{"id":28111,"date":"2024-07-02T20:17:05","date_gmt":"2024-07-03T00:17:05","guid":{"rendered":"https:\/\/netfoundry.io\/?p=28111"},"modified":"2024-09-17T22:08:23","modified_gmt":"2024-09-18T02:08:23","slug":"demystifying-the-magic-of-zero-trust-networking-with-my-daughter","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/","title":{"rendered":"Demystifying the Magic of Zero Trust Networking with my Daughter"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-magic-and-pasta-zero-trust-networking\"><strong>Magic and Pasta (Zero Trust Networking)<\/strong><\/h3>\n\n\n\n<p>I had always had trouble explaining to my eldest daughter what I did for my job and how our technology would <a href=\"https:\/\/netfoundry.io\/why-netfoundry\/\">change the world<\/a>. She did not understand NetFoundry and our open-source platform <a href=\"https:\/\/landing.openziti.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">OpenZiti<\/a>, but she loves Ziggy (our pasta mascot).&nbsp; I did have to explain that Ziti is our product code name based on the letters Z T and connected to Zero Trust of course. Then we began reading Harry Potter together, and I was reminded of Arthur C. Clarke\u2019s Three Laws and, most memorably, the third law: \u201cAny sufficiently advanced technology is indistinguishable from magic.\u201d And it hit me; I could use magic and Harry Potter as a way to have my daughter understand what NetFoundry and open source OpenZiti did and, therefore, what my job was.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-castles-and-cities-zero-trust-identities-and-access\"><strong>Castles and Cities (Zero Trust Identities and Access)<\/strong><\/h3>\n\n\n\n<p>Let\u2019s start with some background. <strong>\u201cCastle-and-moat\u201d is a network security model<\/strong> in which no one outside the network can access data on the inside, but everyone inside the network can. Imagine an organization\u2019s network as a castle and the network perimeter as a moat. Over the last few years, <strong>this model has become outdated<\/strong>. Businesses have evolved into \u2018corporate cities\u2019 with open trade routes (APIs), apps, and users distributed everywhere with various security systems using the <strong>public internet as an information superhighway<\/strong>. While cities are drivers of innovation, they have a fundamental flaw; <strong>you cannot secure networks, only isolate them.<\/strong> Anyone can get between our cities in microseconds \u2013 kind of like the Floo Network. As a result, they are riddled with crime,<strong> a trillion-dollar drag on the global economy<\/strong>. Surveillance techniques known as <strong>scan-and-exploit have become the No. 1 attack vector for cyber-criminals.<\/strong> In recent years, Zero Trust has found significant industry adoption based on the principles laid out by <a href=\"https:\/\/www.nist.gov\/publications\/zero-trust-architecture\" target=\"_blank\" rel=\"noreferrer noopener\">NIST<\/a>.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Enhanced identity governance.<\/li>\n\n\n\n<li>Policy-based access controls.<\/li>\n\n\n\n<li>All connectivity is micro-segmented.<\/li>\n\n\n\n<li>Implementing software-defined perimeters and supporting hardware root of trust.<\/li>\n<\/ol>\n\n\n\n<p><br><strong>But not all zero trust is made equal.<\/strong> Together, <strong>my daughter and I settled on categorizing<\/strong> non-magical, partially magical, and <strong>magical zero trust<\/strong> to help explain the differences. Now she understands what I do and how our technology works.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-non-magical-zero-trust-networking\"><strong>Non-magical Zero Trust Networking<\/strong><\/h3>\n\n\n\n<p>At the most basic level, we have security vendors (commonly firewalls or VPN providers) who have applied a \u2018zero trust\u2019 label to their products and have non-magically become zero trust vendors. These products act as a <strong>proxy point for the user and device verification to achieve principle 2<\/strong>, and possibly but not always 3, as defined by NIST. They have <strong>public IPs, inbound ports, and link listeners, subject to external network-level attacks<\/strong>. My daughter understands this as adding guards and ID verification to buildings (network), floors (host), and, maybe rooms (apps), within our cities. <strong>It\u2019s better than a VPN, but there are still many attack vectors as the silly <\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Muggle\" target=\"_blank\" rel=\"noreferrer noopener\">Muggles<\/a><strong> don\u2019t believe in magic.<\/strong><\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-partially-magical-zero-trust-networking\"><strong>Partially-magical Zero Trust Networking<\/strong><\/h3>\n\n\n\n<p>Non-magical zero trust has a problem; my daughter best describes it: \u201cI<strong>magine if any Muggle could walk into Kings Cross platform 9 3\/4 by accident!!<\/strong>\u201c. A few vendors introduced principle four and built a<strong> software-defined perimeter (SDP) into their products.<\/strong> <strong>The attack surface massively reduces external network attacks<\/strong> (and witches or wizards from muggles). SDP can use various techniques, including single packet authentication (or port knocking) or authentication and authorization-before-connectivity using strong identity and least-privileged access. This is a significant improvement for the security of our cities; apps can be \u201c<strong>invisible like Diagon Alley or 12 Grimmauld Place<\/strong>\u201c. Now malicious actors (and silly muggles) cannot find or attack your applications or cities. We didn\u2019t stop there though\u2026<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-magical-zero-trust-networking\"><strong>Magical Zero Trust Networking<\/strong><\/h3>\n\n\n\n<p>While reading Harry Potter, my daughter became bewitched with the idea of P<strong>ortkeys, \u2018magical objects which can instantly bring anyone touching it to a specific location\u2019<\/strong>. She kept touching random objects around the house, expecting to turn up at the toy shop. But that does not sound much like a network traditionally bolted between our apps and users. However, this is <strong>*exactly*<\/strong> what happens when you embed an open-source OpenZiti SDK into your application! Now, regardless of where your endpoint is, it\u2019s magically transported to the destination through the OpenZiti fabric. My daughter tells me it\u2019s like <strong>putting a powerful spell of concealment<\/strong> <strong>and a Portkey directly into your app.<\/strong><\/p>\n\n\n\n<p>This software-powered OpenZiti network is configured using identities, services, and policies. It ensures <strong>there is no other way to reach your app as we have zero trust in the wide-area, local network and even OS network.<\/strong> Embedding zero trust into your apps makes them immune to <strong>network-based side-channel<\/strong> attacks [1]. Even if malicious actors or ransomware tried to attack the application from a device, they cannot \u2013 muggles cannot enter. They do not have the Portkey (or \u2018port key\u2019; wink, wink); it\u2019s inside the app. Your APIs are dark, and your users have no idea. This magical, invisible network is concealed inside the application; it\u2019s completely transparent. The application becomes <strong>multi-cloud native<\/strong> with absolutely no lock-in to cloud or telco \u2018secure connectivity\u2019 products. The app only needs commodity internet with a few outbound ports.<\/p>\n\n\n\n<p>What is most magical about OpenZiti and NetFoundry is that we built it as a platform that supports any use case, from hybrid\/multi-cloud to edge and IoT, across user access (including DevOps or user remote access), and app-embedded. Now, every business connectivity requirement can be magical.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-as-my-daughter-keeps-telling-her-friends-my-dad-does-magic-with-technology-and-now-she-sort-of-knows-what-i-do-for-my-job\"><strong>As my daughter keeps telling her friends, \u201cMy dad does magic with technology,\u201d and now she (sort of) knows what I do for my job.<\/strong><\/h3>\n\n\n\n<p>[1] Phishing is a technique malicious actors use to trick users into installing malware on their devices. This malware might then look for servers or applications running on the device with listening ports and exploit them. This is an example of a side-channel attack that OpenZiti can render absolutely impossible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Magic and Pasta (Zero Trust Networking) I had always had trouble explaining to my eldest daughter what I did for my job and how our technology would change the world. She did not understand NetFoundry and our open-source platform OpenZiti, but she loves Ziggy (our pasta mascot).&nbsp; I did have to explain that Ziti is [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":30242,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[486],"tags":[528],"class_list":["post-28111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ziti-openziti","tag-openziti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Demystifying Zero Trust Networking<\/title>\n<meta name=\"description\" content=\"Discover how Zero Trust Networking and OpenZiti make security as magical as a Harry Potter spell. Learn how embedding secure connectivity can protect your applications from cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demystifying the Magic of Zero Trust Networking with my Daughter\" \/>\n<meta property=\"og:description\" content=\"Discover how Zero Trust Networking and OpenZiti make security as magical as a Harry Potter spell. Learn how embedding secure connectivity can protect your applications from cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-03T00:17:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T02:08:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-demystifying-zero-trust-networking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Philip Griffiths\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Philip Griffiths\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/\"},\"author\":{\"name\":\"Philip Griffiths\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/2020f6a86319585ac99dc3262fb40673\"},\"headline\":\"Demystifying the Magic of Zero Trust Networking with my Daughter\",\"datePublished\":\"2024-07-03T00:17:05+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/\"},\"wordCount\":993,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-demystifying-zero-trust-networking.jpg\",\"keywords\":[\"OpenZiti\"],\"articleSection\":[\"Ziti &amp; OpenZiti\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/\",\"name\":\"Demystifying Zero Trust Networking\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-demystifying-zero-trust-networking.jpg\",\"datePublished\":\"2024-07-03T00:17:05+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"description\":\"Discover how Zero Trust Networking and OpenZiti make security as magical as a Harry Potter spell. Learn how embedding secure connectivity can protect your applications from cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-demystifying-zero-trust-networking.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-demystifying-zero-trust-networking.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | Demystifying the Magic of Zero Trust Networking with my Daughter\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ziti-openziti\\\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Demystifying the Magic of Zero Trust Networking with my Daughter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/2020f6a86319585ac99dc3262fb40673\",\"name\":\"Philip Griffiths\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g\",\"caption\":\"Philip Griffiths\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/philip-griffiths\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Demystifying Zero Trust Networking","description":"Discover how Zero Trust Networking and OpenZiti make security as magical as a Harry Potter spell. Learn how embedding secure connectivity can protect your applications from cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/","og_locale":"en_US","og_type":"article","og_title":"Demystifying the Magic of Zero Trust Networking with my Daughter","og_description":"Discover how Zero Trust Networking and OpenZiti make security as magical as a Harry Potter spell. Learn how embedding secure connectivity can protect your applications from cyber threats.","og_url":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2024-07-03T00:17:05+00:00","article_modified_time":"2024-09-18T02:08:23+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-demystifying-zero-trust-networking.jpg","type":"image\/jpeg"}],"author":"Philip Griffiths","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Philip Griffiths","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/"},"author":{"name":"Philip Griffiths","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/2020f6a86319585ac99dc3262fb40673"},"headline":"Demystifying the Magic of Zero Trust Networking with my Daughter","datePublished":"2024-07-03T00:17:05+00:00","dateModified":"2024-09-18T02:08:23+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/"},"wordCount":993,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-demystifying-zero-trust-networking.jpg","keywords":["OpenZiti"],"articleSection":["Ziti &amp; OpenZiti"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/","url":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/","name":"Demystifying Zero Trust Networking","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-demystifying-zero-trust-networking.jpg","datePublished":"2024-07-03T00:17:05+00:00","dateModified":"2024-09-18T02:08:23+00:00","description":"Discover how Zero Trust Networking and OpenZiti make security as magical as a Harry Potter spell. Learn how embedding secure connectivity can protect your applications from cyber threats.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-demystifying-zero-trust-networking.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-demystifying-zero-trust-networking.jpg","width":1536,"height":804,"caption":"NetFoundry | Demystifying the Magic of Zero Trust Networking with my Daughter"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Demystifying the Magic of Zero Trust Networking with my Daughter"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/2020f6a86319585ac99dc3262fb40673","name":"Philip Griffiths","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g","caption":"Philip Griffiths"},"url":"https:\/\/netfoundry.io\/author\/philip-griffiths\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/28111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=28111"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/28111\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/30242"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=28111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=28111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=28111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}