{"id":27927,"date":"2024-06-18T12:00:48","date_gmt":"2024-06-18T16:00:48","guid":{"rendered":"https:\/\/netfoundry.io\/?p=27927"},"modified":"2024-09-17T22:08:23","modified_gmt":"2024-09-18T02:08:23","slug":"zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/","title":{"rendered":"Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-zero-trust-solutions-and-vendors\">Zero Trust Solutions and Vendors<\/h3>\n\n\n\n<p>\u201cZero trust\u201d is often a long, tough journey.&nbsp; But it doesn\u2019t need to be.&nbsp; And the answer is actually simple once we separate reality from the marketing fluff from many zero trust vendors. Everyone claims to have a zero trust solution including the top security vendors like <a href=\"https:\/\/www.cisco.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Palo Alto Networks<\/a>, <a href=\"https:\/\/www.zscaler.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zscaler<\/a>, <a href=\"https:\/\/www.crowdstrike.com\/en-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">CrowdStrike<\/a>, and <a href=\"https:\/\/www.okta.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Okta<\/a>. This article is an overview of zero trust and an example from a major new player in secure networking and the leading open source zero trust platform provider NetFoundry.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-zero-trust-overview\">Zero Trust Overview<\/h3>\n\n\n\n<p>Let\u2019s start with the problem.&nbsp; There are two main reasons why <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero_trust_security_model\" target=\"_blank\" rel=\"noreferrer noopener\">\u201czero trust\u201d<\/a> is difficult:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Most \u201czero trust\u201d solutions are not zero trust. Ironically, they trust the Internet! Trusting the Internet causes complexity and other problems.<br><br><\/li>\n\n\n\n<li>Most \u201czero trust\u201d solutions are too broad and disruptive. They impact entire user groups or sites, backhaul everything, cause performance problems, and disrupt the WAN and firewalls. They are too broad to be effective for specific use cases such as private data center-hosted apps, third-party access, multi-cloud, IoT, APIs, and remote management.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p>NetFoundry\u2019s Ziti&nbsp; platform helps businesses simplify the journey by taking the opposite approach of the industry\u2019s \u201czero trust solutions\u201d:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>NetFoundry does not trust the Internet.&nbsp; No open inbound ports.&nbsp; No firewall hole punching.&nbsp; No reliance on IP addresses or public DNS.&nbsp; You can choose to use federated IDPS and MFA, but you are not forced to \u2013 you use it when you decide it is appropriate.&nbsp; You don\u2019t even need to trust NetFoundry itself \u2013 it is built on open source <a href=\"https:\/\/landing.openziti.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">OpenZiti<\/a> \u2013 you don\u2019t need to trust the label on the tin, or hope the black box does what it says it does.<br><br><\/li>\n\n\n\n<li>NetFoundry enables you to choose your path and makes it so your paths are not disruptive.&nbsp; Move at any level, even individual apps, such that business priorities determine the journey.&nbsp; Every app is routed independently \u2013 no performance-impacting backhaul tunnels.&nbsp; Add use cases without disrupting existing networks or firewalls.&nbsp; And, because NetFoundry covers use cases like APIs, remote management, IoT, private DC apps, and 3rd party access, you don\u2019t need to cobble together an assortment of different solutions.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p>Let\u2019s take a more detailed look at how NetFoundry differs from the top zero trust vendors:<\/p>\n\n\n\n<p><strong>NetFoundry principle #1: <\/strong><br><strong>Don\u2019t trust the Internet = simpler secure networking<\/strong><\/p>\n\n\n\n<p>Unlike \u201czero trust\u201d approaches, NetFoundry\u2019s NetFoundry service enables you to not trust the Internet, at all (read the \u201cgreat zero trust lie\u201d appendix to see how solutions marketed as \u201czero trust\u201d actually trust the Internet).&nbsp; What does it mean to not trust the Internet?<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>No open inbound firewall ports in front of your servers.&nbsp; Not 443.&nbsp; Not 80.&nbsp; No ACLs or hole-punching schemes.&nbsp; No pseudo-random ports.&nbsp; Nothing.<br><br><\/li>\n\n\n\n<li>Your servers are no longer exposed to the Internet, but your users consume your service from the Internet or whatever network they are on.<br><br><\/li>\n\n\n\n<li>With NetFoundry, each app session is authorized before it is allowed to connect on the overlay network \u2013 the \u2018firewall\u2019 moves to the origin of the app session.<br><br><\/li>\n\n\n\n<li>Authorization is based on strong identities (cryptographically verified certificates), rather than IP addresses, and attribute-based access.<br><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>This distrust of the Internet is enabled by the private Ziti overlay network fabrics (self-hosted in the OpenZiti open source option, or hosted by NetFoundry or NetFoundry partners in the NetFoundry option).&nbsp; Authorized endpoints open outbound sessions to the private overlay network fabric; the fabric merges the sessions.<\/p>\n\n\n\n<p><strong>NetFoundry principle #2: <\/strong><br><strong>The app is the new edge = simpler secure networking<\/strong><\/p>\n\n\n\n<p>NetFoundry endpoints treat the app as the new <a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/netfoundry-edge\/\">edge<\/a>.&nbsp; What in the world does that mean?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Direct routing.&nbsp; Each app is routed independently and directly, from its source.&nbsp; For example, a user may be using some apps or APIs in which the servers are in a nearby private data center or edge site.&nbsp; Rather than first backhauling those apps or APIs to somewhere else, the NetFoundry endpoints will route those sessions directly.&nbsp; Meanwhile, other apps and APIs are also routed directly to other sites, according to your policies (such as latency minimization, geofencing, and interface costs).<br><br><\/li>\n\n\n\n<li>Your policies are in control. Not all apps need to be routed over NetFoundry. If your policy states that Netflix or YouTube should go directly to your Internet gateway, proxy, or CASB, then the NetFoundry endpoint will follow that policy.<br><br><\/li>\n\n\n\n<li>Your business priorities determine your path. You have full control of your zero trust path. For example, start with one app, a certain user group, specific sites, a time-sensitive use case\u2026or some combination. It is up to you, and the rest of your users or apps will be unaffected.<br><br><\/li>\n\n\n\n<li>No network disruption. NetFoundry forms app-specific, microsegmented zero trust overlays. This means you run it over any WAN or Internet, without disruption. NetFoundry has endpoints in each major cloud marketplace. Spin them up in minutes using your existing DevOps and cloud orchestration tools.<br><br><\/li>\n\n\n\n<li>No firewall disruption. Since NetFoundry doesn\u2019t require any open inbound ports, your firewalls are also not disrupted.<br><br><\/li>\n\n\n\n<li>Every use case. NetFoundry endpoints go anywhere \u2013 even inside your apps or APIs, as code (agentless). You can also use host-based agents and virtualized\/containerized gateways. NetFoundry endpoints serve every use case including APIs, IoT, multi-cloud, remote management, and 3rd party access. This means you avoid piling up different solutions for different use cases.<br>&nbsp;<\/li>\n\n\n\n<li>Combine cybersecurity and network. NetFoundry covers both sides, like an SD-WAN that is natively secure or a cybersecurity solution with an embedded overlay network.<\/li>\n<\/ul>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-comparing-the-top-zero-trust-vendors\">Comparing the Top Zero Trust Vendors<\/h3>\n\n\n\n<p>The primary differences between Cisco, Palo Alto Networks, Zscaler, CrowdStrike, Okta, and NetFoundry lie in their core focuses and approaches:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cisco<\/strong>: Focuses on comprehensive security solutions for network, endpoint, and cloud security, emphasizing advanced threat protection and scalability\u200b\u200b\u200b\u200b.<br><br><\/li>\n\n\n\n<li><strong>Palo Alto Networks<\/strong>: Known for its next-generation firewall technology and cloud security solutions, with a strong emphasis on real-time threat detection and a user-friendly interface\u200b.<br><br><\/li>\n\n\n\n<li><strong>Zscaler<\/strong>: Specializes in cloud-native Zero Trust Network Access (ZTNA) solutions, providing secure web gateways and replacing traditional VPNs with a least-privileged access model\u200b\u200b.<br><br><\/li>\n\n\n\n<li><strong>CrowdStrike<\/strong>: Renowned for its endpoint security expertise, leveraging a cloud-native architecture and behavioral analytics for real-time threat detection\u200b\u200b.<br><br><\/li>\n\n\n\n<li><strong>Okta<\/strong>: Focuses on identity-centric security, offering Single Sign-On (SSO) and adaptive authentication to streamline user access management\u200b\u200b.<br><br><\/li>\n\n\n\n<li><strong>NetFoundry<\/strong>: Distinctly emphasizes Zero Trust Networking through its platform, which avoids trusting the internet by eliminating open inbound ports, using cryptographically verified identities, and providing flexible, app-specific microsegmentation without disrupting existing networks or firewalls\u200b\u200b. It also is the only vendor that enables companies to embed zero trust networking in their applications, eliminating the need to rely on perimeter security.<br><br><\/li>\n<\/ol>\n\n\n\n<p>In summary, while Cisco, Palo Alto Networks, Zscaler, CrowdStrike, and Okta provide comprehensive and specialized security solutions across different aspects of network and cloud security.&nbsp; NetFoundry uniquely focuses on Zero Trust Networking with a strong emphasis on flexibility, software-defined overlays, embedding, and the management of secure connectivity.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-appendix-the-great-zero-trust-lie\">Appendix: the great &#8220;zero trust&#8221; lie<\/h3>\n\n\n\n<p>Most \u201czero trust\u201d implementations authorize everyone, even if they appear to be on a certain LAN or WAN. This is sensible\u2014very sensible. IDPS, MFA, biometrics, certificates, and hardware root of trust help.<\/p>\n\n\n\n<p>But the problem is not just the robustness of the authorization step.&nbsp; The problem is when the authorization takes place.&nbsp; In most \u201czero trust\u201d, the auth still takes place after the network connection (layer 3) \u2013 the ports in front of the server are still open.<br><em>This also serves as an excellent litmus test to cut through vendor hype: if your team can\u2019t use a deny-all inbound policy on your firewalls, without any ACL exceptions, then the vendor\u2019s \u201czero trust\u201d solution actually trusts the Internet.<\/em><\/p>\n\n\n\n<p>So, ironically, despite the \u201czero trust\u201d moniker, the web or app server is still initially allowing (trusting) the layer 3 Internet connection, and then trying to weed out the unauthorized users.&nbsp; Of course, silly marketing terms aside, we do need to trust something.&nbsp; But in \u201czero trust\u201d, we are implicitly trusting the layer 3 connection from the Internet!&nbsp; The result is these \u201czero trust\u201d approaches are akin to letting 200,000 fans into a stadium for a World Cup soccer match, and then trying to figure out who has tickets.&nbsp; Except it is billions of fans (users, attackers, bots).&nbsp; And it is a stadium (your network) with virtually unlimited seats.&nbsp; And the \u201cfans\u201d move at the speed of light, literally.<\/p>\n\n\n\n<p>Despite the dangers of that authorize-after-connect model, the attacker will most likely be denied once it fails to authorize \u2013 the initial connection will be torn down.&nbsp; Unfortunately, bugs, business logic gaps, misconfigurations, and vulnerabilities enable attackers to essentially bypass this public auth gate.&nbsp; This means anyone or anything on the Internet can be an attacker since everyone is allowed to connect before they are made to authorize.&nbsp; And that\u2019s why the improvements that most \u201czero trust\u201d solutions make on authorization are helpful but not sufficient \u2013 the authorization takes place after the initial network connection is made \u2013 too late in some cases.&nbsp; Hence, global cyber attack damage is now over $1 trillion per year.&nbsp; Hence why \u201czero trust\u201d solutions are often incredibly complex and difficult to implement \u2013 you still need other solutions to fill the holes \u2013 giving you a new problem of figuring out how to patch everything together.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust Solutions and Vendors \u201cZero trust\u201d is often a long, tough journey.&nbsp; But it doesn\u2019t need to be.&nbsp; And the answer is actually simple once we separate reality from the marketing fluff from many zero trust vendors. Everyone claims to have a zero trust solution including the top security vendors like Cisco, Palo Alto [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":30250,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[477],"tags":[548],"class_list":["post-27927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust","tag-zero-trust-competitors"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero Trust Vendor Overview including NetFoundry<\/title>\n<meta name=\"description\" content=\"Discover the truth behind Zero Trust solutions and how leading Zero Trust vendors like NetFoundry simplify secure networking without relying on the Internet\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors\" \/>\n<meta property=\"og:description\" content=\"Discover the truth behind Zero Trust solutions and how leading Zero Trust vendors like NetFoundry simplify secure networking without relying on the Internet\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-18T16:00:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T02:08:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-empower-zero-trust-designed-in.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Gorman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Gorman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/\"},\"author\":{\"name\":\"Mike Gorman\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/0ba7ce454be44653ca6f970d2999320e\"},\"headline\":\"Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors\",\"datePublished\":\"2024-06-18T16:00:48+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/\"},\"wordCount\":1587,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors.jpg\",\"keywords\":[\"Zero Trust Competitors\"],\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/\",\"name\":\"Zero Trust Vendor Overview including NetFoundry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors.jpg\",\"datePublished\":\"2024-06-18T16:00:48+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"description\":\"Discover the truth behind Zero Trust solutions and how leading Zero Trust vendors like NetFoundry simplify secure networking without relying on the Internet\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/0ba7ce454be44653ca6f970d2999320e\",\"name\":\"Mike Gorman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef4afcbea4ffbe810769b78aa9e882b8fa18c0e1258258ba98b331c963ce66e7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef4afcbea4ffbe810769b78aa9e882b8fa18c0e1258258ba98b331c963ce66e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef4afcbea4ffbe810769b78aa9e882b8fa18c0e1258258ba98b331c963ce66e7?s=96&d=mm&r=g\",\"caption\":\"Mike Gorman\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/mike-gorman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust Vendor Overview including NetFoundry","description":"Discover the truth behind Zero Trust solutions and how leading Zero Trust vendors like NetFoundry simplify secure networking without relying on the Internet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors","og_description":"Discover the truth behind Zero Trust solutions and how leading Zero Trust vendors like NetFoundry simplify secure networking without relying on the Internet","og_url":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2024-06-18T16:00:48+00:00","article_modified_time":"2024-09-18T02:08:23+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-empower-zero-trust-designed-in.jpg","type":"image\/jpeg"}],"author":"Mike Gorman","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Mike Gorman","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/"},"author":{"name":"Mike Gorman","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/0ba7ce454be44653ca6f970d2999320e"},"headline":"Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors","datePublished":"2024-06-18T16:00:48+00:00","dateModified":"2024-09-18T02:08:23+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/"},"wordCount":1587,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors.jpg","keywords":["Zero Trust Competitors"],"articleSection":["Zero Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/","url":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/","name":"Zero Trust Vendor Overview including NetFoundry","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors.jpg","datePublished":"2024-06-18T16:00:48+00:00","dateModified":"2024-09-18T02:08:23+00:00","description":"Discover the truth behind Zero Trust solutions and how leading Zero Trust vendors like NetFoundry simplify secure networking without relying on the Internet","breadcrumb":{"@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors.jpg","width":1536,"height":804,"caption":"NetFoundry | Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/zero-trust\/zerotrust-zero-trust-overview-comparing-netfoundry-to-the-top-zero-trust-vendors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Zero Trust Overview: Comparing NetFoundry to the Top Zero Trust Vendors"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/0ba7ce454be44653ca6f970d2999320e","name":"Mike Gorman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ef4afcbea4ffbe810769b78aa9e882b8fa18c0e1258258ba98b331c963ce66e7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ef4afcbea4ffbe810769b78aa9e882b8fa18c0e1258258ba98b331c963ce66e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef4afcbea4ffbe810769b78aa9e882b8fa18c0e1258258ba98b331c963ce66e7?s=96&d=mm&r=g","caption":"Mike Gorman"},"url":"https:\/\/netfoundry.io\/author\/mike-gorman\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/27927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=27927"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/27927\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/30250"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=27927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=27927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=27927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}