{"id":41860,"date":"2024-11-11T19:08:48","date_gmt":"2024-11-12T00:08:48","guid":{"rendered":"https:\/\/netfoundry.io\/?post_type=resources&#038;p=41860"},"modified":"2026-01-29T12:20:07","modified_gmt":"2026-01-29T17:20:07","slug":"streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry","status":"publish","type":"resources","link":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/","title":{"rendered":"Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"41860\" class=\"elementor elementor-41860\" data-elementor-post-type=\"resources\">\n\t\t\t\t<main class=\"elementor-element elementor-element-b7dad45 e-con-full e-flex e-con e-parent\" data-id=\"b7dad45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-34a0920 e-grid e-con-boxed e-con e-child\" data-id=\"34a0920\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a068ac elementor-widget elementor-widget-jet-breadcrumbs\" data-id=\"1a068ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-breadcrumbs jet-blocks\">\n\t\t<div class=\"jet-breadcrumbs\">\n\t\t<div class=\"jet-breadcrumbs__content\">\n\t\t<div class=\"jet-breadcrumbs__wrap\"><div class=\"jet-breadcrumbs__item\"><a href=\"https:\/\/netfoundry.io\/\" class=\"jet-breadcrumbs__item-link is-home\" rel=\"home\" title=\"NetFoundry, Developers of OpenZiti\">NetFoundry, Developers of OpenZiti<\/a><\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30df123 elementor-widget elementor-widget-heading\" data-id=\"30df123\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afdb130 elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"afdb130\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><a href=\"https:\/\/netfoundry.io\/resource-categories\/solution\/\" class=\"jet-listing-dynamic-terms__link\">Solution Brief<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d35d8e e-grid e-con-boxed e-con e-child\" data-id=\"0d35d8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cc00323 e-grid e-con-full e-con e-child\" data-id=\"cc00323\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-680b055 e-con-full e-flex e-con e-child\" data-id=\"680b055\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3f1b80 elementor-widget elementor-widget-image\" data-id=\"a3f1b80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"804\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-41862\" alt=\"NetFoundry | Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry\" srcset=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg 1536w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry-300x157.jpg 300w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry-1024x536.jpg 1024w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry-768x402.jpg 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20eb1fd gray elementor-widget elementor-widget-text-editor\" data-id=\"20eb1fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Introduction<\/h2><p><span style=\"font-weight: 400;\">In today&#8217;s rapidly evolving digital landscape, DevOps teams face mounting challenges to balance speed, agility, and security. Traditional network security methods fall short when applied to modern multi-cloud and Kubernetes environments, creating vulnerabilities that can compromise operations. NetFoundry offers a cutting-edge zero trust DevOps solution tailored to address these challenges, empowering DevOps teams to enhance security and efficiency.<\/span><\/p><p>\u00a0<\/p><h3><b>Description of the Problem<\/b><\/h3><p><span style=\"font-weight: 400;\">DevOps practices have transformed software development, but they also introduce unique security concerns:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Complex Security Requirements<\/b><span style=\"font-weight: 400;\">: Traditional, IP-based security models and VPNs expand the attack surface and increase vulnerabilities in dynamic, multi-cloud environments. The reliance on network perimeter defenses creates blind spots that can be exploited by attackers.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Tooling Vulnerabilities<\/b><span style=\"font-weight: 400;\">: CI\/CD pipelines, monitoring tools, ETL processes, and data warehouses can be potential entry points for attackers, often exposed by misconfigurations. These tools, integral to DevOps workflows, are often not designed with built-in security, making them susceptible to breaches.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Access Management Issues<\/b><span style=\"font-weight: 400;\">: Granting developers broad access to production environments risks exposing sensitive data and critical systems to potential threats. Traditional methods for managing permissions can be cumbersome, leading to overly permissive access or delays in operations.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Multi-Cloud Complexity<\/b><span style=\"font-weight: 400;\">: Managing security across diverse cloud platforms and services complicates standardization and consistency, increasing the risk of configuration errors.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d30388a e-con-full e-flex e-con e-child\" data-id=\"d30388a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-272edba e-con-full e-flex e-con e-child\" data-id=\"272edba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e837ac3 elementor-widget elementor-widget-heading\" data-id=\"e837ac3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Empower DevOps Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0681c5 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"e0681c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"39353b6c-4b87-4332-8d37-d304e5a8b680\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"89b28d57-ef19-4cfe-aa4f-4403219517e0\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p><em>NetFoundry\u2019s zero trust solution integrates seamlessly into DevOps workflows, providing identity-based access, eliminating network vulnerabilities, and empowering teams to deploy faster\u2014without compromising security<\/em><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d689615 e-grid e-con-full e-con e-child\" data-id=\"d689615\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55df81c elementor-widget elementor-widget-shortcode\" data-id=\"55df81c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5058f39 e-grid e-con-boxed e-con e-child\" data-id=\"5058f39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b9d2f66 e-grid e-con-full e-con e-child\" data-id=\"b9d2f66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-78c016f e-con-full e-flex e-con e-child\" data-id=\"78c016f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9436d4a elementor-widget elementor-widget-heading\" data-id=\"9436d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">DevOps Security Gaps<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6969c4b elementor-widget elementor-widget-text-editor\" data-id=\"6969c4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"31e28c4e-f36e-4c50-bdc6-94ec4559d7a0\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"46fa86ef-efbf-4a2e-83d8-367b095c2a28\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p><em>NetFoundry offers a zero trust approach that eliminates open ports, reduces attack surfaces, and enhances scalability, agility, and security.<\/em><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4df39c3 e-con-full e-grid e-con e-child\" data-id=\"4df39c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1934416 elementor-widget elementor-widget-heading\" data-id=\"1934416\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Traditional DevOps Security Challenges<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47b49d9 gray elementor-widget elementor-widget-text-editor\" data-id=\"47b49d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Before diving into NetFoundry\u2019s solutions, it\u2019s important to understand why traditional DevOps security tools fall short:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>VPNs (Virtual Private Networks)<\/b><span style=\"font-weight: 400;\">: While VPNs create secure tunnels between networks, they expose entire private networks, require open ports, and introduce latency. This not only expands the attack surface but also complicates scaling and increases configuration management overhead.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>VPC Peering and Private Networking<\/b><span style=\"font-weight: 400;\">: VPC (Virtual Private Cloud) peering enables communication within specific regions but involves manual configuration, lacks scalability, and requires extensive IP address planning. This limits agility and adds significant administrative burden.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Direct Connect and ExpressRoute<\/b><span style=\"font-weight: 400;\">: While offering dedicated connections, these services are costly, rely on physical infrastructure, and still adhere to traditional IP-based security models, limiting flexibility and responsiveness.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mesh Networking Solutions<\/b><span style=\"font-weight: 400;\">: While these can simplify multi-cluster connectivity, they introduce additional layers of complexity and may not inherently provide zero trust security, leaving potential gaps in the security model.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b6aa53 e-grid e-con-full e-con e-child\" data-id=\"6b6aa53\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca9af06 elementor-widget elementor-widget-shortcode\" data-id=\"ca9af06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0990264 e-grid e-con-boxed e-con e-child\" data-id=\"0990264\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-88ef4fb e-grid e-con-full e-con e-child\" data-id=\"88ef4fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-876eecc e-con-full e-grid e-con e-child\" data-id=\"876eecc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b9412f elementor-widget elementor-widget-heading\" data-id=\"9b9412f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Specific Use Cases and NetFoundry Solutions\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4c52ff gray elementor-widget elementor-widget-text-editor\" data-id=\"e4c52ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><b>Continuous Integration and Continuous Deployment (CI\/CD)<\/b><\/h3><ul><li style=\"list-style-type: none;\"><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Challenge<\/b><span style=\"font-weight: 400;\">: Automated CI\/CD processes can expose critical systems, increasing the risk of unauthorized access through code repositories, build servers, and deployment tools.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>NetFoundry Solution<\/b><span style=\"font-weight: 400;\">: Integrates zero trust security into CI\/CD pipelines, ensuring that only verified identities can access each stage. This prevents unauthorized interactions and maintains the integrity of the deployment process. By enforcing identity-based access controls, DevOps teams can manage who and what interacts with their CI\/CD systems without relying on traditional perimeter security.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Advantages<\/b><span style=\"font-weight: 400;\">: Enhanced protection for source code, deployment automation, and data integrity without slowing down the development cycle.<\/span><\/li><\/ul><\/li><\/ul><hr \/><h3><b>Monitoring Systems<\/b><\/h3><ul><li style=\"list-style-type: none;\"><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Challenge<\/b><span style=\"font-weight: 400;\">: Monitoring platforms have broad access to production environments to ensure uptime and performance. If not properly secured, they become attractive targets for attackers.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>NetFoundry Solution<\/b><span style=\"font-weight: 400;\">: Provides identity-based access that eliminates exposed IPs and ports, ensuring that only authorized components can interact with monitoring systems. This prevents unauthorized access and secures telemetry data, protecting the integrity of performance and incident management.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Advantages<\/b><span style=\"font-weight: 400;\">: Reduces the risk of compromised monitoring tools leading to full-scale breaches, while maintaining visibility and control over system health.<\/span><\/li><\/ul><\/li><\/ul><hr \/><h3><b>Extract, Transform, Load (ETL) Processes<\/b><\/h3><ul><li style=\"list-style-type: none;\"><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Challenge<\/b><span style=\"font-weight: 400;\">: ETL jobs are often designed to handle business-critical data and must interact with various data sources. Misconfigurations or exposed connections can lead to data leaks.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>NetFoundry Solution<\/b><span style=\"font-weight: 400;\">: Uses zero trust connectivity to secure ETL processes by eliminating exposed ports and ensuring only authenticated identities can interact with data sources. The system&#8217;s identity-based security framework ensures that data interactions remain protected and confidential.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Advantages<\/b><span style=\"font-weight: 400;\">: Maintains data privacy and integrity, protecting sensitive information during data aggregation and processing.<\/span><\/li><\/ul><\/li><\/ul><hr \/><h3><b>Data Warehouses<\/b><\/h3><ul><li style=\"list-style-type: none;\"><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Challenge<\/b><span style=\"font-weight: 400;\">: Central repositories of business data are high-value targets for attackers, as unauthorized access can result in substantial data breaches and operational disruption.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>NetFoundry Solution<\/b><span style=\"font-weight: 400;\">: Enforces strict access policies that only permit authenticated users and services to interact with data warehouses. The zero trust model ensures that data warehouses are protected from unauthorized extraction and interactions, maintaining compliance with data protection regulations.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Advantages<\/b><span style=\"font-weight: 400;\">: Reduces the risk of breaches, enhances data governance, and ensures continuous protection against insider and external threats.<\/span><\/li><\/ul><\/li><\/ul><hr \/><h3><b>Configuration Management<\/b><\/h3><ul><li style=\"list-style-type: none;\"><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Challenge<\/b><span style=\"font-weight: 400;\">: Tools for configuration management have the power to modify, scale, or disable infrastructure, making them high-risk if not secured properly.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>NetFoundry Solution<\/b><span style=\"font-weight: 400;\">: By applying zero trust principles, NetFoundry secures these tools by allowing only verified identities to interact with them. Centralized policy-based access controls enable DevOps teams to manage permissions effectively and adapt them as necessary.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Advantages<\/b><span style=\"font-weight: 400;\">: Prevents unauthorized configuration changes that could lead to operational disruptions or vulnerabilities.<\/span><\/li><\/ul><\/li><\/ul><hr \/><h3><b>Developer Access Management<\/b><\/h3><ul><li style=\"list-style-type: none;\"><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Challenge<\/b><span style=\"font-weight: 400;\">: Developers need access to production environments for troubleshooting, but broad permissions can expose critical systems to potential human errors or malicious intent.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>NetFoundry Solution<\/b><span style=\"font-weight: 400;\">: Implements least-privilege access policies that grant developers only the permissions they need for their tasks. This is managed through centralized policy enforcement, making it easier to adjust access based on project needs or security updates.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Advantages<\/b><span>: Balances the need for developer agility with robust security, ensuring production systems remain secure while supporting rapid incident response.<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-85aeea4 e-con-full e-flex e-con e-child\" data-id=\"85aeea4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b35e90c elementor-widget elementor-widget-heading\" data-id=\"b35e90c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Zero Trust DevOps Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4af8475 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"4af8475\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"3bcc0366-b0a8-4a2e-a122-8122b41a5ba6\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p><em>NetFoundry\u2019s zero trust framework secures every stage of DevOps\u2014protecting CI\/CD, monitoring, ETL, data warehouses, configuration management, and developer access. <\/em><\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd958b0 e-grid e-con-full e-con e-child\" data-id=\"fd958b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac61a3b elementor-widget elementor-widget-shortcode\" data-id=\"ac61a3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e712c6 e-flex e-con-boxed e-con e-child\" data-id=\"6e712c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e067d20 e-flex e-con-boxed e-con e-child\" data-id=\"e067d20\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e75a2f8 elementor-widget elementor-widget-spacer\" data-id=\"e75a2f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdf26a4 elementor-widget elementor-widget-heading\" data-id=\"bdf26a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advantages of Using NetFoundry Zero Trust for DevOps Operations<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12f9760 elementor-widget elementor-widget-spacer\" data-id=\"12f9760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55faf4e e-grid e-con-boxed e-con e-child\" data-id=\"55faf4e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7652661 elementor-widget elementor-widget-text-editor\" data-id=\"7652661\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #00ccff;\"><b>Enhanced Security Posture<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #ffffff;\">Minimizes attack surfaces by making resources invisible, leveraging identity-based, encrypted connections to reduce the risk of exposure.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a348fa elementor-widget elementor-widget-text-editor\" data-id=\"5a348fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #00ccff;\"><b>Operational Efficiency<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #ffffff;\">Integrates seamlessly with CI\/CD and Kubernetes workflows, reducing setup and maintenance time by automating connectivity processes.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37eecc5 elementor-widget elementor-widget-text-editor\" data-id=\"37eecc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #00ccff;\"><b>Cost Savings<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/span><\/h3><p><span style=\"font-weight: 400; color: #ffffff;\">Reduces dependency on VPNs, firewall configurations, and complex networking solutions, cutting infrastructure and operational expenses.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4591167 elementor-widget elementor-widget-text-editor\" data-id=\"4591167\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #00ccff;\"><b>Scalability<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #ffffff;\">Facilitates secure expansion across multi-cloud and hybrid environments without the limitations of traditional networking models.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60edc61 elementor-widget elementor-widget-text-editor\" data-id=\"60edc61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #00ccff;\"><b>Improved Compliance<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #ffffff;\">Policy-driven controls support adherence to industry standards, ensuring sensitive data is protected and compliance requirements are met.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4d3fbe elementor-widget elementor-widget-text-editor\" data-id=\"f4d3fbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #00ccff;\"><b>Faster Time-to-Market<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #ffffff;\">Streamlines secure connectivity for rapid deployment without network reconfiguration delays, enhancing overall productivity.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2db3c0 elementor-widget elementor-widget-text-editor\" data-id=\"f2db3c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #00ccff;\"><b>Better Collaboration<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #ffffff;\">Provides developers and teams with secure, direct access to resources and production environments without compromising security or agility.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3818f35 elementor-widget elementor-widget-text-editor\" data-id=\"3818f35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #00ccff;\"><b>Future-Proof Security<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #ffffff;\">As DevOps practices and technologies evolve, NetFoundry\u2019s zero trust architecture adapts to support new tools and processes without significant restructuring.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61ef5b1 elementor-widget elementor-widget-spacer\" data-id=\"61ef5b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6c2ff6 elementor-widget elementor-widget-spacer\" data-id=\"e6c2ff6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9267914 e-grid e-con-full e-con e-child\" data-id=\"9267914\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-983f953 elementor-widget elementor-widget-shortcode\" data-id=\"983f953\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f26ce2c e-grid e-con-boxed e-con e-child\" data-id=\"f26ce2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ecbd7e3 e-grid e-con-full e-con e-child\" data-id=\"ecbd7e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9a1f230 e-con-full e-flex e-con e-child\" data-id=\"9a1f230\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6dce183 elementor-widget elementor-widget-heading\" data-id=\"6dce183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Empower DevOps with Zero Trust<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b3fa25 elementor-widget elementor-widget-text-editor\" data-id=\"3b3fa25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"39735a24-91a3-45e3-8682-74061254bd06\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p><em>NetFoundry delivers a zero trust networking solution tailored for DevOps, enhancing security in CI\/CD pipelines, Kubernetes, and essential tools. <\/em><\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef703e3 e-con-full e-grid e-con e-child\" data-id=\"ef703e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d73fb2 elementor-widget elementor-widget-heading\" data-id=\"9d73fb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Zero Trust DevOps from NetFoundry\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbc938f gray elementor-widget elementor-widget-text-editor\" data-id=\"fbc938f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">NetFoundry\u2019s zero trust networking solution empowers DevOps teams to achieve secure, scalable, and efficient operations. By embedding security into CI\/CD pipelines, Kubernetes clusters, and critical DevOps tools, NetFoundry ensures robust protection without sacrificing agility. DevOps teams can confidently innovate and deploy high-performance systems, knowing that their operations are safeguarded by a future-ready security model.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4d1e94 e-grid e-con-boxed e-con e-child\" data-id=\"d4d1e94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ec6c6b elementor-widget__width-inherit elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"9ec6c6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/netfoundry.io\/resources\/netfoundry-cloud-simplifying-zero-trust-networking-deployments\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Previous<\/span><span class=\"post-navigation__prev--title\">NetFoundry Cloud: Simplifying Zero Trust Networking Deployments<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/netfoundry.io\/resources\/zero-trust-for-iot-the-essential-strategy-for-securing-industrial-consumer-and-smart-technologies\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Next<\/span><span class=\"post-navigation__next--title\">Zero Trust for IoT: The Essential Strategy for Securing Industrial, Consumer, and Smart Technologies<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/main>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>NetFoundry White Papers Introduction In today&#8217;s rapidly evolving digital landscape, DevOps teams face mounting challenges to balance speed, agility, and security. Traditional network security methods fall short when applied to modern multi-cloud and Kubernetes environments, creating vulnerabilities that can compromise operations. NetFoundry offers a cutting-edge zero trust DevOps solution tailored to address these challenges, empowering [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":41862,"menu_order":0,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"feature":[],"resource-tags":[707],"resource-categories":[986],"class_list":["post-41860","resources","type-resources","status-publish","format-standard","has-post-thumbnail","hentry","resource-tags-netfoundry-platform","resource-categories-solution"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry<\/title>\n<meta name=\"description\" content=\"Discover how NetFoundry&#039;s zero trust DevOps solution accelerates DevOps with enhanced security, reduced overhead, and seamless multi-cloud connectivity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry\" \/>\n<meta property=\"og:description\" content=\"Discover how NetFoundry&#039;s zero trust DevOps solution accelerates DevOps with enhanced security, reduced overhead, and seamless multi-cloud connectivity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T17:20:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\\\/\",\"name\":\"Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg\",\"datePublished\":\"2024-11-12T00:08:48+00:00\",\"dateModified\":\"2026-01-29T17:20:07+00:00\",\"description\":\"Discover how NetFoundry's zero trust DevOps solution accelerates DevOps with enhanced security, reduced overhead, and seamless multi-cloud connectivity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/resources\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry","description":"Discover how NetFoundry's zero trust DevOps solution accelerates DevOps with enhanced security, reduced overhead, and seamless multi-cloud connectivity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/","og_locale":"en_US","og_type":"article","og_title":"Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry","og_description":"Discover how NetFoundry's zero trust DevOps solution accelerates DevOps with enhanced security, reduced overhead, and seamless multi-cloud connectivity.","og_url":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_modified_time":"2026-01-29T17:20:07+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@netfoundry","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/","url":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/","name":"Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg","datePublished":"2024-11-12T00:08:48+00:00","dateModified":"2026-01-29T17:20:07+00:00","description":"Discover how NetFoundry's zero trust DevOps solution accelerates DevOps with enhanced security, reduced overhead, and seamless multi-cloud connectivity.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry.jpg","width":1536,"height":804,"caption":"NetFoundry | Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/resources\/streamlined-devops-with-zero-trust-boost-speed-and-simplify-with-netfoundry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/netfoundry.io\/resources\/"},{"@type":"ListItem","position":3,"name":"Streamlined DevOps with Zero Trust: Boost Speed and Simplify with NetFoundry"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources\/41860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/96"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources\/41860\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/41862"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=41860"}],"wp:term":[{"taxonomy":"feature","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/feature?post=41860"},{"taxonomy":"resource-tags","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resource-tags?post=41860"},{"taxonomy":"resource-categories","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resource-categories?post=41860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}