{"id":24109,"date":"2025-05-26T01:34:47","date_gmt":"2025-05-26T01:34:47","guid":{"rendered":"https:\/\/www.insentragroup.com\/us\/insights\/uncategorized\/maximising-network-security-with-microsegmentation-a-comprehensive-guide-whitepaper\/"},"modified":"2025-05-27T06:14:51","modified_gmt":"2025-05-27T06:14:51","slug":"maximising-network-security-with-microsegmentation-a-comprehensive-guide-whitepaper","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/maximising-network-security-with-microsegmentation-a-comprehensive-guide-whitepaper\/","title":{"rendered":"Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24109\" class=\"elementor elementor-24109\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe6270d elementor-section-content-middle elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"fe6270d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-09e7940\" data-id=\"09e7940\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bbdd489 elementor-widget elementor-widget-image\" data-id=\"bbdd489\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"450\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Baby-Banner-resource-page-1.png\" class=\"attachment-full size-full wp-image-24124\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Baby-Banner-resource-page-1.png 1920w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Baby-Banner-resource-page-1-300x70.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Baby-Banner-resource-page-1-1024x240.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Baby-Banner-resource-page-1-768x180.png 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Baby-Banner-resource-page-1-1536x360.png 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Baby-Banner-resource-page-1-1568x368.png 1568w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" style=\"width:100%;height:23.44%;max-width:1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ce42c1c elementor-section-content-middle elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce42c1c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f50af1\" data-id=\"1f50af1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-208f17e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"208f17e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7f19988\" data-id=\"7f19988\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-584a100 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"584a100\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-17d15a6\" data-id=\"17d15a6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11839eb elementor-widget elementor-widget-image\" data-id=\"11839eb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Zero-Networks-Microsegmentation-Fanout.png\" class=\"attachment-full size-full wp-image-24110\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Zero-Networks-Microsegmentation-Fanout.png 600w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Zero-Networks-Microsegmentation-Fanout-300x300.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Zero-Networks-Microsegmentation-Fanout-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ef93ba7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ef93ba7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f8485f2\" data-id=\"f8485f2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64297ae elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"64297ae\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-06ed544 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"06ed544\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c03719e\" data-id=\"c03719e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9a96feb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9a96feb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b23721d\" data-id=\"b23721d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d8fb91e body-texts elementor-widget elementor-widget-text-editor\" data-id=\"d8fb91e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Despite all the money, time and tools invested in cybersecurity, attackers still find ways to infiltrate your network\u2014and once they\u2019re in, they move fast. Traditional defenses are blind to this stealthy East-West movement, letting threats silently snake through your internal systems.<\/p><p>The real problem? Your network is too open.<\/p><p>Employees have more access than they need. Legacy perimeter defenses miss what\u2019s happening inside. Once hackers get a foothold, they exploit unknown flaws, elevate privileges, and roam free locking files, stealing data and dismantling trust.<\/p><p>In our eBook we break down how you can transform your network into a fortress without disrupting your operations or overwhelming your IT team.<\/p><p><b>Key Insights from the eBook:<\/b><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:975,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>Understand the root problem: <\/b>Why traditional perimeter defences fail in modern hybrid environments. \u00a0<br \/><b>What Microsegmentation Really Is (and Isn\u2019t)<\/b> Learn what it is, how it works, and why it\u2019s critical to Zero Trust strategies.<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:975,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>Explore real-world use cases: <\/b>From application ring-fencing to securing remote vendors and cloud migrations.<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:975,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>Get actionable implementation strategies: <\/b>Including how to scale microsegmentation, automate rule creation and enforce least privilege access.<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:975,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>Discover Zero Networks\u2019 simplified approach<\/b>: Agentless deployment, AI-driven automation, and Just-in-Time MFA\u2014no heavy lifting required.<span data-ccp-props=\"{&quot;335557856&quot;:16777215,&quot;335559737&quot;:270,&quot;335559739&quot;:0}\">\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d72de2 body-texts elementor-widget elementor-widget-text-editor\" data-id=\"7d72de2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Who Should Read This?<\/b><\/p><ul><li><b>CISOs &amp; Security Architects<\/b> who want to stop lateral movement and reduce breach costs.<\/li><li><b>IT Leaders &amp; Infrastructure Teams<\/b> facing cloud migration or hybrid environments.<\/li><li><b>Compliance &amp; Risk Officers<\/b> looking for better audit controls and policy enforcement.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559737&quot;:270,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93cc826 elementor-share-buttons--view-icon elementor-share-buttons--skin-flat elementor-share-buttons--align-left elementor-share-buttons--color-custom elementor-share-buttons--shape-square elementor-grid-0 elementor-widget elementor-widget-share-buttons\" data-id=\"93cc826\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4d5cf14\" data-id=\"4d5cf14\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73b49b5 body-texts elementor-widget elementor-widget-text-editor\" data-id=\"73b49b5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><span lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span data-ccp-parastyle=\"Normal (Web)\">Download the <span class=\"TextRun SCXW7351512 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW7351512 BCX0\">Maximising<span class=\"NormalTextRun SCXW7351512 BCX0\"> Network Security with Microsegmentation<span class=\"LineBreakBlob BlobObject DragDrop SCXW7351512 BCX0\"><span class=\"SCXW7351512 BCX0\"> eBook<br class=\"SCXW7351512 BCX0\" \/><\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3040a61 elementor-widget elementor-widget-shortcode\" data-id=\"3040a61\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js?pre=1\"><\/script>\r\n<script>\r\n  hbspt.forms.create({\r\n    region: \"na1\",\r\n    portalId: \"20799536\",\r\n    formId: \"90512496-3e76-452d-bf1c-e83dfe523970\",\r\n    redirectUrl: window.location.href + '?thank-you=yes'\r\n  });\r\n<\/script><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7b53707 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b53707\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-03f49c9\" data-id=\"03f49c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f84ec6 elementor-widget elementor-widget-heading\" data-id=\"4f84ec6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Related Resources<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b37c6df relevant-resources elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b37c6df\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-277c45b\" data-id=\"277c45b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e3fbb9 elementor-widget elementor-widget-image\" data-id=\"5e3fbb9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/unleashing-the-power-of-microsoft-copilot-whitepaper\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2024\/03\/copilot-thankyou-1.png\" class=\"attachment-full size-full wp-image-20395\" alt=\"United States | Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2024\/03\/copilot-thankyou-1.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2024\/03\/copilot-thankyou-1-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" style=\"width:100%;height:100%;max-width:300px\" title=\"copilot-thankyou.png\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f83ff30 elementor-widget elementor-widget-heading\" data-id=\"f83ff30\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/unleashing-the-power-of-microsoft-copilot-whitepaper\/\">Unleashing the Power of Microsoft Copilot<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-736227a elementor-widget elementor-widget-text-editor\" data-id=\"736227a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Are you ready to unlock the power of Microsoft\u2019s revolutionary new AI assistant, Copilot? This comprehensive guide provides everything you need to know to prepare your organization and empower your teams with Copilot\u2019s unparalleled productivity capabilities.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:269,&quot;335559737&quot;:270,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3b4def elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"f3b4def\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/unleashing-the-power-of-microsoft-copilot-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-89ad521\" data-id=\"89ad521\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75f5cc1 elementor-widget elementor-widget-image\" data-id=\"75f5cc1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/sharepoint-the-ultimate-guide-whitepaper\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2024\/03\/sharepoint-guide-fan-out-1.png\" class=\"attachment-full size-full wp-image-20394\" alt=\"United States | Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2024\/03\/sharepoint-guide-fan-out-1.png 600w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2024\/03\/sharepoint-guide-fan-out-1-300x300.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2024\/03\/sharepoint-guide-fan-out-1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"sharepoint-guide-fan-out-1.png\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1f3007 elementor-widget elementor-widget-heading\" data-id=\"c1f3007\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/sharepoint-the-ultimate-guide-whitepaper\/\">SharePoint: The Ultimate Guide<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5e87e2 elementor-widget elementor-widget-text-editor\" data-id=\"a5e87e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Experience the transformative capabilities of Microsoft SharePoint today. This powerful tool offers a myriad of features capable of elevating your organization\u2019s collaboration, communication and productivity. Our eBook \u201cSharePoint: The Ultimate Guide\u201d shares all you need to know to utilise this platform to its fullest potential.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b43d49 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"2b43d49\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/sharepoint-the-ultimate-guide-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-34781f7\" data-id=\"34781f7\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-924c331 elementor-widget elementor-widget-image\" data-id=\"924c331\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/business-case-for-intune-managed-services\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/elementor\/thumbs\/Business-Case-Fanout-qp79p6zbhmkf1w7zghe429wkvuwtgrmz9yn7elqjnu.png\" title=\"Business-Case-Fanout.png\" alt=\"Business-Case-Fanout.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f88928b elementor-widget elementor-widget-heading\" data-id=\"f88928b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/business-case-for-intune-managed-services\/\">Unlocking Efficiency and Security: The Business Case for Intune Managed Services<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be41d5a elementor-widget elementor-widget-text-editor\" data-id=\"be41d5a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82fa2ce elementor-widget elementor-widget-shortcode\" data-id=\"82fa2ce\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-shortcode\">Is your IT team drowning in a sea of devices \u2014 laptops, tablets, smartphones \u2014 each with its own security and compliance needs? In today\u2019s mobile first workplace, managing this diverse landscape can be a nightmare. Unsecured devices and data breaches cost businesses an average of $4 million according to IBM.*\u00a0<span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d45dfb elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"9d45dfb\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/business-case-for-intune-managed-services\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d845bc8 elementor-section-full_width thank-you-section elementor-section-height-default elementor-section-height-default\" data-id=\"d845bc8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5d2c57\" data-id=\"e5d2c57\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dfb029c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dfb029c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-60a97cb\" data-id=\"60a97cb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49841fe elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"49841fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Thank you for downloading our eBook \u201cMaximising Network Security with Microsegmentation \nA Comprehensive Guide\u201d \u202f<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b1571b3 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b1571b3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f147441\" data-id=\"f147441\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f62c21 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4f62c21\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Zero-Networks-Microsegmentation-Fanout-1.png\" class=\"attachment-large size-large wp-image-24111\" alt=\"United States | Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Zero-Networks-Microsegmentation-Fanout-1.png 600w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Zero-Networks-Microsegmentation-Fanout-1-300x300.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/05\/Zero-Networks-Microsegmentation-Fanout-1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"Zero-Networks-Microsegmentation-Fanout-1.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47bdc3f elementor-widget elementor-widget-spacer\" data-id=\"47bdc3f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7261fef elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7261fef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-74a6048 elementor-section-content-middle d-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74a6048\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e9abe3d\" data-id=\"e9abe3d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-923d141 elementor-widget__width-initial thankyou-image elementor-widget elementor-widget-image\" data-id=\"923d141\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/10\/MicrosoftTeams-image-11-1.png\" class=\"attachment-full size-full wp-image-19408\" alt=\"United States | Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/10\/MicrosoftTeams-image-11-1.png 600w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/10\/MicrosoftTeams-image-11-1-300x300.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/10\/MicrosoftTeams-image-11-1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"MicrosoftTeams-image-11-1.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5301045 elementor-widget elementor-widget-text-editor\" data-id=\"5301045\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-906a92a booking-box\" data-id=\"906a92a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18aad1b elementor-widget elementor-widget-html\" data-id=\"18aad1b\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\r\n.booking-box .elementor-column.elementor-col-20 {\r\n    width: 10%;\r\n    padding-top: 11px;\r\n    background-color: #fff;\r\n    text-align:center !important;\r\n    border: solid 1px #ededed;\r\n    border-radius: 4px;\r\n    font-size: 12px;\r\n}\r\n.booking-box .elementor-column.elementor-col-80 {\r\n    width: 90%;\r\n}\r\n.booking-box .meeting-avatar {\r\n\ttransform: scale(1);\r\n\tanimation: pulse 1s infinite;\r\n}\r\n@keyframes pulse {\r\n\t0% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0.7);\r\n\t}\r\n\r\n\t70% {\r\n\t\ttransform: scale(1);\r\n\t\tbox-shadow: 0 0 0 10px rgba(0, 0, 0, 0);\r\n\t}\r\n\r\n\t100% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0);\r\n\t}\r\n}    \r\n<\/style>\r\n<div class=\"text-center mb-3\">\r\n    <img decoding=\"async\" src=\"https:\/\/avatars.hubspot.net\/2450d4f47b3e5475f6e6fb18cd74deb3-100\" class=\"rounded-circle shadow meeting-avatar\" style=\"max-height:72px;\" \/>\r\n<\/div>\r\n<script>\r\njQuery(function($){\r\n    var hsThankEmail = readCookie('hsThankEmail');\r\n    if(hsThankEmail != ''){\r\n        console.log(hsThankEmail);\r\n        $('#hsbookingform [type=\"email\"]').val(hsThankEmail);\r\n    }\r\n    $(document).on('submit', '#hsbookingform', function(e){\r\n        e.preventDefault();\r\n        var theForm = $(this);\r\n        theForm.find('[type=\"submit\"]').html('<i class=\"fa fa-spinner fa-spin\"><\/i> Processing...');\r\n        var data = {\r\n            action: 'submissionGuidCheck',\r\n            meeting_date: $(\"#form-field-date\").val(),\r\n            meeting_time: $(\"#form-field-time\").val(),\r\n            meeting_email: $(\"#form-field-email_address\").val()\r\n        }\r\n        $.post(ElementorProFrontendConfig.ajaxurl, data, function(response){\r\n            console.log(JSON.parse(response)); \r\n        });\r\n        return false;   \r\n    });\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1396c53 elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"1396c53\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;rotating_text&quot;:&quot;Consult\\nChat\\nDiscuss&quot;,&quot;rotate_iteration_delay&quot;:1000,&quot;animation_type&quot;:&quot;typing&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-typing elementor-headline-letters\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\"><i class=\"far fa-smile\"><\/i><\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">\n\t\t\t\tConsult\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tChat\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tDiscuss\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">with our experts!<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5cc2bd elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"e5cc2bd\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"hsbookingform\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"24109\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"e5cc2bd\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Maximising Network Security with Microsegmentation\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"24109\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_a6276d7 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-calendar\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-date elementor-field-group elementor-column elementor-field-group-date elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\n\t\t<input type=\"date\" name=\"form_fields[date]\" id=\"form-field-date\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-date-field\" placeholder=\"Meeting Date\" required=\"required\" pattern=\"[0-9]{4}-[0-9]{2}-[0-9]{2}\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_c969df1 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-clock\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-time elementor-field-group elementor-column elementor-field-group-time elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t<input type=\"time\" name=\"form_fields[time]\" id=\"form-field-time\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-time-field\" placeholder=\"Meeting Time\" required=\"required\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_dd3a67c elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-envelope\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email_address elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email_address]\" id=\"form-field-email_address\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-check\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book Now<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1b7ad7d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b7ad7d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-187b77c\" data-id=\"187b77c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ccb5dd9 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ccb5dd9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#relevantResources\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-down\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9547328 elementor-widget elementor-widget-text-editor\" data-id=\"9547328\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXP182018858 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-usefontface=\"false\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP182018858 BCX0\">In the meantime, we thought you might find these resources useful\u00a0<span class=\"EOP SCXP182018858 BCX0\">\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dd685b0 relevant-resources elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd685b0\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-50fa063\" data-id=\"50fa063\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00c3311 elementor-widget elementor-widget-image\" data-id=\"00c3311\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/ai-playbook-for-leaders-whitepaper\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/03\/AI-Playbook-for-Leaders-1.png\" class=\"attachment-full size-full wp-image-23663\" alt=\"United States | Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/03\/AI-Playbook-for-Leaders-1.png 600w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/03\/AI-Playbook-for-Leaders-1-300x300.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2025\/03\/AI-Playbook-for-Leaders-1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"AI-Playbook-for-Leaders-1.png\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e85559 elementor-widget elementor-widget-heading\" data-id=\"9e85559\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/ai-playbook-for-leaders-whitepaper\/\">The AI Playbook for Leaders<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-410cc1b elementor-widget elementor-widget-text-editor\" data-id=\"410cc1b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI is no longer a futuristic concept\u2014it\u2019s already shaping industries and driving billion-dollar decisions. Yet, while 91% of top companies invest in AI, only 37% report real value from their efforts\u2014a gap stemming from the difference between AI adoption and AI enablement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e227e8 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"9e227e8\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/ai-playbook-for-leaders-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7135d35\" data-id=\"7135d35\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b417f4b elementor-widget elementor-widget-image\" data-id=\"b417f4b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/the-ultimate-guide-to-zero-trust-whitepaper\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/11\/ultimate_zero_trust_img_10.png\" class=\"attachment-full size-full wp-image-19435\" alt=\"United States | Maximising Network Security with Microsegmentation\u00a0A Comprehensive Guide\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/11\/ultimate_zero_trust_img_10.png 600w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/11\/ultimate_zero_trust_img_10-300x300.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/11\/ultimate_zero_trust_img_10-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"ultimate_zero_trust_img_10.png\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7081c36 elementor-widget elementor-widget-heading\" data-id=\"7081c36\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/the-ultimate-guide-to-zero-trust-whitepaper\/\">The Ultimate Guide to Zero Trust<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f73e7b elementor-widget elementor-widget-text-editor\" data-id=\"1f73e7b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust has now moved from being a buzzword to a strategic imperative for many organizations. With data breaches and cyber-attacks occurring every 7 mins in Australia<sup>1<\/sup>\u00a0raising customer and government authorities expectations for organizations to adhere to stronger cybersecurity programs, many organizations are shifting towards Zero Trust as the best practice.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ceea534 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"ceea534\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/the-ultimate-guide-to-zero-trust-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9bf4669\" data-id=\"9bf4669\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ffbb69 elementor-widget elementor-widget-image\" data-id=\"1ffbb69\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/insider-threat-ultimate-guide-whitepaper\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/elementor\/thumbs\/AvePoint_insider_threat_fanout-r6egm2d9d5rlda38fp5wxdue41l2kz2yme5wncz2sw.png\" title=\"AvePoint_insider_threat_fanout.png\" alt=\"AvePoint_insider_threat_fanout.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-736ab7e elementor-widget elementor-widget-heading\" data-id=\"736ab7e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/insider-threat-ultimate-guide-whitepaper\/\">Insider Threat Ultimate Guide<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f46260 elementor-widget elementor-widget-text-editor\" data-id=\"6f46260\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82fa2ce elementor-widget elementor-widget-shortcode\" data-id=\"82fa2ce\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-shortcode\"><div class=\"elementor-element elementor-element-82fa2ce elementor-widget elementor-widget-shortcode\" data-id=\"82fa2ce\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-shortcode\">nsider threats are a growing concern for businesses of all sizes. It\u2019s essential to understand the risks and develop a comprehensive mitigation strategy. This guide is designed to help you identify and prevent potential insider threats to protect your business from the devastating consequences of data breaches and other malicious activities.<\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72e8d6d elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"72e8d6d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/insider-threat-ultimate-guide-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Discover how microsegmentation stops lateral movement, strengthens Zero Trust, and simplifies network security. Download the eBook now!<\/p>\n","protected":false},"author":1,"featured_media":24110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[270],"tags":[],"class_list":["post-24109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ebooks-and-guides","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/24109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/comments?post=24109"}],"version-history":[{"count":6,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/24109\/revisions"}],"predecessor-version":[{"id":24127,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/24109\/revisions\/24127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/media\/24110"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/media?parent=24109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/categories?post=24109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/tags?post=24109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}