{"id":30878,"date":"2022-02-16T14:10:48","date_gmt":"2022-02-16T13:10:48","guid":{"rendered":"https:\/\/globeteam.iternumstaging.dk\/security\/zero-trust\/"},"modified":"2025-06-25T10:55:53","modified_gmt":"2025-06-25T08:55:53","slug":"zero-trust","status":"publish","type":"page","link":"https:\/\/globeteam.com\/en\/security\/zero-trust\/","title":{"rendered":"Zero Trust"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"30878\" class=\"elementor elementor-30878 elementor-13776\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-dce-background-color=\"rgba(246,246,246,0)\" data-dce-background-overlay-color=\"#000000\" data-dce-background-image-url=\"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/04\/Zero-Trust.jpg\" class=\"elementor-section elementor-top-section elementor-element elementor-element-f39d51a elementor-section-content-middle elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"f39d51a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-07d055a\" data-id=\"07d055a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1bf423d elementor-widget__width-auto elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1bf423d\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-title-color=\"#FFFFFF\" class=\"elementor-element elementor-element-4038d6b elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"4038d6b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Globeteam<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-title-color=\"#FFFFFF\" class=\"elementor-element elementor-element-cc08152 elementor-widget elementor-widget-heading\" data-id=\"cc08152\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Zero Trust \u2013 a new approach to IT security <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2f6e8b4\" data-id=\"2f6e8b4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2e8e499 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e8e499\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-06f26a0\" data-id=\"06f26a0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26bc9e1 elementor-widget elementor-widget-image\" data-id=\"26bc9e1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/globeteam.com\/wp-content\/uploads\/elementor\/thumbs\/Peder-600x400-1-qo8gdumasmw1jsjn4o4xlyq182cxfb634zxz2s0n9s.jpg\" title=\"Peder-600&#215;400\" alt=\"Peder Lind S\u00f8rensen - Globeteam\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#FFFFFF\" class=\"elementor-element elementor-element-bfa1793 elementor-widget elementor-widget-text-editor\" data-id=\"bfa1793\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Feel free to contact med if you want to hear more<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#FFFFFF\" class=\"elementor-element elementor-element-fd9550c elementor-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"fd9550c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Peder Lind S\u00f8rensen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">pls@globeteam.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+45 3074 7474<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6fe12860 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6fe12860\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ae88227\" data-id=\"3ae88227\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65b1062c elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-breadcrumbs\" data-id=\"65b1062c\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/globeteam.com\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-dce-background-color=\"#FFFFFF\" class=\"elementor-section elementor-top-section elementor-element elementor-element-d53cca1 sektion-ektra-tablet-itm elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d53cca1\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27d4345\" data-id=\"27d4345\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-30e51a5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"30e51a5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2a97104\" data-id=\"2a97104\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6edd40e elementor-widget__width-auto elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6edd40e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d1b6a7 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"7d1b6a7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">zero trust<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-636e48e elementor-widget elementor-widget-heading\" data-id=\"636e48e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A\u202fZero Trust architecture moves the focus away from perimeter security to dynamic protection of users, assets and resources  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd25fba elementor-widget elementor-widget-text-editor\" data-id=\"cd25fba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Companies should not have blind faith in user enquiries based on network connections or physical location. They should instead act as an IT security secret agent \u2013 trust no one, suspect everyone. The Zero Trust concept is gaining traction across the world because it is a security architecture that suits our time. With more and more mobile employees and hybrid workplaces, we need a security paradigm that can handle the increased flexibility of today\u2019s work life.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The traditional, static perimeter principle built around a physical ring wall is antiquated. Modern work life calls for a new security paradigm suited to today\u2019s flexible work and different user preferences of working anytime and anywhere. Maximum user freedom under maximum company control is in fact the basis of the Zero Trust security architecture that was developed by the American organisation National Institute of Standards and Technology (NIST).\u202f\u202f<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-dce-background-color=\"#FFFFFF\" class=\"elementor-section elementor-top-section elementor-element elementor-element-fff661c sektion-ektra-tablet-itm elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fff661c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-492513d\" data-id=\"492513d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fa5c0dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fa5c0dd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c580f6c\" data-id=\"c580f6c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1eb2974 elementor-widget__width-auto elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1eb2974\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6599fdf elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"6599fdf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">zero trust<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a911786 elementor-widget elementor-widget-heading\" data-id=\"a911786\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is Zero Trust? \n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17f74d3 elementor-widget elementor-widget-text-editor\" data-id=\"17f74d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The Zero Trust concept is a set of coherent security principles that continuously control the users and the devices that are trying to access company data. Access in the Zero Trust environment is not just granted based on one condition, such as network location, but is continuously evaluated along with different elements, the most important of which are identity, access wanted, device used, and where the data is stored.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:150}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Modern companies should support cross-sectional and limitless data exchange. But the data ex<span class=\"NormalTextRun SCXW139186690 BCX0\">change should be monitored every second so that hackers are not let <\/span><span class=\"NormalTextRun SCXW139186690 BCX0\">in,<\/span><span class=\"NormalTextRun SCXW139186690 BCX0\"> and value<\/span><span class=\"NormalTextRun SCXW139186690 BCX0\">d<\/span><span class=\"NormalTextRun SCXW139186690 BCX0\"> information is not let out.\u00a0<\/span><span class=\"NormalTextRun SCXW139186690 BCX0\">\u00a0<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-dce-background-color=\"#FFFFFF\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2dccc56 sektion-ektra-tablet-itm elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2dccc56\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ddbf696\" data-id=\"ddbf696\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4febf9a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4febf9a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2be0644\" data-id=\"2be0644\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c08aa94 elementor-widget elementor-widget-heading\" data-id=\"c08aa94\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Coherent security principles in the Zero Trust concept <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3a2a8d elementor-widget elementor-widget-text-editor\" data-id=\"f3a2a8d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW166856971 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW166856971 BCX0\">The coherent security principles in the concept are based on several pillars:<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e7aba5 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5e7aba5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Identity and Access Management (IAM)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fcdb55d elementor-widget elementor-widget-text-editor\" data-id=\"fcdb55d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW105911258 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105911258 BCX0\">Zero Trust based<\/span><span class=\"NormalTextRun SCXW105911258 BCX0\"> Identity and Access Management <\/span><span class=\"NormalTextRun SCXW105911258 BCX0\">is about monitoring which users have access to which systems, application<\/span><span class=\"NormalTextRun SCXW105911258 BCX0\">s<\/span><span class=\"NormalTextRun SCXW105911258 BCX0\">, resources and data. It is not a static picture, but a dynamic function of identity, time, place and device in the <\/span><span class=\"NormalTextRun SCXW105911258 BCX0\">Zero Trust<\/span><span class=\"NormalTextRun SCXW105911258 BCX0\"> architecture.\u00a0<\/span><\/span><span class=\"EOP SCXW105911258 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:150}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe6262d elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"fe6262d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Endpoint Security<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54256b1 elementor-widget elementor-widget-text-editor\" data-id=\"54256b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW262356511 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW262356511 BCX0\">Endpoint <\/span><span class=\"NormalTextRun SCXW262356511 BCX0\">s<\/span><span class=\"NormalTextRun SCXW262356511 BCX0\">ecurity in the <\/span><span class=\"NormalTextRun SCXW262356511 BCX0\">Zero Trust<\/span><span class=\"NormalTextRun SCXW262356511 BCX0\"> architecture provides the opportunity to define several parameters that make the interface between company data and devices more secure. For example, mobile devices that are no longer supported should not have access to data and systems.<\/span><\/span><span class=\"EOP SCXW262356511 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:150}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad6c097 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"ad6c097\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>D<span class=\"TextRun  BCX0 SCXW150910147\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun  BCX0 SCXW150910147\" data-ccp-parastyle=\"heading 4\">ata\u202fand Information\u202fProtection<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92e2806 elementor-widget elementor-widget-text-editor\" data-id=\"92e2806\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW239235958 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW239235958 BCX0\">The Zero Trust <\/span><span class=\"NormalTextRun SCXW239235958 BCX0\">element<\/span><span class=\"NormalTextRun SCXW239235958 BCX0\">s that involve data and information security can be boiled down to four steps and supported with specific tools, so that companies can keep a close eye on how business data is generated and shared across users, devices and systems<\/span><span class=\"NormalTextRun SCXW239235958 BCX0\">.<\/span><\/span><span class=\"EOP SCXW239235958 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:150}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-452315a sektion-ektra-tablet-itm elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"452315a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div data-dce-background-image-url=\"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/01\/Sikkerheds-konsulenter....jpg\" class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d32ba6d\" data-id=\"d32ba6d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4676cfb elementor-widget elementor-widget-spacer\" data-id=\"4676cfb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1cbfb02\" data-id=\"1cbfb02\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4a04662 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a04662\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4ea0b03\" data-id=\"4ea0b03\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f9c9f5f elementor-widget__width-auto elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f9c9f5f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7321c2 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"a7321c2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">zero trust<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-title-color=\"#303030\" class=\"elementor-element elementor-element-f5fdc55 elementor-widget elementor-widget-heading\" data-id=\"f5fdc55\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A pragmatic approach to the security paradigm\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-advanced-background-color=\"#02010100\" class=\"elementor-element elementor-element-4a69023 elementor-widget elementor-widget-text-editor\" data-id=\"4a69023\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">At Globeteam, we implement the Zero Trust principles that, based on different considerations, make the most sense to the individual company. Often, we can get far with the solutions that already exist just by changing the settings.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Our pragmatic approach to the security paradigm follows the same logic as Globeteam\u2019s other services within cyber security. We stay away from promises to fix everything just by implementing new products or new processes. We start in the corner of the business where security takes up the most space and then we slowly work from there.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p><p><a href=\"https:\/\/globeteam.com\/en\/security\/\">Read more about our different security solutions and services<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Globeteam Zero Trust \u2013 a new approach to IT security Feel free to contact med if you want to hear more Peder Lind S\u00f8rensen pls@globeteam.com +45 3074 7474 zero trust A\u202fZero Trust architecture moves the focus away from perimeter security to dynamic protection of users, assets and resources Companies should not have blind faith in [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":22096,"parent":25693,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-30878","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust \u2013 a new comprehensive approach to IT security<\/title>\n<meta name=\"description\" content=\"The Zero Trust security paradigm is perfectly suited for handling the increased flexibility of today\u2019s work life with more mobile employees\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/globeteam.com\/en\/security\/zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust \u2013 a new comprehensive approach to IT security\" \/>\n<meta property=\"og:description\" content=\"The Zero Trust security paradigm is perfectly suited for handling the increased flexibility of today\u2019s work life with more mobile employees\" \/>\n<meta property=\"og:url\" content=\"https:\/\/globeteam.com\/en\/security\/zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Globeteam\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/globeteamkonsulenthus\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T08:55:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/Zero-Trust.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/globeteam.com\/en\/security\/zero-trust\/\",\"url\":\"https:\/\/globeteam.com\/en\/security\/zero-trust\/\",\"name\":\"Zero Trust \u2013 a new comprehensive approach to IT security\",\"isPartOf\":{\"@id\":\"https:\/\/globeteam.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/globeteam.com\/en\/security\/zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/globeteam.com\/en\/security\/zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/Zero-Trust.jpg\",\"datePublished\":\"2022-02-16T13:10:48+00:00\",\"dateModified\":\"2025-06-25T08:55:53+00:00\",\"description\":\"The Zero Trust security paradigm is perfectly suited for handling the increased flexibility of today\u2019s work life with more mobile employees\",\"breadcrumb\":{\"@id\":\"https:\/\/globeteam.com\/en\/security\/zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/globeteam.com\/en\/security\/zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/globeteam.com\/en\/security\/zero-trust\/#primaryimage\",\"url\":\"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/Zero-Trust.jpg\",\"contentUrl\":\"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/Zero-Trust.jpg\",\"width\":1280,\"height\":720,\"caption\":\"Globeteam can help you implement the Zero Trust principles\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/globeteam.com\/en\/security\/zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/globeteam.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/globeteam.com\/en\/sikkerhed\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/globeteam.com\/en\/#website\",\"url\":\"https:\/\/globeteam.com\/en\/\",\"name\":\"Globeteam\",\"description\":\"Globeteam - vi hj\u00e6lper med at optimere din forretning og it\",\"publisher\":{\"@id\":\"https:\/\/globeteam.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/globeteam.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/globeteam.com\/en\/#organization\",\"name\":\"Globeteam\",\"url\":\"https:\/\/globeteam.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/globeteam.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/globeteam_logo_black-1.jpg\",\"contentUrl\":\"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/globeteam_logo_black-1.jpg\",\"width\":825,\"height\":184,\"caption\":\"Globeteam\"},\"image\":{\"@id\":\"https:\/\/globeteam.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/globeteamkonsulenthus\/\",\"https:\/\/www.instagram.com\/accounts\/login\/?next=\/globeteam_as\/\",\"https:\/\/www.linkedin.com\/company\/globeteam\",\"https:\/\/www.youtube.com\/channel\/UCEKOaiJItBRm-TXB6pzT5gQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust \u2013 a new comprehensive approach to IT security","description":"The Zero Trust security paradigm is perfectly suited for handling the increased flexibility of today\u2019s work life with more mobile employees","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/globeteam.com\/en\/security\/zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust \u2013 a new comprehensive approach to IT security","og_description":"The Zero Trust security paradigm is perfectly suited for handling the increased flexibility of today\u2019s work life with more mobile employees","og_url":"https:\/\/globeteam.com\/en\/security\/zero-trust\/","og_site_name":"Globeteam","article_publisher":"https:\/\/www.facebook.com\/globeteamkonsulenthus\/","article_modified_time":"2025-06-25T08:55:53+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/Zero-Trust.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/globeteam.com\/en\/security\/zero-trust\/","url":"https:\/\/globeteam.com\/en\/security\/zero-trust\/","name":"Zero Trust \u2013 a new comprehensive approach to IT security","isPartOf":{"@id":"https:\/\/globeteam.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/globeteam.com\/en\/security\/zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/globeteam.com\/en\/security\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/Zero-Trust.jpg","datePublished":"2022-02-16T13:10:48+00:00","dateModified":"2025-06-25T08:55:53+00:00","description":"The Zero Trust security paradigm is perfectly suited for handling the increased flexibility of today\u2019s work life with more mobile employees","breadcrumb":{"@id":"https:\/\/globeteam.com\/en\/security\/zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/globeteam.com\/en\/security\/zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/globeteam.com\/en\/security\/zero-trust\/#primaryimage","url":"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/Zero-Trust.jpg","contentUrl":"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/Zero-Trust.jpg","width":1280,"height":720,"caption":"Globeteam can help you implement the Zero Trust principles"},{"@type":"BreadcrumbList","@id":"https:\/\/globeteam.com\/en\/security\/zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/globeteam.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/globeteam.com\/en\/sikkerhed\/"},{"@type":"ListItem","position":3,"name":"Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/globeteam.com\/en\/#website","url":"https:\/\/globeteam.com\/en\/","name":"Globeteam","description":"Globeteam - vi hj\u00e6lper med at optimere din forretning og it","publisher":{"@id":"https:\/\/globeteam.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/globeteam.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/globeteam.com\/en\/#organization","name":"Globeteam","url":"https:\/\/globeteam.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/globeteam.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/globeteam_logo_black-1.jpg","contentUrl":"https:\/\/globeteam.com\/wp-content\/uploads\/2022\/02\/globeteam_logo_black-1.jpg","width":825,"height":184,"caption":"Globeteam"},"image":{"@id":"https:\/\/globeteam.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/globeteamkonsulenthus\/","https:\/\/www.instagram.com\/accounts\/login\/?next=\/globeteam_as\/","https:\/\/www.linkedin.com\/company\/globeteam","https:\/\/www.youtube.com\/channel\/UCEKOaiJItBRm-TXB6pzT5gQ"]}]}},"_links":{"self":[{"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/pages\/30878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/comments?post=30878"}],"version-history":[{"count":1,"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/pages\/30878\/revisions"}],"predecessor-version":[{"id":89138,"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/pages\/30878\/revisions\/89138"}],"up":[{"embeddable":true,"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/pages\/25693"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/media\/22096"}],"wp:attachment":[{"href":"https:\/\/globeteam.com\/en\/wp-json\/wp\/v2\/media?parent=30878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}