{"id":4625,"date":"2021-08-24T11:56:24","date_gmt":"2021-08-24T16:56:24","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4625"},"modified":"2021-08-24T11:56:24","modified_gmt":"2021-08-24T16:56:24","slug":"why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/","title":{"rendered":"Why Zero Trust Has Become the Go-To Framework in Today&#8217;s World of Hybrid Work"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4626\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security-300x205.jpg\" alt=\"An image of the world with icons of gears, a laptop, and a padlock connected by line segments, representing network security.\" width=\"300\" height=\"205\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security-300x205.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security-1024x701.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security-768x526.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security-1536x1052.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security-2048x1403.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security-200x137.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>When many offices abruptly shut down and sent workers home\u00a0at the beginning of the pandemic, it became much more difficult for cybersecurity professionals to safeguard corporate networks. Taking advantage of weak points in hastily launched remote work infrastructure, cybercriminals ramped up their attacks.\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/blog.google\/technology\/safety-security\/threat-analysis-group\/findings-covid-19-and-online-security-threats\/\" target=\"_blank\" rel=\"nofollow noopener\">Google&#8217;s Threat Analysis Group<\/a>\u00a0reported 18 million COVID-19-related phishing and malware Gmail messages daily in April 2020, and the average ransom for ransomware attacks rose to $111,605 in the first quarter of 2020, a 33 percent increase compared to the previous quarter, according to\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.coveware.com\/blog\/q1-2020-ransomware-marketplace-report\" target=\"_blank\" rel=\"nofollow noopener\">Coveware<\/a>.<\/p>\n<p>Initially, many organizations deployed virtual private networks (VPNs) to maintain data security while everyone worked from home. However, the\u00a0U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA)\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-073a\" target=\"_blank\" rel=\"nofollow noopener\">warned in an alert<\/a>\u00a0that enterprise VPN utilization could lead to data breaches without patching, updates, and\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/two-factor-authentication.html\" target=\"_blank\" rel=\"nofollow noopener\">multi-factor authentication (MFA)<\/a>. Supplier errors also pose a threat, as evidenced by security incidents involving free VPN platforms that have potentially exposed the personal information of millions of end users, according to <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/privacy\/2021\/03\/21-million-free-vpn-users-data-exposed\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Malwarebytes<\/a>.<\/p>\n<p>Ultimately, one type of technology emerged as the best possible solution to the pressing problem of ensuring\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-a-secure-remote-work-strategy-to-survive\/\" target=\"_blank\" rel=\"nofollow noopener\">secure access for remote workers<\/a>: zero-trust network architecture.<\/p>\n<h2>What Is Zero-Trust Architecture and How Does It Work?<\/h2>\n<p>Essentially, zero-trust solutions take the idea of regarding any entities outside your network with skepticism and extend that to everything inside the network as well, according to the CSO article &#8220;<a class=\"external-link external external_icon\" href=\"https:\/\/www.csoonline.com\/article\/3247848\/what-is-zero-trust-a-model-for-more-effective-security.html\" target=\"_blank\" rel=\"nofollow noopener\">What is Zero Trust? A model for more effective security<\/a>.&#8221; Anyone seeking access to any resource must have their identity and permissions verified first.<\/p>\n<p>A zero-trust network carries out micro-segmentation and granular perimeter enforcement based on user characteristics (e.g., permissions, role and location) to give people access to only the resources they need to do their jobs, according to\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-architecture\" target=\"_blank\" rel=\"nofollow noopener\">Palo Alto Networks<\/a>. This makes it much more difficult for bad actors to get their hands on sensitive data.<\/p>\n<p>&#8220;Based on the principles of verify explicitly, use least privileged access, and assume breach, a comprehensive Zero Trust architecture creates safeguards within and across identity, endpoints, apps, infrastructure, network, and data, partnered with increased visibility, automation and orchestration,&#8221; wrote Vasu Jakkal, corporate vice president of Microsoft Security, Compliance and Identity, in the supplier&#8217;s\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/07\/28\/zero-trust-adoption-report-how-does-your-organization-compare\/\" target=\"_blank\" rel=\"nofollow noopener\">2021 Zero Trust Adoption Report<\/a>. &#8220;We not only recommend this approach with our customers and partners, we embrace it in our approach to global security and software development here at Microsoft.&#8221;<\/p>\n<h2>The Reasons Behind the Rising Zero-Trust Adoption Rate<\/h2>\n<p>Based on surveys and interviews of over 1,200 security decision-makers, Microsoft found that nearly all (96 percent) of those surveyed identify zero-trust as critical to their company&#8217;s success. The vast majority (90 percent) of security decision-makers reported familiarity with zero-trust, and 76 percent say their organization is either in the process of implementing the framework or has fully adopted it.<\/p>\n<p>The Zero Trust Adoption Report identifies the following as the main motivating factors for implementing a zero-trust framework.<\/p>\n<ul>\n<li>Enhancement of overall security posture (47 percent of survey respondents)<\/li>\n<li>Better end user experience and increased productivity (44 percent)<\/li>\n<li>Transforming security team collaboration (38 percent)<\/li>\n<li>Simplifying the security stack (35 percent)<\/li>\n<li>Lowering security spending (35 percent)<\/li>\n<\/ul>\n<p>The shift to hybrid workplace arrangements is also a significant factor driving zero-trust framework adoption, with 81 percent of enterprises reporting they&#8217;re either in the progress of going hybrid or have already completed the transition.<\/p>\n<p>&#8220;Because secure remote and hybrid work can be aided by Zero Trust strategy, COVID-19 has accelerated adoption of a Zero Trust strategy<br \/>\nfor 72 percent of organizations, although asymmetries emerge between markets,&#8221; the report states.<\/p>\n<p>Additionally, many\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-businesses-need-cyber-liability-insurance\/\" target=\"_blank\" rel=\"nofollow noopener\">cyber liability insurance<\/a>\u00a0providers are ramping up their requirements for clients as security threats continue to evolve: For instance, for most insurers, MFA is now a must if you want coverage. Zero-trust adoption can help your organization maintain optimal security posture and qualify for coverage.<\/p>\n<h2>Achieve Secure Remote Access With A Zero-Trust Framework<\/h2>\n<p>With hackers continuing to bombard businesses of all sizes with <a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-ransomware-crisis-what-smbs-can-take-away-from-recent-attacks-on-big-businesses\/\" target=\"_blank\" rel=\"nofollow noopener\">ransomware attacks<\/a>, phishing attempts and other varieties of cybercrime as hybrid workplaces become commonplace, adopting a zero-trust approach makes a lot of sense. We&#8217;ve helped many of our clients implement secure remote work strategies with Stratosphere\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/office-anywhere.html\" target=\"_blank\" rel=\"nofollow noopener\">Office Anywhere<\/a>, which leverages a zero-trust framework with a\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/secure-access-service-edge-faq-the-benefits-of-sase-for-your-business\/\" target=\"_blank\" rel=\"nofollow noopener\">secure access service edge (SASE)<\/a>\u00a0to provide a secure and unified end user experience. Key features and benefits include the following:<\/p>\n<ul>\n<li>A single, unique and secure user identity that allows end users to log in from any device<\/li>\n<li>Policy enforcement that only gives users access to the resources they need to do their work<\/li>\n<li>Unlimited scalability<\/li>\n<li>BYOD device security<\/li>\n<li>End-to-end encryption<\/li>\n<li>MFA<\/li>\n<\/ul>\n<p>This zero-trust framework can also integrate with\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-next-step-toward-going-serverless-moving-to-azure-ad-and-securing-your-microsoft-365-environment\/\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft 365 identity management and Azure Active Directory<\/a>.<\/p>\n<p>Our team has extensive experience implementing and managing our zero-trust solution, and we can answer any questions you might have about this type of technology and whether it&#8217;s a good fit for your organization. For details, connect with us today by\u00a0calling 877-599-3999 or emailing\u00a0<a class=\"external-link\" href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"nofollow noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When many offices abruptly shut down and sent workers home\u00a0at the beginning of the pandemic, it became much more difficult for cybersecurity professionals to safeguard corporate networks. Taking advantage of weak points in hastily launched remote work infrastructure, cybercriminals ramped &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":4626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[372],"tags":[],"class_list":["post-4625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-consulting-review"],"yoast_head":"<title>Why Zero Trust Makes Sense in a World of Hybrid Work<\/title>\n<meta name=\"description\" content=\"To ensure secure access for remote workers, many businesses have turned to zero-trust network solutions. Here&#039;s why this technology has become essential.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Zero Trust Makes Sense in a World of Hybrid Work\" \/>\n<meta property=\"og:description\" content=\"To ensure secure access for remote workers, many businesses have turned to zero-trust network solutions. Here&#039;s why this technology has become essential.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-24T16:56:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2092\" \/>\n\t<meta property=\"og:image:height\" content=\"1433\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steve Melchiorre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Melchiorre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\"},\"author\":{\"name\":\"Steve Melchiorre\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\"},\"headline\":\"Why Zero Trust Has Become the Go-To Framework in Today&#8217;s World of Hybrid Work\",\"datePublished\":\"2021-08-24T16:56:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\"},\"wordCount\":823,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg\",\"articleSection\":[\"IT Consulting Review\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\",\"name\":\"Why Zero Trust Makes Sense in a World of Hybrid Work\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg\",\"datePublished\":\"2021-08-24T16:56:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\"},\"description\":\"To ensure secure access for remote workers, many businesses have turned to zero-trust network solutions. Here's why this technology has become essential.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg\",\"width\":2092,\"height\":1433,\"caption\":\"An image of the world with icons of gears, a laptop, and a padlock connected by line segments, representing network security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Zero Trust Has Become the Go-To Framework in Today&#8217;s World of Hybrid Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e\",\"name\":\"Steve Melchiorre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g\",\"caption\":\"Steve Melchiorre\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/stevemelchiorre\/\"}]}<\/script>","yoast_head_json":{"title":"Why Zero Trust Makes Sense in a World of Hybrid Work","description":"To ensure secure access for remote workers, many businesses have turned to zero-trust network solutions. Here's why this technology has become essential.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/","og_locale":"en_US","og_type":"article","og_title":"Why Zero Trust Makes Sense in a World of Hybrid Work","og_description":"To ensure secure access for remote workers, many businesses have turned to zero-trust network solutions. Here's why this technology has become essential.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2021-08-24T16:56:24+00:00","og_image":[{"width":2092,"height":1433,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg","type":"image\/jpeg"}],"author":"Steve Melchiorre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve Melchiorre","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/"},"author":{"name":"Steve Melchiorre","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e"},"headline":"Why Zero Trust Has Become the Go-To Framework in Today&#8217;s World of Hybrid Work","datePublished":"2021-08-24T16:56:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/"},"wordCount":823,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg","articleSection":["IT Consulting Review"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/","name":"Why Zero Trust Makes Sense in a World of Hybrid Work","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg","datePublished":"2021-08-24T16:56:24+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e"},"description":"To ensure secure access for remote workers, many businesses have turned to zero-trust network solutions. Here's why this technology has become essential.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/network-security.jpg","width":2092,"height":1433,"caption":"An image of the world with icons of gears, a laptop, and a padlock connected by line segments, representing network security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Zero Trust Has Become the Go-To Framework in Today&#8217;s World of Hybrid Work"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/20d46a770087af47124832c54b141c0e","name":"Steve Melchiorre","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aaa5cea4658bc449a41012c1a4ae71a2c1803babf8ec3254c2ee67fdfad0e5de?s=96&d=mm&r=g","caption":"Steve Melchiorre"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/stevemelchiorre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4625"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4625\/revisions"}],"predecessor-version":[{"id":4629,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4625\/revisions\/4629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4626"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}