{"id":15829,"date":"2023-05-22T02:43:00","date_gmt":"2023-05-22T09:43:00","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?page_id=15829"},"modified":"2024-08-08T09:23:09","modified_gmt":"2024-08-08T16:23:09","slug":"transitioning-to-modern-access-architecture-with-zero-trust","status":"publish","type":"page","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transitioning-to-modern-access-architecture-with-zero-trust\/","title":{"rendered":"Transitioning to modern access architecture with Zero Trust"},"content":{"rendered":"\n
<\/span>\"Two
\n
\n

Transitioning to modern access architecture with
Zero Trust<\/h1>\n<\/div>\n<\/div><\/div>\n\n\n\n
\n
\n

Today\u2019s cloud-based enterprise environments and always-on workforces require access to applications and resources that exist beyond the traditional boundaries of corporate networks, restrictive network firewalls and VPNs. Organizations are moving to modern, more holistic systems of verification to manage enterprise security and to combat threats differently.<\/p>\n<\/div>\n\n\n\n

\n

Microsoft has adopted a modern approach to security called \u201cZero Trust,\u201d which is based on the principle: never trust, always verify. This security approach protects our company and our customers by managing and granting access based on the continual verification of identities, devices and services. In this content suite, the Microsoft Digital team shares their strategic approach, best practices, and hands-on learning from our enterprise-wide transition to Zero Trust architecture.<\/p>\n<\/div>\n<\/div>\n\n\n