{"id":92521,"date":"2021-01-19T09:00:19","date_gmt":"2021-01-19T17:00:19","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92521"},"modified":"2023-05-15T23:03:08","modified_gmt":"2023-05-16T06:03:08","slug":"how-it-leaders-are-securing-identities-with-zero-trust","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/19\/how-it-leaders-are-securing-identities-with-zero-trust\/","title":{"rendered":"How IT leaders are securing identities with Zero Trust"},"content":{"rendered":"
The\u00a0past twelve months\u00a0have been a remarkable time of digital transformation as organizations, and especially digital security teams,\u00a0adapt to working remotely and shifting business operations.\u00a0IT leaders everywhere\u00a0turned to Zero Trust approaches to alleviate the challenges of enabling and securing remote work. Using Zero Trust to secure users, data, and devices (wherever they may be) has changed from optional to a business imperative overnight.<\/p>\n
In this short report, we surveyed\u00a0IT leaders around the world to determine how they\u2019re implementing Zero Trust practices to\u00a0protect\u00a0their identities\u00a0and ensure\u00a0their employees have secure access to resources. Read the full report for more details<\/a>.<\/p>\n If you\u2019re looking for how to help prevent endpoints from being the weakest link in your security strategy, check out our Zero Trust deployment guidance for identities<\/a>.<\/p>\n To learn more about Microsoft Security solutions visit our\u00a0website<\/a>.\u00a0 Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" The\u00a0past twelve months\u00a0have been a remarkable time of digital transformation as organizations, and especially digital security teams,\u00a0adapt to working remotely and shifting business operations.\u00a0IT leaders everywhere\u00a0turned to Zero Trust approaches to alleviate the challenges of enabling and securing remote work. Using Zero Trust to secure users, data, and devices (wherever they may be) has changed […]<\/p>\n","protected":false},"author":96,"featured_media":92523,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3659],"topic":[3673,3689],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[2174],"class_list":["post-92521","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-identity-and-access-management","topic-zero-trust","tag-microsoft-security-insights"],"yoast_head":"\n<\/a><\/p>\n
\n