{"id":51278,"date":"2022-03-08T08:49:57","date_gmt":"2022-03-08T16:49:57","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?p=51278"},"modified":"2025-02-02T15:37:57","modified_gmt":"2025-02-02T23:37:57","slug":"what-is-zero-trust-security","status":"publish","type":"post","link":"\/us\/en\/blog\/what-is-zero-trust-security\/","title":{"rendered":"What is zero trust security?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Security has always been top-of-the-list for businesses across the world, but the <\/span><span style=\"font-weight: 400;\">digital transformation<\/span><span style=\"font-weight: 400;\"> that\u2019s happened over the past few years has really shifted the way we view our <\/span><span style=\"font-weight: 400;\">network security.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is particularly true of the shift to remote work, where employees can work from anywhere\u2014on any device and any connection. All the data and usual applications have moved to<\/span><span style=\"font-weight: 400;\"> cloud environments<\/span><span style=\"font-weight: 400;\">, making the question of security a slightly more complex one. How can you implement a solid <\/span><span style=\"font-weight: 400;\">security strategy<\/span><span style=\"font-weight: 400;\">, while giving the whole team secure access?\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p style=\"text-align: center;\">\u2b50\u00a0\u00a0<strong>What is a composable enterprise?<\/strong>\u00a0 \u2b50<\/p>\n<p style=\"text-align: center;\">APIs and low-code\/no-code solutions are the future of cloud technologies. But what does that mean? Here&#8217;s everything you need to know.<\/p>\n<p><center><span style=\"font-weight: 400;\">\t<\/p>\n<div class=\"download-form-widget enterprise-download-form\" data-url=\"https:\/\/netstorage.ringcentral.com\/research\/composable-communications.pdf\" data-id=\"69d48e6abf4e8\" id=\"69d48e6abf4e8\">\n\t\t<button tabindex=\"on\"  on=\"tap:69d48e6abf4e8.toggleClass(class='open')\" class=\"open-modal-download-action download-form-button\" type=\"submit\">Learn more<\/button><\/p>\n<div class=\"download-form-modal\">\n<div class=\"download-form-modal-body\">\n<div class=\"download-form-modal-content\">\n<div class=\"download-form-modal-title\">The composable enterprise is cloud's next big thing. Learn about it here.<\/div>\n<form class=\"download-form ENTERPRISE\" method=\"post\">\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Full Name\" aria-required=\"true\" aria-invalid=\"false\" type=\"text\" name=\"fullname\" placeholder=\"Full Name\" data-dl-events-hover=\"true\" data-dl-element=\"text\" data-dl-additional-info=\"enterprise download form\">\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Email (please enter a work email address)\" aria-required=\"true\" aria-invalid=\"false\" type=\"email\" autocomplete=\"on\" name=\"email\" placeholder=\"Email (please enter a work email address)\" data-dl-events-hover=\"true\" data-dl-element=\"email\" data-dl-additional-info=\"enterprise download form\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"popup_form\" value=\"1\">\n\t\t\t\t\t\t<\/div>\n<div><input type=\"hidden\" name=\"Asset_ID__c\" value=\"ODAM-02603\" class=\"download-form-input\"><\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"Lead_Entry_Source__c\" value=\"RC Blog Enterprise\" class=\"download-form-input\"\/>\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<button class=\"download-form-submit\" type=\"submit\" data-dl-element=\"button\" data-no-auto-dl=\"true\" data-dl-additional-info=\"enterprise download form\" data-dl-name=\"Download Now\">Download Now<\/button>\n\t\t\t\t\t\t<\/div>\n<\/p><\/form>\n<p> \t\t\t\t\t<button on=\"tap:69d48e6abf4e8.toggleClass(class='open')\" role=\"button\" tabindex=\"0\"  class=\"download-form-modal-close\"><\/button>\n\t\t\t\t<\/div>\n<div class=\"download-form-modal-thank\"> Enjoy!<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>\t<\/span><\/center><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The answer? By implementing a <\/span><span style=\"font-weight: 400;\">zero trust security model.<\/span><span style=\"font-weight: 400;\"> Unlike <\/span><span style=\"font-weight: 400;\">on-premises<\/span><span style=\"font-weight: 400;\">,<\/span> <span style=\"font-weight: 400;\">there\u2019s a greater need to protect sensitive digital information, as it can easily be hacked or exposed to <\/span><span style=\"font-weight: 400;\">malware<\/span><span style=\"font-weight: 400;\">. If businesses want to protect themselves online, they need to define strong <\/span><span style=\"font-weight: 400;\">network perimeters <\/span><span style=\"font-weight: 400;\">and <\/span><span style=\"font-weight: 400;\">security postures<\/span><span style=\"font-weight: 400;\">, and that\u2019s where the zero trust model comes in.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong><a id=\"what\"><\/a>What is the zero trust model?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Coined by <\/span><span style=\"font-weight: 400;\">John Kindervag<\/span><span style=\"font-weight: 400;\"> of <\/span><span style=\"font-weight: 400;\">Forrester Research<\/span><span style=\"font-weight: 400;\">, the <\/span><span style=\"font-weight: 400;\">zero trust security model <\/span><span style=\"font-weight: 400;\">i<\/span><span style=\"font-weight: 400;\">s a framework that secures all your business <\/span><span style=\"font-weight: 400;\">apps <\/span><span style=\"font-weight: 400;\">and data in the cloud. The zero trust model is:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Based on the principle that no user can entirely be trusted, although it may sound a little harsh, it\u2019s only a \u201cmodel\u201d. Zero trust architecture can be adapted to suit your needs, and many businesses set up certain permissions and network access codes that can only be used by specific employees.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It\u2019s all about protecting against vulnerabilities and providing a secure roadmap for your organization to work by, even for years to come.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\"><\/p>\n<div class=\"rc-post-content-cta rc-post-content-cta_orange\">\n<div class=\"rc-post-content-cta-columns\">\n<div class=\"bottom-cta-img\">\n\t\t\t\t<img decoding=\"async\" width=\"2048\" height=\"1365\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/Team-building-scaled.jpg\" class=\"responsive-image\" alt=\"\" \/>\t\t\t<\/div>\n<div class=\"bottom-cta-copy\">\n<div class=\"headline-copy\" style=\"text-align:left;\"><strong>In-person team building makes more sense than you think. Here\u2019s why<\/strong><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"rc-post-content-cta-footer\">\n<div class=\"bottom-cta-logo-container\">\n<div class=\"bottom-cta-logo\"><span aria-hidden=\"true\"><svg width=\"154\" height=\"34\" viewBox=\"0 0 154 34\" fill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-logo-1941749252\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<title id=\"cta-ring-logo-1941749252\">Ring Central Logo<\/title>\t\n\t\t\t\t\t\t\t<path d=\"M154 3.89618H150.386V26.9657H154V3.89618Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M141.313 11.6299C137.976 11.6299 135.388 13.2501 134.95 16.5546H138.504C138.754 15.3082 139.675 14.5591 141.313 14.5591C143.214 14.5591 144.086 15.6499 144.086 17.3647V18.1444H140.438C137.078 18.1444 134.593 19.6411 134.593 22.697C134.593 25.7529 136.619 27.3411 139.55 27.3411C141.826 27.3411 143.323 26.3721 144.133 24.8145H144.288V26.9529H147.716V17.4802C147.702 13.8276 145.833 11.6299 141.313 11.6299ZM140.58 24.5675C139.177 24.5675 138.303 23.8809 138.303 22.7339C138.303 21.4233 139.238 20.7383 140.921 20.7383H144.069L144.086 20.9549C144.088 23.2232 142.777 24.5675 140.58 24.5675Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M128.187 26.9657V19.2047C128.187 16.8979 129.623 15.4317 131.896 15.4317H133.321V12.0036H131.854C130.14 12.0036 128.893 12.6581 128.114 14.1243H127.988V12.0036H124.591V26.9753L128.187 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M122.295 23.6627V26.9657H119.833C116.371 26.9657 114.47 25.3615 114.47 21.8997V14.9729H112.008V12.0036H114.47V8.03009H118.088V12.002H122.295V14.9713H118.088V21.4794C118.088 22.851 118.898 23.6611 120.269 23.6611H122.295V23.6627Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M100.161 26.9657V18.3C100.161 16.1793 101.472 14.7917 103.589 14.7917C105.615 14.7917 106.831 15.9627 106.831 18.2535V26.9657H110.452V17.6776C110.452 13.9046 108.618 11.6299 104.872 11.6299C102.593 11.6299 100.851 12.6565 100.073 14.0586H99.9444V12.0036H96.5548V26.9753L100.161 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M86.8688 24.3814C84.5925 24.3814 83.0638 22.8542 83.0028 20.4528H94.0699L94.0539 19.2833C94.0539 14.2655 90.8119 11.6443 86.8512 11.6443C82.5729 11.6443 79.448 14.7002 79.448 19.4999C79.448 24.2996 82.3483 27.3555 86.8512 27.3555C90.6226 27.3555 93.085 25.3599 93.802 22.4291H90.2986C89.9103 23.5536 88.9559 24.3814 86.8688 24.3814ZM86.8544 14.6377C89.2222 14.6377 90.6258 15.9787 90.7204 17.8492H82.99C83.3317 15.9483 84.4834 14.6377 86.8544 14.6377Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M68.631 27.3732C74.0243 27.3732 77.0802 24.3814 77.7973 19.9395H74.1301C73.5863 21.9655 72.1105 23.836 68.6294 23.836C65.0457 23.836 62.1759 21.3912 62.1759 16.0413C62.1759 10.6914 65.0457 8.2531 68.6294 8.2531C72.2132 8.2531 73.6505 10.1236 74.1301 12.1191H77.7973C77.2037 7.6756 74.1943 4.7865 68.631 4.7865C62.6459 4.7865 58.313 8.96375 58.313 16.0927C58.313 23.2216 62.6459 27.3988 68.631 27.3988V27.3732Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M52.437 12.0036V14.0569H52.2654C51.4553 12.6244 49.7725 11.6282 47.3759 11.6282C43.8676 11.6282 40.7057 14.4034 40.7057 19.2978C40.7057 24.1921 43.8226 26.9978 47.3759 26.9978C49.6827 26.9978 51.043 26.0593 52.0841 24.4712H52.2493V27.625C52.2493 29.3078 51.3141 30.0874 49.7869 30.0874H42.4543V33.3085H49.718C53.7396 33.3085 55.8908 31.0627 55.8908 27.3844V12.0036H52.437ZM48.3689 23.7237C45.9674 23.7237 44.4402 22.2302 44.4402 19.2994C44.4402 16.3685 45.953 14.8719 48.3689 14.8719C50.7061 14.8719 52.2654 16.3653 52.2654 19.2994C52.2654 22.2334 50.7222 23.7237 48.3689 23.7237Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.2125 26.9657V18.3C28.2125 16.1793 29.5231 14.7917 31.6438 14.7917C33.6698 14.7917 34.8858 15.9627 34.8858 18.2535V26.9657H38.5V17.6776C38.5 13.9046 36.6664 11.6299 32.9207 11.6299C30.6444 11.6299 28.8846 12.6565 28.105 14.0586H27.9799V12.0036H24.5967V26.9753L28.2125 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path d=\"M21.5423 12.0036H17.9282V26.9673H21.5423V12.0036Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.6302 16.6477V16.5017C13.8424 15.8905 15.339 14.4051 15.339 11.0684C15.339 7.64031 12.782 5.14423 8.04169 5.14423H0V26.9657H3.73931V18.3H8.29354C10.4143 18.3 11.4746 19.3604 11.4746 21.4811V26.9817H15.2139V21.4811C15.2139 18.3946 13.9033 17.1482 11.6302 16.6477ZM7.84117 14.9329H3.73931V8.51618H7.83956C9.86562 8.51618 11.4233 9.35998 11.4233 11.7277C11.4233 14.0955 9.85119 14.9329 7.84117 14.9329Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.7329 9.60219C20.2077 9.60219 20.6729 9.46262 21.0676 9.19794C21.4638 8.93485 21.7718 8.55948 21.9531 8.11994C22.1359 7.68039 22.1824 7.19754 22.091 6.73233C21.998 6.26552 21.7702 5.83721 21.4333 5.50194C21.0964 5.16506 20.6697 4.93727 20.2029 4.84423C19.7361 4.75119 19.2532 4.79931 18.8153 4.98219C18.3758 5.16506 18.002 5.47306 17.7373 5.86769C17.4742 6.26231 17.333 6.72752 17.3347 7.20235C17.3298 7.67879 17.4694 8.144 17.7325 8.54023C17.9956 8.93646 18.3726 9.24446 18.8137 9.42412C19.1041 9.54604 19.4169 9.6054 19.7329 9.60219Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.9769 0.548269C16.101 0.914019 15.307 1.44981 14.6364 2.12196L16.332 3.81756C16.7764 3.37 17.3041 3.01548 17.8865 2.77325C18.4688 2.53102 19.0928 2.40429 19.7232 2.40269C20.3537 2.40108 20.9777 2.523 21.5616 2.76362C22.1439 3.00264 22.6749 3.35556 23.1225 3.79991L24.8181 2.10431C23.8106 1.1001 22.5289 0.415123 21.1333 0.139206C19.7377 -0.139919 18.2907 0.00285184 16.9769 0.548269Z\" \/>\n\t\t\t\t\t\t<\/svg><\/span><\/div>\n<\/p><\/div>\n<div class=\"bottom-cta-link\">\n\t\t\t\t<a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/in-person-team-building\/\" class=\"view-all view-all-brown\" data-dl-name=\"Read the blog\" data-dl-element=\"button\" data-dl-additional-info=\"bottom cta banner\" data-no-auto-dl=\"true\">Read the blog<span class=\"svg-icon\" aria-hidden=\"true\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" fill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-arrow-1941749252\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<title id=\"cta-ring-arrow-1941749252\">Ring Central Logo<\/title>\t\n\t\t\t\t\t<path d=\"M0 11.5C0 11.2239 0.223858 11 0.5 11H21.6797C21.9559 11 22.1797 11.2239 22.1797 11.5V12.5C22.1797 12.7761 21.9559 13 21.6797 13H0.5C0.223858 13 0 12.7761 0 12.5V11.5Z\" ><\/path>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M21.1718 12.0001L15.8086 6.63691C15.6134 6.44165 15.6134 6.12506 15.8086 5.9298L16.5157 5.22269C16.711 5.02743 17.0276 5.02743 17.2228 5.22269L23.6467 11.6465C23.8419 11.8418 23.8419 12.1584 23.6467 12.3536L17.2228 18.7775C17.0276 18.9727 16.711 18.9727 16.5157 18.7775L15.8086 18.0704C15.6134 17.8751 15.6134 17.5585 15.8086 17.3633L21.1718 12.0001Z\" ><\/path>\n\t\t\t\t<\/svg><\/span><\/a>\n\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>\t<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though it\u2019ll probably need to be tweaked every couple of years, it\u2019s one of the best security solutions for those working remotely or globally. It means incorporating a range of security measures based on the premise of Kindervag\u2019s framework\u2014this could be anything from <\/span><span style=\"font-weight: 400;\">adaptive authentication <\/span><span style=\"font-weight: 400;\">and access controls to ways in which you protect your digital assets.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong><a id=\"how\"><\/a>How does zero trust work?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The <\/span><span style=\"font-weight: 400;\">zero trust approach <\/span><span style=\"font-weight: 400;\">is pinned on principles set forward by the <\/span><span style=\"font-weight: 400;\">National Institute of Standards and Technology (<\/span><span style=\"font-weight: 400;\">NIST<\/span><span style=\"font-weight: 400;\">) and includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular and consistent verification: you should always verify access for resources and data across all endpoints, drawing up a strict <\/span><span style=\"font-weight: 400;\">access management <\/span><span style=\"font-weight: 400;\">policy<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Limit the damage done: you should always seek to recover your systems and data as soon as you\u2019ve been breached or attacked<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate data collection: <\/span><span style=\"font-weight: 400;\">automation <\/span><span style=\"font-weight: 400;\">is key for getting information from your team\u2019s IT stack in cases where a breach or security threat has been exposed (you can then work quickly to recover it).<\/span><\/li>\n<\/ul>\n<div class=\"rc-subscribe\" id=\"new-rc-subscribe\"  style=\"background-image:url('\/us\/en\/blog\/wp-content\/themes\/ringcentral\/assets\/images\/temp\/subscribe.png')\">\n\t\t<button class=\"close js-popup-close\"><svg class=\"icon_close_mobile\" width=\"20\" height=\"20\"><use xlink:href=\"#icon_close_mobile\"><\/use><\/svg><\/button><\/p>\n<div class=\"rc-subscribe__wrapper\">\n<div class=\"rc-subscribe__wrapper_text\">\n<h3 class=\"rc-subscribe__title h2\">Stay informed with RingCentral<\/h3>\n<div class=\"rc-subscribe__subtitle\">Subscribe to our emails for the latest blogs, events, and exclusive content on AI-powered communication solutions. Stay ahead with insights and tips from the leader in trusted AI communications.<\/p>\n<p>\t\t\t\t\t<a href=\"https:\/\/www.ringcentral.com\/legal\/privacy-notice.html\" target=\"_blank\" data-dl-name=\"Privacy Notic\" data-dl-element=\"link\" data-dl-additional-info=\"social\" rel=\"noreferrer noopener\">Privacy Notice<\/a>\n\t\t\t\t<\/div>\n<\/p><\/div>\n<div class=\"rc-subscribe__wrapper_form\">\n<form class=\"\" data-event-init=\"true\" novalidate data-js-form>\n<div class=\"rc-subscribe__row\">\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\t\tplaceholder=\"Email address *\"\n\t\t\t\t\t\t\t\ttitle=\"Must be valid email. example@yourdomain.com\"\n\t\t\t\t\t\t\t\tminlength=\"4\"\n\t\t\t\t\t\t\t\tmaxlength=\"255\"\n\t\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tpattern=\"[a-z0-9._%+\\-]+@[a-z0-9.\\-]+\\.[a-z]{2,}$\"\n\t\t\t\t\t\t\t\tclass=\"field__control\"\n\t\t\t\t\t\t\t\tautocomplete=\"on\"\n\t\t\t\t\t\t\t\taria-required=\"true\"\n\t\t\t\t\t\t\t\tdata-dl-events-hover=\"true\"\n\t\t\t\t\t\t\t\tdata-dl-element=\"email\"\n\t\t\t\t\t\t\t\tdata-dl-additional-info=\"LET'S WORK TOGETHER\"\n\t\t\t\t\t\t\t\taria-label=\"Email address *\"\n\t\t\t\t\t\t\t\taria-errormessage=\"email-subscribe-errors\"\n\t\t\t\t\t\t><br \/>\n\t\t\t\t\t\t<span class=\"field__errors\" id=\"email-subscribe-errors\" data-js-form-field-errors><\/span>\n\t\t\t\t\t<\/div>\n<div class=\"rc-subscribe__row\">\n\t\t\t\t\t\t<select\n\t\t\t\t\t\t\t\tname=\"Country__c\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tclass=\"field__control\"\n\t\t\t\t\t\t\t\taria-required=\"true\"\n\t\t\t\t\t\t\t\taria-expanded=\"false\"\n\t\t\t\t\t\t\t\taria-label=\"Country *\"\n\t\t\t\t\t\t\t\taria-errormessage=\"country-subscribe-errors\"\n\t\t\t\t\t\t><option value=\"\" disabled=\"disabled\" selected=\"selected\">Country<\/option><option value=\"Canada\">Canada<\/option><option value=\"United_States\">United States<\/option><\/select><\/p>\n<p>\t\t\t\t\t\t<span class=\"field__errors\" id=\"country-subscribe-errors\" data-js-form-field-errors><\/span>\n\t\t\t\t\t<\/div>\n<div class=\"rc-subscribe__row\">\n\t\t\t\t\t\t<button type=\"submit\" data-event-init=\"true\">Subscribe<\/button>\n\t\t\t\t\t<\/div>\n<\/p><\/form>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"confirm-form\" role=\"status\" aria-live=\"polite\" style=\"display: none;\" aria-hidden=\"true\">\n<div class=\"confirm-form__text\">Thank you for your interest in RingCentral<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><span style=\"font-weight: 400;\">Zero-trust <\/span><span style=\"font-weight: 400;\">security architecture <\/span><span style=\"font-weight: 400;\">hinges explicitly on the idea of \u201ctrust no user\u201d. Unlike traditional <a href=\"https:\/\/networkright.com\/siem-implementation\/\">security information and event management (SIEM)<\/a> systems that trusted the user once they gained access, zero trust models continue to monitor and verify whether a user has specific rights and access to certain controls.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It won\u2019t just allow users to sign in with a \u201csaved password or code\u201d, even if they\u2019ve done so before \u2014 they\u2019ll always have to go through<\/span><span style=\"font-weight: 400;\"> multi-factor authentication <\/span><span style=\"font-weight: 400;\">and various security measures before being granted access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When implementing a zero trust model, a wide range of technologies are used to \u201cproof\u201d your business digitally and protect your ecosystem from online threats. This includes things like authentication, identity verification, <a href=\"https:\/\/www.atera.com\/features\/patch-management\/what-is-patch-management\/\">real-time access<\/a> updates, email security, and the safety of <\/span><span style=\"font-weight: 400;\">endpoints <\/span><span style=\"font-weight: 400;\">before reaching end-users, ensuring a more enjoyable<\/span><span style=\"font-weight: 400;\"> user experience<\/span><span style=\"font-weight: 400;\"> (as the application will be free from security threats).<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/p>\n<div class=\"rc-post-content-cta rc-post-content-cta_green\">\n<div class=\"rc-post-content-cta-columns\">\n<div class=\"bottom-cta-img\">\n\t\t\t\t<img decoding=\"async\" width=\"930\" height=\"700\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/What-is-intelligence-amplification.png\" class=\"responsive-image\" alt=\"\" \/>\t\t\t<\/div>\n<div class=\"bottom-cta-copy\">\n<div class=\"headline-copy\" style=\"text-align:left;\"><strong>What is Intelligence Amplification (IA)?<\/strong><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"rc-post-content-cta-footer\">\n<div class=\"bottom-cta-logo-container\">\n<div class=\"bottom-cta-logo\"><span aria-hidden=\"true\"><svg width=\"154\" height=\"34\" viewBox=\"0 0 154 34\" fill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-logo-887409933\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<title id=\"cta-ring-logo-887409933\">Ring Central Logo<\/title>\t\n\t\t\t\t\t\t\t<path d=\"M154 3.89618H150.386V26.9657H154V3.89618Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M141.313 11.6299C137.976 11.6299 135.388 13.2501 134.95 16.5546H138.504C138.754 15.3082 139.675 14.5591 141.313 14.5591C143.214 14.5591 144.086 15.6499 144.086 17.3647V18.1444H140.438C137.078 18.1444 134.593 19.6411 134.593 22.697C134.593 25.7529 136.619 27.3411 139.55 27.3411C141.826 27.3411 143.323 26.3721 144.133 24.8145H144.288V26.9529H147.716V17.4802C147.702 13.8276 145.833 11.6299 141.313 11.6299ZM140.58 24.5675C139.177 24.5675 138.303 23.8809 138.303 22.7339C138.303 21.4233 139.238 20.7383 140.921 20.7383H144.069L144.086 20.9549C144.088 23.2232 142.777 24.5675 140.58 24.5675Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M128.187 26.9657V19.2047C128.187 16.8979 129.623 15.4317 131.896 15.4317H133.321V12.0036H131.854C130.14 12.0036 128.893 12.6581 128.114 14.1243H127.988V12.0036H124.591V26.9753L128.187 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M122.295 23.6627V26.9657H119.833C116.371 26.9657 114.47 25.3615 114.47 21.8997V14.9729H112.008V12.0036H114.47V8.03009H118.088V12.002H122.295V14.9713H118.088V21.4794C118.088 22.851 118.898 23.6611 120.269 23.6611H122.295V23.6627Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M100.161 26.9657V18.3C100.161 16.1793 101.472 14.7917 103.589 14.7917C105.615 14.7917 106.831 15.9627 106.831 18.2535V26.9657H110.452V17.6776C110.452 13.9046 108.618 11.6299 104.872 11.6299C102.593 11.6299 100.851 12.6565 100.073 14.0586H99.9444V12.0036H96.5548V26.9753L100.161 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M86.8688 24.3814C84.5925 24.3814 83.0638 22.8542 83.0028 20.4528H94.0699L94.0539 19.2833C94.0539 14.2655 90.8119 11.6443 86.8512 11.6443C82.5729 11.6443 79.448 14.7002 79.448 19.4999C79.448 24.2996 82.3483 27.3555 86.8512 27.3555C90.6226 27.3555 93.085 25.3599 93.802 22.4291H90.2986C89.9103 23.5536 88.9559 24.3814 86.8688 24.3814ZM86.8544 14.6377C89.2222 14.6377 90.6258 15.9787 90.7204 17.8492H82.99C83.3317 15.9483 84.4834 14.6377 86.8544 14.6377Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M68.631 27.3732C74.0243 27.3732 77.0802 24.3814 77.7973 19.9395H74.1301C73.5863 21.9655 72.1105 23.836 68.6294 23.836C65.0457 23.836 62.1759 21.3912 62.1759 16.0413C62.1759 10.6914 65.0457 8.2531 68.6294 8.2531C72.2132 8.2531 73.6505 10.1236 74.1301 12.1191H77.7973C77.2037 7.6756 74.1943 4.7865 68.631 4.7865C62.6459 4.7865 58.313 8.96375 58.313 16.0927C58.313 23.2216 62.6459 27.3988 68.631 27.3988V27.3732Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M52.437 12.0036V14.0569H52.2654C51.4553 12.6244 49.7725 11.6282 47.3759 11.6282C43.8676 11.6282 40.7057 14.4034 40.7057 19.2978C40.7057 24.1921 43.8226 26.9978 47.3759 26.9978C49.6827 26.9978 51.043 26.0593 52.0841 24.4712H52.2493V27.625C52.2493 29.3078 51.3141 30.0874 49.7869 30.0874H42.4543V33.3085H49.718C53.7396 33.3085 55.8908 31.0627 55.8908 27.3844V12.0036H52.437ZM48.3689 23.7237C45.9674 23.7237 44.4402 22.2302 44.4402 19.2994C44.4402 16.3685 45.953 14.8719 48.3689 14.8719C50.7061 14.8719 52.2654 16.3653 52.2654 19.2994C52.2654 22.2334 50.7222 23.7237 48.3689 23.7237Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.2125 26.9657V18.3C28.2125 16.1793 29.5231 14.7917 31.6438 14.7917C33.6698 14.7917 34.8858 15.9627 34.8858 18.2535V26.9657H38.5V17.6776C38.5 13.9046 36.6664 11.6299 32.9207 11.6299C30.6444 11.6299 28.8846 12.6565 28.105 14.0586H27.9799V12.0036H24.5967V26.9753L28.2125 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path d=\"M21.5423 12.0036H17.9282V26.9673H21.5423V12.0036Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.6302 16.6477V16.5017C13.8424 15.8905 15.339 14.4051 15.339 11.0684C15.339 7.64031 12.782 5.14423 8.04169 5.14423H0V26.9657H3.73931V18.3H8.29354C10.4143 18.3 11.4746 19.3604 11.4746 21.4811V26.9817H15.2139V21.4811C15.2139 18.3946 13.9033 17.1482 11.6302 16.6477ZM7.84117 14.9329H3.73931V8.51618H7.83956C9.86562 8.51618 11.4233 9.35998 11.4233 11.7277C11.4233 14.0955 9.85119 14.9329 7.84117 14.9329Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.7329 9.60219C20.2077 9.60219 20.6729 9.46262 21.0676 9.19794C21.4638 8.93485 21.7718 8.55948 21.9531 8.11994C22.1359 7.68039 22.1824 7.19754 22.091 6.73233C21.998 6.26552 21.7702 5.83721 21.4333 5.50194C21.0964 5.16506 20.6697 4.93727 20.2029 4.84423C19.7361 4.75119 19.2532 4.79931 18.8153 4.98219C18.3758 5.16506 18.002 5.47306 17.7373 5.86769C17.4742 6.26231 17.333 6.72752 17.3347 7.20235C17.3298 7.67879 17.4694 8.144 17.7325 8.54023C17.9956 8.93646 18.3726 9.24446 18.8137 9.42412C19.1041 9.54604 19.4169 9.6054 19.7329 9.60219Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.9769 0.548269C16.101 0.914019 15.307 1.44981 14.6364 2.12196L16.332 3.81756C16.7764 3.37 17.3041 3.01548 17.8865 2.77325C18.4688 2.53102 19.0928 2.40429 19.7232 2.40269C20.3537 2.40108 20.9777 2.523 21.5616 2.76362C22.1439 3.00264 22.6749 3.35556 23.1225 3.79991L24.8181 2.10431C23.8106 1.1001 22.5289 0.415123 21.1333 0.139206C19.7377 -0.139919 18.2907 0.00285184 16.9769 0.548269Z\" \/>\n\t\t\t\t\t\t<\/svg><\/span><\/div>\n<\/p><\/div>\n<div class=\"bottom-cta-link\">\n\t\t\t\t<a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-intelligence-amplification\/\" class=\"view-all view-all-white \" data-dl-name=\"Read the blog\" data-dl-element=\"button\" data-dl-additional-info=\"bottom cta banner\" data-no-auto-dl=\"true\">Read the blog<span class=\"svg-icon\" aria-hidden=\"true\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" fill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-arrow-887409933\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<title id=\"cta-ring-arrow-887409933\">Ring Central Logo<\/title>\t\n\t\t\t\t\t<path d=\"M0 11.5C0 11.2239 0.223858 11 0.5 11H21.6797C21.9559 11 22.1797 11.2239 22.1797 11.5V12.5C22.1797 12.7761 21.9559 13 21.6797 13H0.5C0.223858 13 0 12.7761 0 12.5V11.5Z\" ><\/path>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M21.1718 12.0001L15.8086 6.63691C15.6134 6.44165 15.6134 6.12506 15.8086 5.9298L16.5157 5.22269C16.711 5.02743 17.0276 5.02743 17.2228 5.22269L23.6467 11.6465C23.8419 11.8418 23.8419 12.1584 23.6467 12.3536L17.2228 18.7775C17.0276 18.9727 16.711 18.9727 16.5157 18.7775L15.8086 18.0704C15.6134 17.8751 15.6134 17.5585 15.8086 17.3633L21.1718 12.0001Z\" ><\/path>\n\t\t\t\t<\/svg><\/span><\/a>\n\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>\t<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The whole premise of \u201ctrust no user\u201d means you\u2019ll need to consistently verify access requests and who can access exactly what, from least-privilege access to the highest levels of authority. To do this successfully, you\u2019ll need<\/span><span style=\"font-weight: 400;\"> real-time <\/span><span style=\"font-weight: 400;\">visibility into user and employee data and their <\/span><span style=\"font-weight: 400;\">access controls,<\/span><span style=\"font-weight: 400;\"> including things like:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Their<\/span><span style=\"font-weight: 400;\"> user identity <\/span><span style=\"font-weight: 400;\">and credentials<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How many privileges and access points are they allowed to dip into?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Their regular network and connection patterns and whether they use a VPN (if you notice an abrupt change, this could be the sign of <\/span><span style=\"font-weight: 400;\">data breaches <\/span><span style=\"font-weight: 400;\">or hacking, so take action first)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Their geolocation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The security of each of your (and your employees) verification protocols. (Is their device up to date?)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The types of business applications they have on their device<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Any suspicious activity that goes against normal behaviors or routines<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As well as routinely assessing your users and employees, you should also be checking up on your overall infrastructure from time to time. This will help you identify any gaps in security or attack surfaces where a breach is possible. As soon as you\u2019ve noticed these things, work fast to patch them up to prevent a <\/span><span style=\"font-weight: 400;\">cyberattack<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong><a id=\"benefits\"><\/a>Benefits of using a zero trust security model<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Following a zero trust model and implementing <\/span><span style=\"font-weight: 400;\">security policies<\/span><span style=\"font-weight: 400;\"> is a simple way to protect your business from digital threats, as well as control workloads in your<\/span><span style=\"font-weight: 400;\"> data center. <\/span><span style=\"font-weight: 400;\">This is especially important if your business has many<\/span> <span style=\"font-weight: 400;\">different <\/span><span style=\"font-weight: 400;\">cloud environments<\/span><span style=\"font-weight: 400;\">, as it can sometimes be difficult to keep track of and manage everyone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advantageous for businesses both big and small, we\u2019ve listed some of the most notable benefits of using a zero trust security model.<\/span><\/p>\n<h3><strong>1. Cuts down on risk and secures your business<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Since the whole idea of the zero trust model is founded on the idea of \u201cyou can\u2019t trust any user\u201d, it automatically assumes that apps and people accessing those apps can\u2019t be trusted (at least not until they\u2019re been verified for user access). Most often, businesses and corporate networks implement this idea into their systems through authentications, <\/span><span style=\"font-weight: 400;\">firewalls<\/span><span style=\"font-weight: 400;\">, and strict access controls.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s a no-brainer, but all this focus on consistent verification and \u201czero trust\u201d greatly reduces risk within your business. No one will be allowed access unless they meet the given requirements, giving you greater control over your network. All assets are vetted and checked, helping you create baselines and reduce the chance of giving too many people access to the same app.<\/span><\/p>\n<h3><strong>2. Provides greater visibility in remote and cloud environments<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">While remote and hybrid work brings many benefits, there\u2019s always the struggle of \u201cvisibility\u201d.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But why?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Managers and senior leaders often find themselves in a position where they\u2019ve got to play \u201ccatch-up\u201d with employees, chase after them, and remind them of what tasks they\u2019re doing. With everything in the cloud, sometimes things can get a little messy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Luckily, a zero trust security model gives you greater visibility in these environments, thanks to the verification process. Access to apps and projects is only ever given to employees once they\u2019ve been verified, making it easier for you to track tasks and <\/span><i><span style=\"font-weight: 400;\">which <\/span><\/i><span style=\"font-weight: 400;\">team members are working on <\/span><i><span style=\"font-weight: 400;\">what<\/span><\/i><span style=\"font-weight: 400;\">. Even if the environment changes (for example, the employee starts to work in a coffee shop) all the access controls will stay the same.<\/span><\/p>\n<h3><strong>3. Prevents data breaches<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">In theory, it might seem harsh. The whole idea of \u201csee everyone and everything as a threat\u201d isn\u2019t exactly trusting of your employees, but it\u2019s the only way you\u2019re going to weed out and prevent hackers from breaching your network.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, you know you trust your team, but on the off-chance that someone outside the system does get through, assuming this stance of \u201ctrust no one\u201d will actually work in your favor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Why is this?<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Since adequate verification and controls are required to access anything (and this is continuously updated) an attacker won\u2019t be able to penetrate your network even if they tried.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your system will keep kicking them out (since they can\u2019t be trusted or verified) so they won\u2019t be able to steal any of your data or sensitive company information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The structure of the zero trust model is also built on one single and secure <\/span><span style=\"font-weight: 400;\">segmentation<\/span><span style=\"font-weight: 400;\">, meaning no <\/span><span style=\"font-weight: 400;\">lateral movement<\/span><span style=\"font-weight: 400;\"> can take place by the attacker.<\/span><\/li>\n<\/ul>\n<h3 class=\"heading h3\"><strong>4. Complies with privacy initiatives\u00a0<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">As well as giving your cybersecurity a boost, implementing a zero trust security model into your business will naturally keep you in line with standard compliance and privacy initiatives. You\u2019re already following the NIST guidelines, so you\u2019ll automatically comply with most standards and regulations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not only does this mean you\u2019ll have fewer \u201cbreaches of privacy initiatives\u201d in audits, but you\u2019ll also be able to develop network perimeters around specific types of data, particularly those holding extra-sensitive information. Even if some kind of security breach does take place, your zero trust model will give you greater visibility on areas that need to be patched up and repaired.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong><a id=\"implement\"><\/a>How to implement a zero trust security model into your business<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Implementing a zero trust security model will take a bit of time, but it\u2019s well worth it. Although you can follow zero trust solution frameworks, you have to remember that your business is unique and has different needs and features than other businesses \u2014 so, make sure you adapt to it accordingly. Here\u2019s how:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One of the first things you\u2019ll need to do is think about all the <\/span><span style=\"font-weight: 400;\">trust principles<\/span><span style=\"font-weight: 400;\"> you want to implement. What resources, endpoints, and apps need to be protected? What needs strict<\/span><span style=\"font-weight: 400;\"> security access<\/span><span style=\"font-weight: 400;\">?\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Once you\u2019ve figured this out, draft up a plan on how you\u2019re going to verify the identity of each of your users and team members. And remember, everything has to be done on a single part of<\/span><span style=\"font-weight: 400;\"> network segmentation<\/span><span style=\"font-weight: 400;\"> \u2014 this ensures that all access controls stay the same, even if the environment changes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The next stage of developing your<\/span><span style=\"font-weight: 400;\"> zero trust strategy <\/span><span style=\"font-weight: 400;\">i<\/span><span style=\"font-weight: 400;\">nvolves looking at your entire system\u2019s infrastructure as a whole. As well as setting up security measures like firewalls and verification protocols, you want to make sure you don\u2019t have any missing \u201csecurity gaps\u201d in your network. If you spot any that can easily be breached, patch them up ASAP. The only way you\u2019ll be able to mitigate risks and limit the damage done (if an attacker gains entry to your system) is by identifying your weak spots and taking action. You\u2019ll then want to extend all your security protocols and measures across all endpoints.<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Security has always been top-of-the-list for businesses across the world, but the digital transformation that\u2019s happened over the past few years has really shifted the way we view our network security.\u00a0 This is particularly true of the shift to remote work, where employees can work from anywhere\u2014on any device and any connection. All the data &#8230;<\/p>\n","protected":false},"author":29,"featured_media":51279,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23732],"tags":[],"class_list":["post-51278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is zero trust security? | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"Security has always been top-of-the-list for businesses across the world, but the digital transformation that\u2019s happened over the past few years has\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-zero-trust-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is zero trust security?\" \/>\n<meta property=\"og:description\" content=\"Security has always been top-of-the-list for businesses across the world, but the digital transformation that\u2019s happened over the past few years has\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-zero-trust-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-08T16:49:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-02T23:37:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/what-is-zero-trust-security\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"What is zero trust security?\",\"datePublished\":\"2022-03-08T16:49:57+00:00\",\"dateModified\":\"2025-02-02T23:37:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/what-is-zero-trust-security\/\"},\"wordCount\":1832,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/what-is-zero-trust-security\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/\",\"name\":\"What is zero trust security? | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png\",\"datePublished\":\"2022-03-08T16:49:57+00:00\",\"dateModified\":\"2025-02-02T23:37:57+00:00\",\"description\":\"Security has always been top-of-the-list for businesses across the world, but the digital transformation that\u2019s happened over the past few years has\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png\",\"width\":930,\"height\":700,\"caption\":\"Illustration of computer monitor with shield icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is zero trust security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is zero trust security? | RingCentral Blog","description":"Security has always been top-of-the-list for businesses across the world, but the digital transformation that\u2019s happened over the past few years has","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-zero-trust-security\/","og_locale":"en_US","og_type":"article","og_title":"What is zero trust security?","og_description":"Security has always been top-of-the-list for businesses across the world, but the digital transformation that\u2019s happened over the past few years has","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-zero-trust-security\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2022-03-08T16:49:57+00:00","article_modified_time":"2025-02-02T23:37:57+00:00","og_image":[{"width":930,"height":700,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png","type":"image\/png"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#article","isPartOf":{"@id":"\/us\/en\/blog\/what-is-zero-trust-security\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"What is zero trust security?","datePublished":"2022-03-08T16:49:57+00:00","dateModified":"2025-02-02T23:37:57+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/what-is-zero-trust-security\/"},"wordCount":1832,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/what-is-zero-trust-security\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/","name":"What is zero trust security? | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png","datePublished":"2022-03-08T16:49:57+00:00","dateModified":"2025-02-02T23:37:57+00:00","description":"Security has always been top-of-the-list for businesses across the world, but the digital transformation that\u2019s happened over the past few years has","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png","width":930,"height":700,"caption":"Illustration of computer monitor with shield icon"},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-zero-trust-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"What is zero trust security?"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/Zero-trust-security.png","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/security\/amp\">Security<\/a>","amp_link":"\/us\/en\/blog\/what-is-zero-trust-security\/amp","excerpt_title":"What is zero trust security?","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/51278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=51278"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/51278\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/51279"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=51278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=51278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=51278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}