{"id":90498,"date":"2020-01-23T09:00:27","date_gmt":"2020-01-23T17:00:27","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90498"},"modified":"2023-05-15T23:05:12","modified_gmt":"2023-05-16T06:05:12","slug":"microsoft-zscaler-help-organizations-implement-zero-trust-model","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/","title":{"rendered":"Microsoft and Zscaler help organizations implement the Zero Trust model"},"content":{"rendered":"

This blog post is part of the Microsoft Intelligence Security Association (MISA) guest blog series<\/a>. To learn more about MISA, visit the MISA webpage<\/a>.<\/em><\/p>\n

While digital transformation is critical to business innovation, delivering security to cloud-first, mobile-first architectures requires rethinking traditional network security solutions. Some businesses have been successful in doing so, while others still remain at risk of very costly breaches.<\/p>\n

MAN Energy Solutions, a leader in the marine, energy, and industrial sectors, has been driving cloud transformation across their business. As with any transformation, there were challenges\u2014as they began to adopt cloud services, they quickly realized that the benefits of the cloud would be offset by poor user experience, increasing appliance and networking costs, and an expanded attack surface.<\/p>\n

In 2017, MAN Energy Solutions implemented \u201cBlackcloud\u201d\u2014an initiative that establishes secure, one-to-one connectivity between each user and the specific private apps that the user is authorized to access, without ever placing the user on the larger corporate network. A virtual private network (VPN) is no longer necessary to connect to these apps. This mitigates lateral movement of bad actors or malware.<\/p>\n

This approach is based on the Zero Trust security model.<\/p>\n

Understanding the Zero Trust model<\/h3>\n

In 2019, Gartner released a Market Guide<\/a> describing its Zero Trust Network<\/a> Access (ZTNA) model and making a strong case for its efficacy in connecting employees and partners to private applications, simplifying mergers, and scaling access. Sometimes referred to as software-defined perimeter, the ZTNA model includes a \u201cbroker\u201d that mediates connections between authorized users and specific applications.<\/p>\n

The Zero Trust model grants application access based on identity and context of the user, such as date\/time, geolocation, and device posture, evaluated in real-time. It empowers the enterprise to limit access to private apps only to the specific users who need access to them and do not pose any risk. Any changes in context of the user would affect the trust posture and hence the user\u2019s ability to access the application.<\/p>\n

Access governance is done via policy and enabled by two end-to-end, encrypted, outbound micro-tunnels that are spun on-demand (not static IP tunnels like in the case of VPN) and stitched together by the broker. This ensures apps are never exposed to the internet, thus helping to reduce the attack surface.<\/p>\n

As enterprises witness and respond to the impact of increasingly lethal malware, they\u2019re beginning to transition to the Zero Trust model with pilot initiatives, such as securing third-party access, simplifying M&As and divestitures, and replacing aging VPN clients. Based on the 2019 Zero Trust Adoption Report by Cybersecurity Insiders<\/a>, 59 percent of enterprises plan to embrace the Zero Trust model within the next 12 months.<\/p>\n

Implement the Zero Trust model with Microsoft and Zscaler<\/h3>\n

Different organizational requirements, existing technology implementations, and security stages affect how the Zero Trust model implementation takes place. Integration between multiple technologies, like endpoint management and SIEM, helps make implementations simple, operationally efficient, and adaptive.<\/p>\n

Microsoft has built deep integrations with Zscaler<\/a>\u2014a cloud-native, multitenant security platform\u2014to help organizations with their Zero Trust journey. These technology integrations empower IT teams to deliver a seamless user experience and scalable operations as needed, and include:<\/p>\n

Azure Active Directory (Azure AD)<\/strong>\u2014Enterprises can leverage powerful authentication tools\u2014such as Multi-Factor Authentication (MFA), conditional access policies, risk-based controls, and passwordless sign-in\u2014offered by Microsoft, natively with Zscaler. Additionally, SCIM integrations ensure adaptability of user access. When a user is terminated, privileges are automatically modified, and this information flows automatically to the Zscaler cloud where immediate action can be taken based on the update.<\/p>\n

Microsoft Endpoint Manager<\/strong>\u2014With Microsoft Endpoint Manager, client posture can be evaluated at the time of sign-in, allowing Zscaler to allow or deny access based on the security posture. Microsoft Endpoint Manager can also be used to install and configure the Zscaler app on managed devices.<\/p>\n

Azure Sentinel<\/strong>\u2014Zscaler’s Nanolog Streaming Service (NSS) can seamlessly integrate with Azure to forward detailed transactional logs to the Azure Sentinel service, where they can be used for visualization and analytics, as well as threat hunting and security response.<\/p>\n

Implementation of the Zscaler solution involves deploying a lightweight gateway software, on endpoints and in front of the applications in AWS and\/or Azure. Per policies defined in Microsoft Endpoint Manager, Zscaler creates secure segments between the user devices and apps through the Zscaler security cloud, where brokered micro-tunnels are stitched together in the location closest to the user.<\/p>\n

\"Infographic<\/a><\/p>\n

If you\u2019d like to learn more about secure access to hybrid apps, view the webinar on Powering Fast and Secure Access to All Apps<\/a> with experts from Microsoft and Zscaler.<\/p>\n

Rethink security for the cloud-first, mobile-first world<\/h3>\n

The advent of cloud-based apps and increasing mobility are key drivers forcing enterprises to rethink their security model. According to Gartner\u2019s Market Guide for Zero Trust Network Access (ZTNA)<\/a> \u201cby 2023, 60 percent of enterprises will phase out most of their remote access VPNs in favor of ZTNA.\u201d Successful implementation depends on using the correct approach. I hope the Microsoft-Zscaler partnership and platform integrations help you accomplish the Zero Trust approach as you look to transform your business to the cloud.<\/p>\n

For more information on the Zero Trust model, visit the Microsoft Zero Trust page<\/a>. Also, bookmark the Security blog<\/a> to keep up with our expert coverage on security matters and follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"

Microsoft has built deep integrations with Zscaler\u2014a cloud-native, multitenant security platform\u2014to help organizations with their Zero Trust journey.<\/p>\n","protected":false},"author":96,"featured_media":90501,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3677,3679,3684,3685,3689],"products":[3702,3703,3726],"threat-intelligence":[],"tags":[],"coauthors":[2238],"class_list":["post-90498","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-misa","topic-network-security","topic-security-operations","topic-siem-and-xdr","topic-zero-trust","products-microsoft-entra","products-microsoft-entra-id","products-microsoft-sentinel"],"yoast_head":"\nMicrosoft and Zscaler help organizations implement the Zero Trust model<\/title>\n<meta name=\"description\" content=\"Microsoft has built deep integrations with Zscaler, a cloud-native, multitenant security platform, to help organizations with their Zero Trust journey.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft and Zscaler help organizations implement the Zero Trust model\" \/>\n<meta property=\"og:description\" content=\"Microsoft has built deep integrations with Zscaler, a cloud-native, multitenant security platform, to help organizations with their Zero Trust journey.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-23T17:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:05:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dhawal Sharma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dhawal Sharma\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/dhawal-sharma\/\",\"@type\":\"Person\",\"@name\":\"Dhawal Sharma\"}],\"headline\":\"Microsoft and Zscaler help organizations implement the Zero Trust model\",\"datePublished\":\"2020-01-23T17:00:27+00:00\",\"dateModified\":\"2023-05-16T06:05:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/\"},\"wordCount\":907,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/\",\"name\":\"Microsoft and Zscaler help organizations implement the Zero Trust model\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png\",\"datePublished\":\"2020-01-23T17:00:27+00:00\",\"dateModified\":\"2023-05-16T06:05:12+00:00\",\"description\":\"Microsoft has built deep integrations with Zscaler, a cloud-native, multitenant security platform, to help organizations with their Zero Trust journey.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png\",\"width\":1200,\"height\":630,\"caption\":\"Image of a man looking at his laptop.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft and Zscaler help organizations implement the Zero Trust model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft and Zscaler help organizations implement the Zero Trust model","description":"Microsoft has built deep integrations with Zscaler, a cloud-native, multitenant security platform, to help organizations with their Zero Trust journey.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft and Zscaler help organizations implement the Zero Trust model","og_description":"Microsoft has built deep integrations with Zscaler, a cloud-native, multitenant security platform, to help organizations with their Zero Trust journey.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-01-23T17:00:27+00:00","article_modified_time":"2023-05-16T06:05:12+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png","type":"image\/png"}],"author":"Dhawal Sharma","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png","twitter_misc":{"Written by":"Dhawal Sharma","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/dhawal-sharma\/","@type":"Person","@name":"Dhawal Sharma"}],"headline":"Microsoft and Zscaler help organizations implement the Zero Trust model","datePublished":"2020-01-23T17:00:27+00:00","dateModified":"2023-05-16T06:05:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/"},"wordCount":907,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/","name":"Microsoft and Zscaler help organizations implement the Zero Trust model","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png","datePublished":"2020-01-23T17:00:27+00:00","dateModified":"2023-05-16T06:05:12+00:00","description":"Microsoft has built deep integrations with Zscaler, a cloud-native, multitenant security platform, to help organizations with their Zero Trust journey.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/01\/Microsoft-and-Zscaler-help-organizations-implement-the-Zero-Trust-model-SOCIAL.png","width":1200,"height":630,"caption":"Image of a man looking at his laptop."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/23\/microsoft-zscaler-help-organizations-implement-zero-trust-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft and Zscaler help organizations implement the Zero Trust model"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90498"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=90498"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90498\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/90501"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=90498"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=90498"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=90498"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=90498"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=90498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=90498"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=90498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}