{"id":1617,"date":"2022-03-14T20:37:00","date_gmt":"2022-03-14T20:37:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/zero-trust-at-scale\/"},"modified":"2023-05-16T00:45:10","modified_gmt":"2023-05-16T00:45:10","slug":"zero-trust-at-scale","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/","title":{"rendered":"Zero Trust &#8211; At Scale"},"content":{"rendered":"<p>Zero Trust is the modern methodology we need for the post-pandemic hybrid workforce. It offers enhanced security across all devices and applications, including BYOD (Bring Your Own Device) and delivers a frictionless employee experience regardless of location. Revisit <a href=\"https:\/\/umbrellarconnect.com\/managed-services\/security\/the-underlying-principles-of-zero-trust\/\" target=\"_blank\" rel=\"noopener\">our first article in the Zero Trust series<\/a> to get a refresher on the three principles.<\/p>\n<h2>Zero Trust Architecture with Microsoft 365 E5<\/h2>\n<p>The Microsoft 365 E5 licence includes tools that help you scale your Zero Trust architecture with ease. We&#8217;ll outline the five main security enhancements, and show you how to minimise your cost impact.<\/p>\n<h3>Defender for Endpoint<\/h3>\n<p>Defender for Endpoint P1 is included in the E3 license and provides a suite of tools to protect your devices including anti-malware, endpoint firewall, web filtering, controlled folder access and device control.\u00a0However, employees are fallible human beings so it is inevitable that some devices will get compromised.<\/p>\n<p>When that happens, the ability to detect, analyse, investigate and remediate the threat is critical. Defender for Endpoint P2 is included in the E5 license and provides these additional capabilities:<\/p>\n<ul>\n<li>Endpoint detection and response<\/li>\n<li>Automated investigation and remediation<\/li>\n<li>Threat and vulnerability management<\/li>\n<li>Threat intelligence (Threat Analytics)<\/li>\n<li>Sandbox (deep analysis).<\/li>\n<\/ul>\n<h3>Identity and Access Management<\/h3>\n<p>Azure AD Premium P1 is included in the E3 license and includes Conditional Access, multiple methods for MFA, the Authenticator app, Trusted IPs and Fraud Alert.\u00a0Azure AD Premium P2 is included in the E5 license and provides the following additional capabilities:<\/p>\n<ul>\n<li>Risk-based Conditional Access<\/li>\n<li>Access Reviews<\/li>\n<li>Identity Protection (risky sign-ins, risky users)<\/li>\n<li>Entitlements Management<\/li>\n<li>Privileged Identity Management (just-in-time access).<\/li>\n<\/ul>\n<h3>Defender for Cloud Apps<\/h3>\n<p>Defender for Cloud Apps (formerly Microsoft Cloud App Security) is only available in E5.<\/p>\n<p>Most companies use far more cloud apps than they realize. Many of these apps are unapproved and not compliant with security policies. Since employees are working remotely and accessing cloud apps from BYO devices, the risk of shadow IT is very real.\u00a0Defender for Cloud Apps gives you the ability to:<\/p>\n<ul>\n<li>Assess your app risk profile with a framework of 80 risk factors<\/li>\n<li>Expose any compliance violations (HIPAA, GDPR etc)<\/li>\n<li>Approve or deny the addition of new apps in your environment<\/li>\n<li>Apply Conditional Access App Control (reverse proxy)<\/li>\n<li>Protect sensitive data stored in cloud apps.<\/li>\n<\/ul>\n<h3>Information Protection<\/h3>\n<p>E3 enables you to classify data and manually apply labels to sensitive data. You can then assign policies to those labels to trigger protective actions, such as encryption or limiting access to third-party apps.<\/p>\n<p>E5 enables you to fully automate this process with integration to Office 365 documents and data so you can protect sensitive information, regardless of where it is stored or who it is shared with (persistence). You can also monitor, track and report on access to sensitive data and revoke access if needed.<\/p>\n<p>E5 also allows the sharing of data externally with partners and clients by defining permissions to view, edit, print or forward. Plus you can also manage your encryption keys with Bring Your Own Key (BYOK) and Hold Your Own Key (HYOK).<\/p>\n<p>For data outside Microsoft 365, use Azure Purview to automatically discover and map Azure data sources, on-premises, and SaaS data sources.<\/p>\n<h3>Compliance Management<\/h3>\n<p>E3 enables you to manually apply retention labels and company-wide retention policies, and perform litigation hold so you can perform a basic audit.\u00a0E5, on the other hand, lets you automatically apply retention policies with the following capabilities for advanced audits:<\/p>\n<ul>\n<li>Rules-based automatic retention policies and records management with machine learning for retention.<\/li>\n<li>Insider risk management, customer lockbox, privileged access<\/li>\n<li>Advanced eDiscovery and advanced audit<\/li>\n<li>Address regulations and assess compliance with a risk-based score.<\/li>\n<li>Third-party connections for external.<\/li>\n<\/ul>\n<h3>Minimising the cost<\/h3>\n<p>Sure, E5 comes with a higher price tag, but the uplift from E3 is a small price to pay when you think about the potential $9 million expense of your average cybersecurity breach.\u00a0 To minimise the cost impact, Mobile Mentor suggests:<\/p>\n<ul>\n<li>Start with a small number of E5 licences for the IT team to get visibility of shadow IT and associated threats.<\/li>\n<li>Consider E5 licences for the highest risk users (think your C-Suite) who receive the highest volume of phishing emails.<\/li>\n<li>Evaluate licence needs for frontline workers to see if any users can be downgraded from E3 to F3.<\/li>\n<\/ul>\n<p>In part 4 of our Zero Trust series, we&#8217;ll summarise Mobile Mentor&#8217;s &#8220;The Six Pillars of Modern Endpoint Management&#8221; and link you to the complete whitepaper.<\/p>\n<p>Get your regular fix of thought leadership from Mobile Mentor by <a href=\"https:\/\/share.hsforms.com\/1MsbipM9aRLCamtSuCGmSqAc0ver?utm_campaign=website&amp;utm_medium=newsletter_sub&amp;utm_source=umbrellar_connect&amp;utm_content=mm_zero_trust&amp;utm_term=\" target=\"_blank\" rel=\"noopener\">joining their newsletter<\/a>.<\/p>\n<p><strong>Read the rest of the Zero Trust series to round out your knowledge:<\/strong><\/p>\n<p><a href=\"\/blog\/the-underlying-principles-of-zero-trust\/\">Part 1: Underlying principles of Zero Trust<\/a><br \/>\n<a href=\"\/blog\/getting-started-with-zero-trust\/\">Part 2: Getting started with Zero Trust<\/a><br \/>\n<a href=\"\/blog\/6-transformations-to-disrupt-your-legacy-it-operations\/\">Part 4: 6 transformations to disrupt your legacy IT operations<\/a><\/p>\n<p><a class=\"btn-primary\" href=\"\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n<p><img decoding=\"async\" class=\" wp-image-993 alignleft\" src=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/mobile-mentor-logo.png\" alt=\"Mobile Mentor\" width=\"259\" height=\"111\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft 365 E5 licence includes tools that help you scale your Zero Trust architecture with ease. We&#8217;ll outline the five main security enhancements, and show you how to minimise your cost impact.<\/p>\n","protected":false},"author":141,"featured_media":1618,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[53,5],"tags":[57],"class_list":["post-1617","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apac","category-security","tag-cybersecuritymobile-mentortechnology-policyuser-experiencezero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust - At Scale - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"The Microsoft 365 E5 licence includes tools that help you scale your Zero Trust architecture with ease. We&#039;ll outline the five main security enhancements, and show you how to minimise your cost impact.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust - At Scale - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"The Microsoft 365 E5 licence includes tools that help you scale your Zero Trust architecture with ease. We&#039;ll outline the five main security enhancements, and show you how to minimise your cost impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-14T20:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T00:45:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/MM-Enterprise_1200.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Zero Trust &#8211; At Scale\",\"datePublished\":\"2022-03-14T20:37:00+00:00\",\"dateModified\":\"2023-05-16T00:45:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/\"},\"wordCount\":780,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/MM-Enterprise_1200.png\",\"keywords\":[\"cybersecurity|Mobile Mentor|technology policy|user experience|zero trust\"],\"articleSection\":[\"Pax8 APAC\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/\",\"name\":\"Zero Trust - At Scale - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/MM-Enterprise_1200.png\",\"datePublished\":\"2022-03-14T20:37:00+00:00\",\"dateModified\":\"2023-05-16T00:45:10+00:00\",\"description\":\"The Microsoft 365 E5 licence includes tools that help you scale your Zero Trust architecture with ease. We'll outline the five main security enhancements, and show you how to minimise your cost impact.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/MM-Enterprise_1200.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/MM-Enterprise_1200.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/zero-trust-at-scale\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust &#8211; At Scale\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust - At Scale - Pax8 Blog","description":"The Microsoft 365 E5 licence includes tools that help you scale your Zero Trust architecture with ease. We'll outline the five main security enhancements, and show you how to minimise your cost impact.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust - At Scale - Pax8 Blog","og_description":"The Microsoft 365 E5 licence includes tools that help you scale your Zero Trust architecture with ease. We'll outline the five main security enhancements, and show you how to minimise your cost impact.","og_url":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/","og_site_name":"Pax8 Blog","article_published_time":"2022-03-14T20:37:00+00:00","article_modified_time":"2023-05-16T00:45:10+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/MM-Enterprise_1200.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Zero Trust &#8211; At Scale","datePublished":"2022-03-14T20:37:00+00:00","dateModified":"2023-05-16T00:45:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/"},"wordCount":780,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/MM-Enterprise_1200.png","keywords":["cybersecurity|Mobile Mentor|technology policy|user experience|zero trust"],"articleSection":["Pax8 APAC","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/","url":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/","name":"Zero Trust - At Scale - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/MM-Enterprise_1200.png","datePublished":"2022-03-14T20:37:00+00:00","dateModified":"2023-05-16T00:45:10+00:00","description":"The Microsoft 365 E5 licence includes tools that help you scale your Zero Trust architecture with ease. We'll outline the five main security enhancements, and show you how to minimise your cost impact.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/MM-Enterprise_1200.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/MM-Enterprise_1200.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/zero-trust-at-scale\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Zero Trust &#8211; At Scale"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1617"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1617\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/1618"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}