-privileged approach. Zero Trust Data Protection (ZTDP) requires data to be protected and encrypted both at rest and in transit.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Microsoft Purview, a unified data classification and governance solution contains several tools to support Data Security ranging from basic controls to highly complex content labelling including Data Loss Prevention (DLP), Information Protection, Message Encryption, Data Lifecycle Management, Compliance Management, Insider Risk Management and more.\u00a0\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>All data created and owned by the organisation falls under this pillar. More on\u00a0<a href=\"https:\/\/insentra.fyi\/Zero-Trust-and-Data\" target=\"_blank\" rel=\"noopener nofollow\">Zero Trust Data Security<\/a>\u00a0can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5769768 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5769768\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-daf0a46\" data-id=\"daf0a46\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e9c460c\" data-id=\"e9c460c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b737870 elementor-widget elementor-widget-video\" data-id=\"b737870\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/krejhmC2nLg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9976b38\" data-id=\"9976b38\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-6407b49 elementor-widget elementor-widget-heading\" data-id=\"6407b49\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Applications\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29104da elementor-widget elementor-widget-text-editor\" data-id=\"29104da\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Application Access (ZTAA) requires applications to be correctly configured with appropriate controls and follow a least privilege access approach to both production as well as administration layers. Access to applications should be gated and available to only trusted users and devices and data movement into and out of the applications should be monitored.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:0,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Microsoft Defender for Cloud Apps offers a comprehensive set of controls to govern and monitor both Microsoft 365 and third-party SaaS applications in addition to fundamental controls like RBAC and Conditional Access policies. Unsanctioned applications can be prevented\u00a0<span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\" data-contrast=\"none\">from running on endpoints with tools like AppLocker which can create whitelists of approved applications or Defender for Endpoint Indicators which can specifically block applications based flexible criteria.\u00a0<span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>All applications used by the organisation (both internal and cloud-based), must be considered under this pillar.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>More on <a href=\"https:\/\/insentra.fyi\/Zero-Trust-and-Applications\" target=\"_blank\" rel=\"noopener nofollow\">Zero Trust Application Access<\/a> can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-76221a7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76221a7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7a489c4\" data-id=\"7a489c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c75df79\" data-id=\"c75df79\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45a081f elementor-widget elementor-widget-video\" data-id=\"45a081f\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/VT3O9ZyRthI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8c9b661\" data-id=\"8c9b661\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-a803dec elementor-widget elementor-widget-heading\" data-id=\"a803dec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Infrastructure<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb7873d elementor-widget elementor-widget-text-editor\" data-id=\"cb7873d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Infrastructure (ZTI) requires an organisation to harden its on-premises and cloud infrastructure against attack. The management plan is often overlooked but is a critical aspect of a thorough Zero Trust Security program. In addition, limiting physical access to on-premises systems, patching for vulnerabilities and following a least privilege RBAC model are critical components of ZTI.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:222,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Tools such as Microsoft Defender for Cloud, Defender for Identity, Privileged Identity Management (PIM) and Conditional Access policies can aid in securing privileged access and monitoring.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>All infrastructure components owned and managed by the organisation (both on-premises as well as cloud-based) must be considered within this pillar. More on <a href=\"https:\/\/insentra.fyi\/Zero-Trust-and-Infrastructure\" target=\"_blank\" rel=\"noopener nofollow\" data-wplink-edit=\"true\">Zero Trust Infrastructure<\/a> can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-38f0b2b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"38f0b2b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7e1ff11\" data-id=\"7e1ff11\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7aa7087\" data-id=\"7aa7087\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc45b37 elementor-widget elementor-widget-video\" data-id=\"bc45b37\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/hDrLf6WtVcw?list=PLpVDQx_iPJFap5AXr37-hm-qWYt_KgKvt&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4e919b1\" data-id=\"4e919b1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-563d6f4 elementor-widget elementor-widget-heading\" data-id=\"563d6f4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Network <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32fe2e5 elementor-widget elementor-widget-text-editor\" data-id=\"32fe2e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Network Access (ZTNA) requires the ability to segment network traffic appropriately based on a just-enough access approach. Additionally, monitoring and threat detection are commonly used to harden and protect at the network layer. Controlling access via adaptive policy and ensuring end-end encryption of all data are aspects of ZTNA.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>There are some native Microsoft tools in Azure such as Just-in-Time Access, Azure Firewall, Network and Application Security Groups and Azure Bastion which can be leveraged in cloud-based or hybrid environments as well as a myriad of third-party tools. Microsoft Defender for Endpoint also contains protection mechanisms which can control network access at the endpoint (device) level.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>All physical and virtual data networks with connectivity to the corporate environment, no matter how small, must be considered within this pillar.<\/p><p>More on\u00a0<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/fasttrack\/zero-trust-and-networks-it-all-starts-here\/\" target=\"_blank\" rel=\"noopener\">Zero Trust Networks<\/a>\u00a0can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-381dc2b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"381dc2b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-76b412f\" data-id=\"76b412f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bc47bde\" data-id=\"bc47bde\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8276de9 elementor-widget elementor-widget-video\" data-id=\"8276de9\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/3ykMu6ywgWI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-74746a9\" data-id=\"74746a9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-afb6a46 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"afb6a46\" data-element_type=\"section\" id=\"zerotrusttc_08\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-84ba438\" data-id=\"84ba438\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9de46f6 elementor-widget elementor-widget-heading\" data-id=\"9de46f6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT IMPACT WILL ZERO TRUST SECURITY HAVE ON USER EXPERIENCE?  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2976ea6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2976ea6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f271c68\" data-id=\"f271c68\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aa3f3ee elementor-widget elementor-widget-image\" data-id=\"aa3f3ee\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3935\" height=\"1948\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Conditions-and-Controls.png\" class=\"attachment-full size-full wp-image-15250\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Conditions-and-Controls.png 3935w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Conditions-and-Controls-300x149.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Conditions-and-Controls-1024x507.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Conditions-and-Controls-768x380.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Conditions-and-Controls-1536x760.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Conditions-and-Controls-2048x1014.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Conditions-and-Controls-1568x776.png 1568w\" sizes=\"(max-width: 3935px) 100vw, 3935px\" style=\"width:100%;height:49.5%;max-width:3935px\" title=\"Conditions and Controls\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4f18d5 elementor-widget elementor-widget-text-editor\" data-id=\"f4f18d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW177825976 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW177825976 BCX0\">By now you must be thinking this must be extremely disruptive to the poor end-<span class=\"NormalTextRun SCXW177825976 BCX0\">users who will be challenged at every turn to prove themselves. This doesn\u2019t have to be the case. In fact, if Zero Trust is introduced with a well thought out and carefully planned approach, it can complement the end-user experience.\u00a0<span class=\"EOP SCXW177825976 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:178,&quot;335559739&quot;:494,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9197b39 elementor-widget elementor-widget-heading\" data-id=\"9197b39\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-434e584 elementor-widget elementor-widget-text-editor\" data-id=\"434e584\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/fasttrack\/microsoft-fasttrack-zero-trust-and-identity-shifting-the-security-controls\/\" target=\"_blank\" rel=\"noopener\" data-wplink-edit=\"true\">Let\u2019s take identity as an example<\/a>. We all know Multifactor Authentication (MFA) must be at the heart of any organisation&#8217;s Zero Trust Security strategy. MFA is the process of requiring a user to present something they know (such as a password) and something they have (such as an identification device like a phone) to gain access.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>While most users are accustomed to this already, it may be seen by some as burdensome to enter SMS codes to be granted access. To make this easier and more secure, most modern-day MFA products can leverage push notifications sent to authenticator applications running on smartphones and smartwatches which only require a tap to approve. Many of these applications can also be leveraged for MFA for many different sites and services in addition to the corporate assets.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>For example, you can leverage the Microsoft Authenticator application on your smartphone for all kinds of MFA enrolments including one or more Microsoft 365 tenants, VPN connections, banking sites, benefits sites, password vaults and more. It can make your life easier since you can enrol all these different services into one convenient application to protect both your corporate as well as personal identities.<span data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6efa997 elementor-widget elementor-widget-heading\" data-id=\"6efa997\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Endpoints<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d8df66 elementor-widget elementor-widget-text-editor\" data-id=\"1d8df66\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Let\u2019s use identity as an example. We all know Multifactor Authentication (MFA) must. Next let\u2019s look at device verification and attestation. What would it take to verify a device is compliant with an organisation&#8217;s security standards? The answer is simple &#8211; being managed.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Insentra helps clients leverage <a href=\"https:\/\/www.insentragroup.com\/nz\/services\/microsoft-fasttrack\/tune-in-to-find-out-about-intune\/\" target=\"_blank\" rel=\"noopener\">Intune<\/a> to create a cloud-first modern management solution which allows organisations to control the security posture of the device, configure policies, VPN and Wi-Fi profiles, push software, manage updates and so on. Intune also reports the compliance status of a device based on a predetermined list of requirements such as having boot security enabled, being encrypted, having a firewall turned on, running up-to-date antimalware and Endpoint Detection and Response (EDR) products, etc. This compliance status can then be evaluated by Conditional Access policies to determine if the device should be granted access to corporate applications and data.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>While this makes the business\u2019s IT, Operations and Security teams happy by streamlining enrolments and mandating a security baseline, it also benefits the end users since they get to enjoy a modern device experience with an up-to-date operating system, automatically deployed software, single sign-on capability, consistent roaming data across devices and over-the-air provisioning of new devices which can be drop-shipped directly to their homes and remotely configured using Autopilot.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Taking these concepts a step further, let\u2019s explore Windows Hello for Business. When users are required to register biometrics such as a fingerprint or facial recognition with Intune, this is considered and accepted as a form of MFA since the user must present something they have (finger or face) to access the device. Once they have authenticated to the device with something they have, they will no longer be challenged for MFA from any Microsoft 365 services or Azure Active Directory federated third-party SaaS applications.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f906fb1 elementor-widget elementor-widget-image\" data-id=\"f906fb1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"434\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_4_1-1024x593.jpg\" class=\"attachment-large size-large wp-image-14720\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_4_1-1024x593.jpg 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_4_1-300x174.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_4_1-768x444.jpg 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_4_1.jpg 1208w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:57.86%;max-width:1208px\" title=\"ultimate_zero_trust_img_4_1\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d41af9 elementor-widget elementor-widget-text-editor\" data-id=\"2d41af9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Want to see a contented end-user? Let them sign into their laptop by simply looking at the webcam, thus granting them seamless access to all their line of business applications. They won\u2019t even know this cutting-edge modern experience they are enjoying is also greatly enhancing the security posture of the organisation. It\u2019s like pouring chocolate sauce on broccoli to have your kids eat a vegetable!\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>These transformational projects provide value for all stakeholders, including business leadership, those responsible for risk management, operations teams and end-users. This is a win-win experience for all &#8211; a fairly simple way to gain a strong foothold into the world of Zero Trust Security while enhancing the way devices are managed and delighting end-users with a truly modern platform and experience.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>A Zero Trust Security implementation requires careful planning and execution to avoid disruptions to business. Everyone affected by incoming policy changes must be prepared and informed regarding what to expect and when. This level of planning and communication will help ensure a smooth transition to your Zero Trust model.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:87,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>A bit more on Endpoint Management.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>It should be noted Intune not only manages PCs but also MacOS and mobile devices such as iOS and Android. In addition to granular control of mobile devices when fully managed, Intune has a very well thought out and light-touch way of handling Bring Your Own Device (BYOD) scenarios to ensure corporate data is still secure even though the device itself may not be fully managed (given it is owned by the employee and not the business). The best part is all these device management capabilities are controlled under a single pane of glass!\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:10,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1be89d9 elementor-widget elementor-widget-image\" data-id=\"1be89d9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"613\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_5.jpg\" class=\"attachment-large size-large wp-image-14716\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_5.jpg 791w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_5-300x245.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/ultimate_zero_trust_img_5-768x627.jpg 768w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:81.67%;max-width:791px\" title=\"ultimate_zero_trust_img_5\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2252dd elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2252dd\" data-element_type=\"section\" id=\"zerotrusttc_09\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-98c58ad\" data-id=\"98c58ad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6303949 elementor-widget elementor-widget-heading\" data-id=\"6303949\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT IS THE COST IMPACT OF ZERO TRUST SECURITY? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9b7d84 elementor-widget elementor-widget-text-editor\" data-id=\"d9b7d84\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The implementation of Zero Trust should not be looked at as a cost saving exercise for day-to-day operating costs. You should expect to have to purchase some products and services to support this model, though there may already be some foundational components available for use depending on what products are already owned by the organisation.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:168,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>However, there is a cost savings conversation when discussing how Zero Trust Security can help in avoiding and\/or mitigating the cost of data breaches. IBM\u2019s \u201cCost of Data Breach Report 2021\u201d found the cost of a breach averages $4.24 Million USD (which has increased 10% from the prior year). In this same report, IBM found a 42.3% decrease in cost of data breaches for organisations with a mature Zero Trust implementation as compared to organisations with no Zero Trust strategy in place.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Following the Assume Breach principle, organisations should not believe they will never be breached. In fact, the likelihood an organisation will never be breached is extremely low. The Forrester report \u201cThe 2021 State of Enterprise Breaches\u201d found 63% of businesses have suffered a breach in the last 12 months (which is a 4% increase from the prior year).\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>These staggering numbers supports the notion whereby the cost for being prepared pales in comparison to the cost of incident response and clean-up which can include data recovery efforts, lost revenue during outages and, possibly the most destructive of all, the reputational impact.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:79,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>To quote Benjamin Franklin, \u201cBy failing to prepare you are preparing to fail,\u201d he also said: \u201cAn ounce of prevention is worth a pound of cure.\u201d Mr. Franklin would have made a great cybersecurity consultant had he been born 300 years in the future!\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Additional benefits which are more difficult to quantify with a Zero Trust Security implementation include:\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:327,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><ul><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Standardising on comprehensive offerings such as Microsoft 365, Azure Active Directory and Defender often translate to consolidation and retirement of several (often legacy) disparate point solutions and services, each carrying management overhead and a Total Cost of Ownership (TCO)<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Reduced likelihood of regulatory violations and fines\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:12,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1027,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"2\">Modern compliance and cybersecurity guidelines typically align with a Zero Trust Strategy\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:36,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1027,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"2\">Diminished risk of data loss events and resulting legal costs\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:12,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Technology engagement has been shown to improve employee experience and satisfaction\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:37,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Increased business agility due to the flexibility and remote work capabilities inherent in a Zero Trust Security Model\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:37,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Faster adoption of new platform offerings aligned with a modern approach\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-14a5995 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14a5995\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8042429\" data-id=\"8042429\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-280cd17 elementor-widget elementor-widget-image\" data-id=\"280cd17\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1568\" height=\"712\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Zero-trust-model-1-1_v2-1568x712.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-image-15326\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Zero-trust-model-1-1_v2-1568x712.jpg 1568w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Zero-trust-model-1-1_v2-300x136.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Zero-trust-model-1-1_v2-1024x465.jpg 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Zero-trust-model-1-1_v2-768x349.jpg 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Zero-trust-model-1-1_v2-1536x698.jpg 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/Zero-trust-model-1-1_v2.jpg 1644w\" sizes=\"(max-width: 1568px) 100vw, 1568px\" style=\"width:100%;height:45.44%;max-width:1644px\" title=\"Zero-trust-model-1-1_v2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61296a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61296a4\" data-element_type=\"section\" id=\"zerotrusttc_10\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a2a8f86\" data-id=\"a2a8f86\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d36e0a elementor-widget elementor-widget-heading\" data-id=\"2d36e0a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW TO BEGIN YOUR ZERO TRUST SECURITY IMPLEMENTATION  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b27ffc7 elementor-widget elementor-widget-text-editor\" data-id=\"b27ffc7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW6519078 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW6519078 BCX0\">OK. get ready for a bunch of tips here.<span class=\"EOP SCXW6519078 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:52,&quot;335559737&quot;:37,&quot;335559739&quot;:293,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-103bc58 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"103bc58\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-02fff2e\" data-id=\"02fff2e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b565f1 elementor-widget elementor-widget-heading\" data-id=\"9b565f1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b0956c5\" data-id=\"b0956c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14f9847 elementor-widget elementor-widget-text-editor\" data-id=\"14f9847\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW167635420 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW167635420 BCX0\">Start by taking an inventory of identities across the business and develop identity lifecycle processes to streamline on<span class=\"NormalTextRun SCXW167635420 BCX0\">boarding and offboarding. Clean up user metadata <span class=\"NormalTextRun SCXW167635420 BCX0\">and leverage dynamic group membership to manage entitlements to prevent users who change departments from retaining access no longer needed. Make sure you <a class=\"Hyperlink SCXW167635420 BCX0\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/secure-workplace\/pass-the-passwords-to-the-left-hand-side\/\" target=\"_blank\" rel=\"noopener\"><span class=\"TextRun Underlined SCXW167635420 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW167635420 BCX0\">follow modern <\/a><a class=\"Hyperlink SCXW167635420 BCX0\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/secure-workplace\/pass-the-passwords-to-the-left-hand-side\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-wplink-edit=\"true\"><span class=\"TextRun Underlined SCXW167635420 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW167635420 BCX0\">password policy guidance.\u00a0<\/a><span class=\"EOP SCXW167635420 BCX0\" data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-31f455e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"31f455e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-436bc14\" data-id=\"436bc14\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58e0fe5 elementor-widget elementor-widget-heading\" data-id=\"58e0fe5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5950c88\" data-id=\"5950c88\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96e2412 elementor-widget elementor-widget-text-editor\" data-id=\"96e2412\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW224960751 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW224960751 BCX0\">Work towards an approach of <span class=\"NormalTextRun SCXW224960751 BCX0\">just enough<span class=\"NormalTextRun SCXW224960751 BCX0\"> and just-in-time access. Do not provide more access than needed for each business role. Separate administrative accounts from produ<span class=\"NormalTextRun SCXW224960751 BCX0\">ctivity accounts and challenge everyone for MFA all <span class=\"NormalTextRun SCXW224960751 BCX0\">the time. Do not treat corporate networks as trusted IP ranges because doing so opens a gaping hole in a Zero Trust model should a user identity be compromised while on an internal network.<span class=\"EOP SCXW224960751 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:228,&quot;335559737&quot;:206,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:0}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10193c6 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10193c6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-bcba283\" data-id=\"bcba283\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b3367e elementor-widget elementor-widget-heading\" data-id=\"5b3367e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-aedfce9\" data-id=\"aedfce9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6882153 elementor-widget elementor-widget-text-editor\" data-id=\"6882153\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW127774079 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW127774079 BCX0\">Le<span class=\"NormalTextRun SCXW127774079 BCX0\">verage a robust and intelligent identity platform for accessing all Line-of-Business SaaS applications such as Azure Active Directory. Doing so allows you to grant and revoke access and entitlements <span class=\"NormalTextRun SCXW127774079 BCX0\">from a single platform and provides a simplified approach to provisioning and de-provisioning, while combining security controls and signals across disparate systems into a single management platform with advanced threat detection capabilities.\u00a0<span class=\"EOP SCXW127774079 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:201,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8e185f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8e185f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a2a1f86\" data-id=\"a2a1f86\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8db2ade elementor-widget elementor-widget-heading\" data-id=\"8db2ade\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0abc2e4\" data-id=\"0abc2e4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d29acca elementor-widget elementor-widget-text-editor\" data-id=\"d29acca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW125332262 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW125332262 BCX0\">Implement a mo<span class=\"NormalTextRun SCXW125332262 BCX0\">dern device management strategy such as Microsoft Endpoint Manager <span class=\"NormalTextRun SCXW125332262 BCX0\">(Intune) to gain full visibility and manageability of all devices <span class=\"NormalTextRun SCXW125332262 BCX0\">permitted to access identities and data while ensuring they meet compliance requirements.<span class=\"EOP SCXW125332262 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:37,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2dae3e1 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2dae3e1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-58241b0\" data-id=\"58241b0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-efe6c53 elementor-widget elementor-widget-heading\" data-id=\"efe6c53\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0d10f37\" data-id=\"0d10f37\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b583b7 elementor-widget elementor-widget-text-editor\" data-id=\"5b583b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW102616776 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW102616776 BCX0\">Segment workloads and monitor traffic within the network using the Zero Trust solutions offered by your <span class=\"NormalTextRun SCXW102616776 BCX0\">favourite<span class=\"NormalTextRun SCXW102616776 BCX0\"> networking vendor (there are many powerful products, so it is valuable to <span class=\"NormalTextRun SCXW102616776 BCX0\">research your options). Isolate the user networks, especially wirele<span class=\"NormalTextRun SCXW102616776 BCX0\">ss, to limit access to sensitive workloads which serve no purpose and expose risk.\u00a0<span class=\"EOP SCXW102616776 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:37,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c578f60 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c578f60\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-85b093b\" data-id=\"85b093b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73630e6 elementor-widget elementor-widget-heading\" data-id=\"73630e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a53f4ca\" data-id=\"a53f4ca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd5d903 elementor-widget elementor-widget-text-editor\" data-id=\"cd5d903\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW145276230 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145276230 BCX0\">Develop an \u2018Enterprise Acces<span class=\"NormalTextRun SCXW145276230 BCX0\">s Model\u2019 to separate admin accounts and Privilege Access Workstations (PAW) into tiers based on levels of sensitivity. Disallow higher-tiered privileged accounts from <span class=\"NormalTextRun SCXW145276230 BCX0\">signing into lower-tiered devices and PAWs and vice-versa. Use separate admin accounts <span class=\"NormalTextRun SCXW145276230 BCX0\">o<span class=\"NormalTextRun SCXW145276230 BCX0\">n-premises<span class=\"NormalTextRun SCXW145276230 BCX0\"> and in the cloud. Do not use shared local administrator credentials across endpoints. Instead, deploy a tool like Microsoft Local Administrator Password Service (LAPS) or, better yet, disable local admin accounts entirely!\u00a0<span class=\"EOP SCXW145276230 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:37,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c947614 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c947614\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4f6d324\" data-id=\"4f6d324\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c190168 elementor-widget elementor-widget-heading\" data-id=\"c190168\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-da1c0ea\" data-id=\"da1c0ea\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b4a8a2 elementor-widget elementor-widget-text-editor\" data-id=\"0b4a8a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\">Across all Microsoft cloud services, Conditional Access Policies (CAPs) are the glue holding it all together. As the name suggests, CAPs allow access to data and applications only when <span class=\"NormalTextRun SCXW263048533 BCX0\">certain conditions are met. If those conditions are not met, access is<span class=\"NormalTextRun SCXW263048533 BCX0\"> not granted. This is the basis of Zero Trust and should be a fundamental part of any Microsoft 365 or Azure security posture. If you own Azure Active Directory Premium 1 or 2 and you are not using <span class=\"NormalTextRun SCXW263048533 BCX0\">Conditional Access policies, then you should start today. <span class=\"NormalTextRun SCXW263048533 BCX0\">Review <a class=\"Hyperlink SCXW263048533 BCX0\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/concept-conditional-access-policy-common\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span class=\"TextRun Underlined SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\" data-ccp-charstyle=\"Hyperlink\">Common Conditional Access policies<\/a><span class=\"TextRun SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\"> to start. If you do not own Azure Active Directory Premium 1 or 2, <span class=\"NormalTextRun SCXW263048533 BCX0\">leverage <a class=\"Hyperlink SCXW263048533 BCX0\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span class=\"TextRun Underlined SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\">Conditional Access Security Defaults<\/a><span class=\"TextRun SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\">.<span class=\"EOP SCXW263048533 BCX0\" data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-969e3f5 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"969e3f5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-395d2d3\" data-id=\"395d2d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29bceb0 elementor-widget elementor-widget-heading\" data-id=\"29bceb0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">8<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9f75291\" data-id=\"9f75291\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a81a19 elementor-widget elementor-widget-text-editor\" data-id=\"7a81a19\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW236388877 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW236388877 BCX0\">Develop contingency plans in the event of breach such as validating backup and recovery processes, communication policies (who, what, when and how) and risk assessments <span class=\"NormalTextRun SCXW236388877 BCX0\">to determine mitigation strategies.\u00a0<span class=\"EOP SCXW236388877 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:37,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4b800eb elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b800eb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-489d2ed\" data-id=\"489d2ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e37f6dc elementor-widget elementor-widget-heading\" data-id=\"e37f6dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b788783\" data-id=\"b788783\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1fa39e elementor-widget elementor-widget-text-editor\" data-id=\"a1fa39e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW254369423 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW254369423 BCX0\">Lastly (and arguably the number one or two in terms of importance!) provide education to users on safe computing practices and why security controls are important for both corporate and personal identities. Ensure the education is continuous to keep security front of mind for all workers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a581399 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a581399\" data-element_type=\"section\" id=\"zerotrusttc_11\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-663c841\" data-id=\"663c841\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5754612 elementor-widget elementor-widget-heading\" data-id=\"5754612\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW TO DEVELOP A LONG TERM ZERO  TRUST SECURITY STRATEGY ROADMAP IN THE MICROSOFT ECOSYSTEM  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1dbf5c elementor-widget elementor-widget-text-editor\" data-id=\"d1dbf5c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW176601290 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW176601290 BCX0\">Rome wasn\u2019t built in a day and a Zero Trust implementation won\u2019t be either. We recommend you start with the higher value initiatives mentioned above and then look to further enhance from the estab<span class=\"NormalTextRun SCXW176601290 BCX0\">lished baseline. For example, within the Microsoft ecosystem, there are more advanced features in the higher SKUs which can complement the initial rollout with little to no user impact. Once your <span class=\"NormalTextRun SCXW176601290 BCX0\">organisation<span class=\"NormalTextRun SCXW176601290 BCX0\"> is ready to mature its model, a level-up of SKU<span class=\"NormalTextRun SCXW176601290 BCX0\"> will bring loads of new functionality and features, made easier given the way Microsoft bundle their products. Here are some of the current features and services available from Microsoft today with more being developed:\u00a0<span class=\"EOP SCXW176601290 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559739&quot;:310,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec0cfad elementor-widget elementor-widget-heading\" data-id=\"ec0cfad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity Protection <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6602dab elementor-widget elementor-widget-text-editor\" data-id=\"6602dab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Identity Protection takes the fundamental identity controls and layers intelligent security and real-time analytics to make informed decisions about whether an identity has been compromised.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559737&quot;:144,&quot;335559739&quot;:252,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p><b>Pillar: Identity<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d245bc elementor-widget elementor-widget-heading\" data-id=\"9d245bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender For Identity <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a8f15d elementor-widget elementor-widget-text-editor\" data-id=\"7a8f15d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Defender for Identity is a product which runs inside of the on-premises Active Directory environment and monitors Domain Controllers for anomalous behaviour, common reconnaissance and attack techniques.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559739&quot;:252,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p><b>Pillar: Identity, Infrastructure<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f893a43 elementor-widget elementor-widget-heading\" data-id=\"f893a43\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender For Office 365 <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b1e1d5 elementor-widget elementor-widget-text-editor\" data-id=\"2b1e1d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Defender for Office 365 allows organisations to detect malicious links and attachments in emails and documents before users can get a chance to run them. It also includes Anti Phishing protection.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559739&quot;:252,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p aria-level=\"2\"><b>Pillar: Applications, Data<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6826cf7 elementor-widget elementor-widget-heading\" data-id=\"6826cf7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender For Endpoint <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f7b70d elementor-widget elementor-widget-text-editor\" data-id=\"2f7b70d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Defender for Endpoint is a multifaceted enterprise security platform. It includes several components which can greatly improve the security posture of endpoint devices including:\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559739&quot;:324,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><ul><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Threat and Vulnerability Management to discover, prioritise and remediate misconfigurations and vulnerabilities\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:57,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Attack Surface Reduction to harden known exploitable weaknesses in Endpoint\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:11,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Next-Generation Protection to detect modern zero-day threats\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:11,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Endpoint Detection and Response (EDR) to add detection, automation and response to threats which have gotten past your defences\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:57,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Automated Investigation and remediation to automate investigation activities and reduce the volume of alerts\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:57,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Microsoft Threat Experts offers a managed service providing proactive threat hunting, insights and rapid response to threats\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:57,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Network controls with the ability to allow or disallow access to specific locations and websites\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:252,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><\/ul><p>Microsoft Defender for Endpoint also integrates with Microsoft Defender for Office 365 to enable security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked. \u00a0<\/p><p><b>Pillar: Endpoints (Devices), Applications, Data, Network<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41ddec0 elementor-widget elementor-widget-heading\" data-id=\"41ddec0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Privileged Identity Management <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fbc00c elementor-widget elementor-widget-text-editor\" data-id=\"0fbc00c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW145991067 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145991067 BCX0\">Privileged Identity Management (PIM) offers the ability to provide just-in-time administrative access to privileged accounts. The elevations are tied to a workflow which can do things like send alert no<span class=\"NormalTextRun SCXW145991067 BCX0\">tifications, require the requestor to state the nature and purpose of why they are asking for <span class=\"NormalTextRun SCXW145991067 BCX0\">elevation and<span class=\"NormalTextRun SCXW145991067 BCX0\"> even require the elevation request to be approved by other individual(s) within the <span class=\"NormalTextRun SCXW145991067 BCX0\">organisation<span class=\"NormalTextRun SCXW145991067 BCX0\">. This will serve to provide accountability and add<span class=\"NormalTextRun SCXW145991067 BCX0\">itional checks for privileged access usage.<span class=\"LineBreakBlob BlobObject DragDrop SCXW145991067 BCX0\"><span class=\"SCXW145991067 BCX0\">\u00a0<br class=\"SCXW145991067 BCX0\" \/><span class=\"LineBreakBlob BlobObject DragDrop SCXW145991067 BCX0\"><span class=\"SCXW145991067 BCX0\">\u00a0<br class=\"SCXW145991067 BCX0\" \/><strong><span class=\"TextRun SCXW145991067 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145991067 BCX0\">Pillar: Identity, Infrastructure, Applications<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-921cafb elementor-widget elementor-widget-heading\" data-id=\"921cafb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Access Reviews <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee17d8e elementor-widget elementor-widget-text-editor\" data-id=\"ee17d8e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Access Reviews allow organisations to bundle entitlements into packages which can be applied to individuals within an organisation or extended to guest accounts in a B2B scenario. This could include access to specific data and applications, Teams, SharePoint libraries, permission sets, etc. These access packages can then be configured for regularly scheduled reviews to ensure access to these entitlements is still warranted for the individual users.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p><strong>Pillar: Identity, Infrastructure, Applications, Data\u00a0<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2d1373 elementor-widget elementor-widget-heading\" data-id=\"e2d1373\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Azure Active Directory Password Protection <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-067b681 elementor-widget elementor-widget-text-editor\" data-id=\"067b681\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Azure Active Directory Password Protection runs on-premises and integrates with Active Directory to disallow weak passwords by leveraging Microsoft\u2019s real-time banned password lists as well as a custom list created by the customer.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p><strong>Pillar: Identity<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b71d20a elementor-widget elementor-widget-heading\" data-id=\"b71d20a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender For Cloud Apps  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1191734 elementor-widget elementor-widget-text-editor\" data-id=\"1191734\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Cloud Apps is a cloud-native Cloud Access Security Broker (CASB) which supports various deployment modes such as log collection for the discovery of Shadow IT and a broker for access to third-party SaaS applications with either API connectors or reverse proxy. It provides rich visibility and control over data movement and sophisticated analytics to identify and combat cyber threats across all Microsoft and third-party cloud services.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>In addition, Defender for Cloud Apps can work in tandem with Defender for Endpoint to report on application usage and block access to applications unsanctioned by the enterprise.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:348,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p><b>Pillar: Applications, Data<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0774694 elementor-widget elementor-widget-heading\" data-id=\"0774694\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Passwordless<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56194a8 elementor-widget elementor-widget-text-editor\" data-id=\"56194a8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>It has been a long-known truth our passwords are the weakest link in modern cyber security. Passwordless technologies are still evolving, however, there are a few steps you can take to begin this journey. One is leveraging Windows Hello for Business mentioned earlier in this article.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p><strong>Pillar: Identity, Endpoints (Devices), Applications, Data<\/strong>\u00a0<span data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9a65175 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9a65175\" data-element_type=\"section\" id=\"zerotrusttc_12\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cfffec6\" data-id=\"cfffec6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a8a7dff elementor-widget elementor-widget-heading\" data-id=\"a8a7dff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT DOES A ZERO TRUST MATURITY MODEL LOOK LIKE?  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-469cbe4 elementor-widget elementor-widget-heading\" data-id=\"469cbe4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Zero Trust Architecture<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9bd1c6 elementor-widget elementor-widget-image\" data-id=\"d9bd1c6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3403\" height=\"2500\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-3.png\" class=\"attachment-full size-full wp-image-15321\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-3.png 3403w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-3-300x220.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-3-1024x752.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-3-768x564.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-3-1536x1128.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-3-2048x1505.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-3-1568x1152.png 1568w\" sizes=\"(max-width: 3403px) 100vw, 3403px\" style=\"width:100%;height:73.46%;max-width:3403px\" title=\"MicrosoftTeams-image (3)\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b08580 elementor-widget elementor-widget-text-editor\" data-id=\"9b08580\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust is not a destination, but an ongoing process which should be taken in bite sized chunks. It is good to stay closely connected to industry sources and trusted partners to stay informed and make sure you are doing your best to leverage current tools to protect your organisation (particularly if you already own some of these tools).\u00a0<span data-ccp-props=\"{&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:20,&quot;335559731&quot;:0,&quot;335559739&quot;:274,&quot;335559740&quot;:259,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Every organisation\u2019s journey will be different, yet you can use the following guide as a general blueprint for success. Answer these questions to see where you are in the process.<span data-ccp-props=\"{&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:20,&quot;335559731&quot;:0,&quot;335559739&quot;:274,&quot;335559740&quot;:259,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8615578 elementor-widget elementor-widget-image\" data-id=\"8615578\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3836\" height=\"2134\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-2.png\" class=\"attachment-full size-full wp-image-15253\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-2.png 3836w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-2-300x167.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-2-1024x570.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-2-768x427.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-2-1536x854.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-2-2048x1139.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/MicrosoftTeams-image-2-1568x872.png 1568w\" sizes=\"(max-width: 3836px) 100vw, 3836px\" style=\"width:100%;height:55.63%;max-width:3836px\" title=\"MicrosoftTeams-image (2)\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-85dc777 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"85dc777\" data-element_type=\"section\" id=\"zerotrusttc_13\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aae18b2\" data-id=\"aae18b2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79a87ca elementor-widget elementor-widget-heading\" data-id=\"79a87ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW INSENTRA CAN HELP WITH YOUR ZERO TRUST SECURITY STRATEGY <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75d34d4 elementor-widget elementor-widget-text-editor\" data-id=\"75d34d4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Looking to implement a Zero Trust Security strategy? Look no further than Insentra&#8217;s <a class=\"fui-Link ___1qmgydl f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh ftqa4ok f2hkw1w fhgqx19 f1olyrje f1p93eir f1h8hb77 f1x7u7e9 f10aw75t fsle3fq\" title=\"https:\/\/www.insentragroup.com\/us\/zero-trust-security-assessment\/\" href=\"https:\/\/www.insentragroup.com\/nz\/zero-trust-security-assessment\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link Zero Trust Assessment\">Zero Trust Assessment<\/a>. Our team of expert architects and consultants have the knowledge and experience to ensure a successful rollout that won&#8217;t disrupt your day-to-day operations.<\/p><p>A poorly planned Zero Trust Security implementation can have catastrophic consequences for your business. That&#8217;s why choosing a trusted and strategic partner is critical. At Insentra, we offer highly customised solutions to meet the unique requirements of each customer. Our engagements range from specific tactical initiatives to long-term roadmap advisory consultations.<\/p><p>Whether you know exactly what you need and just want help planning, or you&#8217;re not sure where to start, we&#8217;re here to help. Trust us to guide you through every step of the process and ensure a successful outcome for your business. <a class=\"fui-Link ___1qmgydl f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh ftqa4ok f2hkw1w fhgqx19 f1olyrje f1p93eir f1h8hb77 f1x7u7e9 f10aw75t fsle3fq\" title=\"https:\/\/www.insentragroup.com\/us\/contact\/\" href=\"https:\/\/www.insentragroup.com\/nz\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link Contact us\">Contact us<\/a> today for more information on how Insentra can help with your Zero Trust Security strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b0d89bf elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b0d89bf\" data-element_type=\"section\" id=\"zerotrustdl-form\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fb9a44e\" data-id=\"fb9a44e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a72b39d elementor-widget elementor-widget-heading\" data-id=\"a72b39d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOWNLOAD THE ULTIMATE GUIDE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2b63dff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b63dff\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5aca5b9\" data-id=\"5aca5b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a87620 elementor-widget elementor-widget-image\" data-id=\"8a87620\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/02\/ultimate_zero_trust_img_10.png\" class=\"attachment-large size-large wp-image-20097\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/02\/ultimate_zero_trust_img_10.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/02\/ultimate_zero_trust_img_10-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/02\/ultimate_zero_trust_img_10-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"ultimate_zero_trust_img_10\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c5d5464\" data-id=\"c5d5464\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c3ea30 elementor-widget elementor-widget-html\" data-id=\"0c3ea30\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<style>\r\n    .form-placeholder img { \r\n        max-width:40px !important;\r\n    }\r\n    form#hsForm_cf765491-741f-4797-ac00-544a0914c6dc {\r\n        display: none;\r\n    }\r\n    form[data-zi-mapped-form] .hideFields {\r\n        display: none !important;\r\n    }\r\n    form[data-zi-mapped-form] .hs-form-field {\r\n        width: 100% !important;\r\n    }\r\n    form[data-zi-mapped-form].incomplete .hideFields {\r\n        display: block !important;\r\n    }\r\n    form[data-zi-mapped-form].incomplete .hs-form-field {\r\n        width: 50% !important;\r\n    }\r\n    form[data-zi-mapped-form].incomplete .legal-consent-container .hs-form-field {\r\n        width: 100% !important;\r\n    }\r\n<\/style>\r\n<div class=\"form-placeholder text-center p-5 border rounded\"><div><img decoding=\"async\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/02\/loader.gif\" \/><\/div>Loading Form...<\/div>\r\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\r\n<script>\r\njQuery(function($){\r\n    var curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n    hbspt.forms.create({\r\n        region: \"na1\",\r\n        portalId: \"20799536\",\r\n        formId: \"cf765491-741f-4797-ac00-544a0914c6dc\", \/\/Change to form ID\r\n        redirectUrl: curr_url + '\/?thank-you=yes',\r\n        css: \".hs_error_rollup {display:none !important;}\", onFormReady: function($form){\r\n            $form.find('input[name=\"referral_page\"]').val(curr_url).change();\r\n            \r\n\r\nwindow._zi = {\r\nformId: 'c522941d-9546-46c0-a0a0-62ee4fb32f4b',\r\n\/\/development: true,\r\nformLoadTimeout: 200,\r\ncallbacks: {\r\nonReady: function(data) {\r\n    $('form[data-zi-mapped-form] input:not([type=\"email\"]):not([type=\"submit\"]):not([type=\"checkbox\"]):not([type=\"hidden\"]), form[data-zi-mapped-form] select').closest(\".hs-form-field\").addClass('hideFields');\r\n    $(\"form[data-zi-mapped-form]\").fadeIn();\r\n    $(\".form-placeholder\").addClass('formloaded').remove();\r\n},\r\nonMatch: function(data) {\r\nconsole.log(data);\r\nvar incomplete = false;\r\nconst entries = Object.entries(data);\r\nfor(var i=0; i<entries.length; i++){\r\n    if(entries[i][0] != 'email' && entries[i][1] == undefined){\r\n        incomplete = true;\r\n        console.log(entries[i][0]);\r\n    }\r\n}\r\n\r\nif(incomplete){\r\n    $(\"form[data-zi-mapped-form]\").addClass('incomplete');\r\n} else {\r\n    $(\"form[data-zi-mapped-form]\").removeClass('incomplete');\r\n}\r\n\r\n}\r\n}\r\n}\r\nvar zi = document.createElement('script');\r\nzi.type = 'text\/javascript';\r\nzi.async = true;\r\nzi.src = 'https:\/\/ws-assets.zoominfo.com\/formcomplete.js';\r\nvar s = document.getElementsByTagName('script')[0];\r\ns.parentNode.insertBefore(zi, s);\r\n            \r\n        }\r\n    });\r\n    \r\n    setTimeout(function(){\r\n        if($(\".form-placeholder\").hasClass('formloaded')){ } else {\r\n            $('form#hsForm_cf765491-741f-4797-ac00-544a0914c6dc input:not([type=\"email\"]):not([type=\"submit\"]):not([type=\"checkbox\"]):not([type=\"hidden\"]), form#hsForm_cf765491-741f-4797-ac00-544a0914c6dc select').closest(\".hs-form-field\").addClass('hideFields');\r\n            $(\"form#hsForm_cf765491-741f-4797-ac00-544a0914c6dc\").fadeIn();\r\n            $(\".form-placeholder\").addClass('formloaded').remove();\r\n        }\r\n    }, 10000);\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f627cb elementor-section-full_width thank-you-section elementor-section-height-default elementor-section-height-default\" data-id=\"4f627cb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-517b325\" data-id=\"517b325\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b6a1c95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b6a1c95\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-15f741e\" data-id=\"15f741e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9295766 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9295766\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Thank you for downloading our The Ultimate Guide to Zero Trust.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8daaf81 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8daaf81\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-930c0f1\" data-id=\"930c0f1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f1a7a5d elementor-widget__width-initial thankyou-image elementor-widget elementor-widget-image\" data-id=\"f1a7a5d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11.png\" class=\"attachment-full size-full wp-image-21263\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/elementor\/thumbs\/MicrosoftTeams-image-11-qbqv5jsavmp9rkx66i62yuy5xigmcem8kgpud0le48.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"MicrosoftTeams-image-11.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abd0179 elementor-widget elementor-widget-text-editor\" data-id=\"abd0179\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8c05b4 booking-box\" data-id=\"f8c05b4\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7606fe4 elementor-widget elementor-widget-html\" data-id=\"7606fe4\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!-- Start of Meetings Embed Script -->\n\n    <div class=\"meetings-iframe-container\" data-src=\"https:\/\/meetings.hubspot.com\/ron-laguing?embed=true\"><\/div>\n\n    <script type=\"text\/javascript\" src=\"https:\/\/static.hsappstatic.net\/MeetingsEmbed\/ex\/MeetingsEmbedCode.js\"><\/script>\n\n  <!-- End of Meetings Embed Script -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fd717ee elementor-section-content-middle d-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd717ee\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-10d2e73\" data-id=\"10d2e73\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4d94c1 elementor-widget__width-initial thankyou-image elementor-widget elementor-widget-image\" data-id=\"e4d94c1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11.png\" class=\"attachment-full size-full wp-image-21263\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/elementor\/thumbs\/MicrosoftTeams-image-11-qbqv5jsavmp9rkx66i62yuy5xigmcem8kgpud0le48.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"MicrosoftTeams-image-11.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-117d3fc elementor-widget elementor-widget-text-editor\" data-id=\"117d3fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a40ea0a booking-box\" data-id=\"a40ea0a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d79c28c elementor-widget elementor-widget-html\" data-id=\"d79c28c\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<style>\r\n.booking-box .elementor-column.elementor-col-20 {\r\n    width: 10%;\r\n    padding-top: 11px;\r\n    background-color: #fff;\r\n    text-align:center !important;\r\n    border: solid 1px #ededed;\r\n    border-radius: 4px;\r\n    font-size: 12px;\r\n}\r\n.booking-box .elementor-column.elementor-col-80 {\r\n    width: 90%;\r\n}\r\n.booking-box .meeting-avatar {\r\n\ttransform: scale(1);\r\n\tanimation: pulse 1s infinite;\r\n}\r\n@keyframes pulse {\r\n\t0% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0.7);\r\n\t}\r\n\r\n\t70% {\r\n\t\ttransform: scale(1);\r\n\t\tbox-shadow: 0 0 0 10px rgba(0, 0, 0, 0);\r\n\t}\r\n\r\n\t100% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0);\r\n\t}\r\n}    \r\n<\/style>\r\n<div class=\"text-center mb-3\">\r\n    <img decoding=\"async\" src=\"https:\/\/avatars.hubspot.net\/2450d4f47b3e5475f6e6fb18cd74deb3-100\" class=\"rounded-circle shadow meeting-avatar\" style=\"max-height:72px;\" \/>\r\n<\/div>\r\n<script>\r\njQuery(function($){\r\n    var hsThankEmail = readCookie('hsThankEmail');\r\n    if(hsThankEmail != ''){\r\n        console.log(hsThankEmail);\r\n        $('#hsbookingform [type=\"email\"]').val(hsThankEmail);\r\n    }\r\n    $(document).on('submit', '#hsbookingform', function(e){\r\n        e.preventDefault();\r\n        var theForm = $(this);\r\n        theForm.find('[type=\"submit\"]').html('<i class=\"fa fa-spinner fa-spin\"><\/i> Processing...');\r\n        var data = {\r\n            action: 'submissionGuidCheck',\r\n            meeting_date: $(\"#form-field-date\").val(),\r\n            meeting_time: $(\"#form-field-time\").val(),\r\n            meeting_email: $(\"#form-field-email_address\").val()\r\n        }\r\n        $.post(ElementorProFrontendConfig.ajaxurl, data, function(response){\r\n            console.log(JSON.parse(response)); \r\n        });\r\n        return false;   \r\n    });\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cb4169 elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"3cb4169\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;rotating_text&quot;:&quot;Consult\\nChat\\nDiscuss&quot;,&quot;rotate_iteration_delay&quot;:1000,&quot;animation_type&quot;:&quot;typing&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-typing elementor-headline-letters\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\"><i class=\"far fa-smile\"><\/i><\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">\n\t\t\t\tConsult\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tChat\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tDiscuss\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">with our experts!<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6db0b30 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"6db0b30\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"hsbookingform\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"17550\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"6db0b30\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"The Ultimate Guide to Zero Trust - New Zealand\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"17550\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_a6276d7 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-calendar\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-date elementor-field-group elementor-column elementor-field-group-date elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\n\t\t<input type=\"date\" name=\"form_fields[date]\" id=\"form-field-date\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-date-field\" placeholder=\"Meeting Date\" required=\"required\" pattern=\"[0-9]{4}-[0-9]{2}-[0-9]{2}\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_c969df1 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-clock\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-time elementor-field-group elementor-column elementor-field-group-time elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t<input type=\"time\" name=\"form_fields[time]\" id=\"form-field-time\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-time-field\" placeholder=\"Meeting Time\" required=\"required\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_dd3a67c elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-envelope\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email_address elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email_address]\" id=\"form-field-email_address\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-check\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M400 64h-48V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v52H160V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v52H48C21.49 64 0 85.49 0 112v352c0 26.51 21.49 48 48 48h352c26.51 0 48-21.49 48-48V112c0-26.51-21.49-48-48-48zm-6 400H54a6 6 0 0 1-6-6V160h352v298a6 6 0 0 1-6 6zm-52.849-200.65L198.842 404.519c-4.705 4.667-12.303 4.637-16.971-.068l-75.091-75.699c-4.667-4.705-4.637-12.303.068-16.971l22.719-22.536c4.705-4.667 12.303-4.637 16.97.069l44.104 44.461 111.072-110.181c4.705-4.667 12.303-4.637 16.971.068l22.536 22.718c4.667 4.705 4.636 12.303-.069 16.97z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book Now<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4ad7863 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ad7863\" data-element_type=\"section\" id=\"relevantResources\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-87c1434\" data-id=\"87c1434\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-edcd524 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"edcd524\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#relevantResources\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-down\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 137-111 248-248 248S8 393 8 256 119 8 256 8s248 111 248 248zM273 369.9l135.5-135.5c9.4-9.4 9.4-24.6 0-33.9l-17-17c-9.4-9.4-24.6-9.4-33.9 0L256 285.1 154.4 183.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L239 369.9c9.4 9.4 24.6 9.4 34 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c016955 elementor-widget elementor-widget-text-editor\" data-id=\"c016955\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXP182018858 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-usefontface=\"false\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP182018858 BCX0\">In the meantime, we thought you might find these resources useful\u00a0<span class=\"EOP SCXP182018858 BCX0\">\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-eb7eb18 relevant-resources elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eb7eb18\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f93163a\" data-id=\"f93163a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e00b09e elementor-widget elementor-widget-image\" data-id=\"e00b09e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/insider-threat-ultimate-guide-whitepaper\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"414\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/AvePoint_insider_threat_fanout_trimmed.png\" class=\"attachment-large size-large wp-image-21738\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/AvePoint_insider_threat_fanout_trimmed.png 525w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/AvePoint_insider_threat_fanout_trimmed-300x237.png 300w\" sizes=\"(max-width: 525px) 100vw, 525px\" style=\"width:100%;height:78.86%;max-width:525px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-474cbeb elementor-widget elementor-widget-heading\" data-id=\"474cbeb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/insider-threat-ultimate-guide-whitepaper\/\">Insider Threat Ultimate Guide\n<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3799c32 elementor-widget elementor-widget-text-editor\" data-id=\"3799c32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Insider threats are a growing concern for businesses of all sizes. It\u2019s essential to understand the risks and develop a comprehensive mitigation strategy. This guide is designed to help you identify and prevent potential insider threats to protect your business from the devastating consequences of data breaches and other malicious activities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9acd63c elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"9acd63c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/insider-threat-ultimate-guide-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8a26ce3\" data-id=\"8a26ce3\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ba3101 elementor-widget elementor-widget-image\" data-id=\"1ba3101\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/the-ultimate-guide-to-microsoft-intune-whitepaper\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"544\" height=\"434\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/10\/intune-fanout.png\" class=\"attachment-large size-large wp-image-16383\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/10\/intune-fanout.png 544w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/10\/intune-fanout-300x239.png 300w\" sizes=\"(max-width: 544px) 100vw, 544px\" style=\"width:100%;height:79.78%;max-width:544px\" title=\"intune-fanout\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e7e53d elementor-widget elementor-widget-heading\" data-id=\"7e7e53d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/the-ultimate-guide-to-microsoft-intune-whitepaper\/\">The Ultimate Guide to Microsoft Intune Whitepaper<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d6e05d elementor-widget elementor-widget-text-editor\" data-id=\"8d6e05d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Are you tired of juggling multiple device management and application deployment solutions? Look no further than Microsoft Intune \u2013 the all-in-one cloud-based service that streamlines your IT tasks.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d1cf7b elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"2d1cf7b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/the-ultimate-guide-to-microsoft-intune-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-615f078\" data-id=\"615f078\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a250ac elementor-widget elementor-widget-image\" data-id=\"2a250ac\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/tenant-to-tenant-master-movers-planning-guide\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"531\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-7-1024x725.png\" class=\"attachment-large size-large wp-image-13079\" alt=\"New Zealand | The Ultimate Guide to Zero Trust\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-7-1024x725.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-7-300x213.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-7-768x544.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-7-1536x1088.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-7-2048x1451.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-7-1568x1111.png 1568w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:70.83%;max-width:2400px\" title=\"MicrosoftTeams-image (7)\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-314a4ef elementor-widget elementor-widget-heading\" data-id=\"314a4ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/tenant-to-tenant-master-movers-planning-guide\/\">Tenant to Tenant Master Movers Planning Guide<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dcc5a4 elementor-widget elementor-widget-text-editor\" data-id=\"3dcc5a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Tenant to Tenant Migrations are becoming increasingly common. Some are guided by the need to clean up or integrate IT infrastructure to enable more efficient business processes and reduce costs, while others are deemed necessary due to business changes like mergers, acquisitions and divestitures.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98d7d12 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"98d7d12\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/tenant-to-tenant-master-movers-planning-guide\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>See how Zero Trust reduces your risk, increases productivity and improves business agility. Learn what you need to know about Zero Trust architecture. <\/p>\n","protected":false},"author":128,"featured_media":17562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-17550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/17550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/users\/128"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/comments?post=17550"}],"version-history":[{"count":68,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/17550\/revisions"}],"predecessor-version":[{"id":27498,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/17550\/revisions\/27498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media\/17562"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media?parent=17550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/categories?post=17550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/tags?post=17550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}