{"id":42343,"date":"2024-11-23T12:49:44","date_gmt":"2024-11-23T17:49:44","guid":{"rendered":"https:\/\/netfoundry.io\/?p=42343"},"modified":"2024-11-24T10:11:40","modified_gmt":"2024-11-24T15:11:40","slug":"the-zero-trust-revolution-starts-with-you-designing-security-into-every-product","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/","title":{"rendered":"The Zero Trust Revolution Starts with You: Designing Security Into Every Product"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42343\" class=\"elementor elementor-42343\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29f327ee e-flex e-con-boxed e-con e-parent\" data-id=\"29f327ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43f6bdb3 elementor-widget elementor-widget-text-editor\" data-id=\"43f6bdb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>The Model Is Broken<\/h2>\n<p>In the history of technology, few paradigms have caused as much collateral damage as the perimeter-based security model we adopted when we invented the internet.\u00a0<\/p>\n<p>For decades, enterprises have been granting access to their networks, assuming that keeping attackers out was the key to security. But this approach has failed. It has failed because <a href=\"https:\/\/www.ic3.gov\/CSA\/2024\/240618.pdf\" target=\"_blank\" rel=\"noopener\">granting access to networks inevitably grants pathways for threats<\/a>. And it has failed because it places the burden of compensating for insecure products on enterprises, forcing them to spend millions on patchwork bolt-on security software and labor-intensive monitoring. We\u2019ve created a multi-billion dollar cyber-security industry, where it\u2019s in the players&#8217; best interest to have product companies continue to ship insecure products that introduce vulnerabilities.<\/p>\n<h3>Product Providers Control Our Future<\/h3>\n<p><em>The time has come to address the root cause of our cybersecurity problems: network access.<\/em><\/p>\n<p>As <a href=\"https:\/\/netfoundry.io\/industries\/software-providers\/\">software and smart connected product providers<\/a>\u2014those who design, build, and sell networked products\u2014the responsibility falls on us to lead the way. The industry transformation to a zero trust security model begins with the products we ship. Imagine a world where every vendor embeds zero trust principles into their solutions, ensuring that their products limit network access and enforce the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Principle_of_least_privilege\" target=\"_blank\" rel=\"noopener\">least-privileged connectivity<\/a> by design. Over time, the enterprise would not just become more secure\u2014it would require fewer reactive security measures, saving resources and advancing innovation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d73cda0 e-grid e-con-full e-con e-child\" data-id=\"2d73cda0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10d060c5 elementor-widget elementor-widget-image\" data-id=\"10d060c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64c15dee elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"64c15dee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7df69ae7 elementor-widget elementor-widget-image\" data-id=\"7df69ae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-953eedf e-flex e-con-boxed e-con e-parent\" data-id=\"953eedf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c91f20a elementor-widget elementor-widget-text-editor\" data-id=\"c91f20a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Zero Trust Fatigue<\/h3>\n<p><span style=\"font-weight: 400;\">Zero trust is not just a buzzword; it\u2019s a paradigm shift. Unlike traditional security models, zero trust assumes that no entity\u2014user, device, or application\u2014should be inherently trusted. Access is granted only to what is necessary, and connections are continuously verified.<\/span><\/p>\n<p>Adoption of zero trust principles is challenging and will take time due to the complexity of overhauling legacy systems, evolving organizational mindsets, and ensuring seamless integration across diverse environments. While some security organizations are experiencing &#8220;zero trust fatigue&#8221; and the &#8220;zero trust&#8221; term has become somewhat jaded, it remains a critical and worthy approach to addressing the root causes of cybersecurity vulnerabilities.<\/p>\n<h3>The Case for Embedded Zero Trust<\/h3>\n<p><span style=\"font-weight: 400;\">For enterprises, zero trust can eliminate the vulnerabilities inherent in open networks. But the current adoption of zero trust is hindered by the products we provide. Many networked products, whether they are software applications, industrial IoT devices, or connected hardware, still rely on customers to secure them. This reliance perpetuates the cycle of bolt-on security software, firewalls, and VPNs\u2014band-aid solutions for a systemic problem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When we embed zero trust into the products themselves, we break this cycle. <\/span><b>Products become secure by design. <\/b><span style=\"font-weight: 400;\">They no longer rely on customers\u2019 networks to operate, nor do they introduce vulnerabilities that enterprises must scramble to defend against.<\/span><\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e41f65 e-grid e-con-full e-con e-child\" data-id=\"8e41f65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6fae85 elementor-widget elementor-widget-image\" data-id=\"e6fae85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd36bf2 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fd36bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9196ed1 elementor-widget elementor-widget-image\" data-id=\"9196ed1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc58e9b e-flex e-con-boxed e-con e-parent\" data-id=\"dc58e9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54926c2 elementor-widget elementor-widget-text-editor\" data-id=\"54926c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>The Responsibility of Product Providers<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">This transformation starts with us, the designers of software products and smart connected products.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every product we build is an opportunity to lead the market with security and resilience, to gain customer trust, and to drive innovation in the right direction. By designing zero trust into our products, we shift the burden of security away from the customer and set a new standard for the industry. <\/span><\/p>\n<h3>Secure Networking As Code<\/h3>\n<p>With modern zero trust networking platforms like\u00a0<a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/\" rel=\"noopener\">NetFoundry<\/a>, product designers and <a href=\"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/\">developers can embed secure networking directly into their applications<\/a> using just a few lines of code. This approach enforces authenticated and authorized access, ensuring users are limited to the application itself without exposing other network resources, effectively preventing lateral movement. By embedding key zero trust principles\u2014such as end-to-end encryption, continual authorization, authorize-before-connect, and least-privilege access\u2014applications become secure by design. This marks the next evolution in security, shifting from external protections to seamlessly embedding zero trust directly within applications.<\/p>\n<p><span style=\"font-weight: 400;\">The benefits are undeniable:<\/span><\/p>\n<ul>\n<li><b>For your customers<\/b><span style=\"font-weight: 400;\">: Reduced cybersecurity risks and fewer dependencies on expensive, complex security architectures and bolt-on cybersecurity solutions.<\/span><\/li>\n<li><b>For your business<\/b><span style=\"font-weight: 400;\">: Differentiation in a crowded market and greater adoption driven by trust and ease of deployment.<\/span><\/li>\n<li><b>For the industry<\/b><span style=\"font-weight: 400;\">: A collective movement toward solving the root cause of cybersecurity problems.<\/span><\/li>\n<\/ul>\n<p><!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9135641 e-grid e-con-full e-con e-child\" data-id=\"9135641\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b9354b elementor-widget elementor-widget-image\" data-id=\"3b9354b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd18e82 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bd18e82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3377a8 elementor-widget elementor-widget-image\" data-id=\"c3377a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b0825e6 e-flex e-con-boxed e-con e-parent\" data-id=\"b0825e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-291c207 elementor-widget elementor-widget-text-editor\" data-id=\"291c207\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>The Call to Action: Secure By Design<\/strong><\/h3>\n<p>The perimeter model has failed. Enterprises shouldn\u2019t have to spend millions compensating for the vulnerabilities insecure products create. They shouldn&#8217;t have to spend millions figuring out how to grant vendors and third parties connectivity and access to deployed products running in their enterprise. As product providers, we have the power\u2014and the responsibility\u2014to change this. By embedding zero trust connectivity into every solution, we can lead a revolution.<\/p>\n<p>NetFoundry is proud to have signed the\u00a0<a href=\"https:\/\/www.cisa.gov\/securebydesign\/pledge\" target=\"_blank\" rel=\"noopener\">Secure by Design Pledge<\/a>, an initiative by the U.S. Cybersecurity and Infrastructure Security Agency (<a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\" rel=\"noopener\">CISA<\/a>) that encourages software manufacturers to integrate security as a fundamental element in their product development. This pledge aligns with our unwavering commitment to creating a secure networking platform that empowers product providers to easily embed zero trust connectivity into their applications, making them inherently secure by design.<\/p>\n<h3><strong>Secure By Design Pledge<\/strong><\/h3>\n<p>Let\u2019s build a world where every product is secure by design, only trusted identities have access, and every connection is least-privileged. Let&#8217;s free up enterprise resources to focus on innovation instead of defense. The zero trust transformation starts with us\u2014and it starts with you.<\/p>\n<p>We invite all product providers to join us in signing the <a href=\"https:\/\/www.cisa.gov\/securebydesign\/pledge\">CISA Secure by Design Pledge<\/a> and to commit to delivering secure, resilient products that inspire trust and drive the future of connectivity. Together, we can address the root cause and build a safer, more secure world\u2014one secure product at a time.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Model Is Broken In the history of technology, few paradigms have caused as much collateral damage as the perimeter-based security model we adopted when we invented the internet.\u00a0 For decades, enterprises have been granting access to their networks, assuming that keeping attackers out was the key to security. But this approach has failed. It [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":42345,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[859],"tags":[856,948,854,947,872,855,950,545,949],"class_list":["post-42343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-by-design","tag-embedded-security","tag-embedded-zero-trust","tag-network-security","tag-product-security","tag-secure-by-design","tag-secure-connectivity","tag-security-innovation","tag-zero-trust","tag-zero-trust-products"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Zero Trust Revolution Starts with You: Designing Security Into Every Product<\/title>\n<meta name=\"description\" content=\"Transform the industry by embedding zero trust into your products. Lead the way in secure, easy-to-deploy solutions that build trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Zero Trust Revolution Starts with You: Designing Security Into Every Product\" \/>\n<meta property=\"og:description\" content=\"Transform the industry by embedding zero trust into your products. Lead the way in secure, easy-to-deploy solutions that build trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-23T17:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-24T15:11:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bill Zujewski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bill Zujewski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/\"},\"author\":{\"name\":\"Bill Zujewski\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/7ddda5014d92bb1492a5a1a05023ef77\"},\"headline\":\"The Zero Trust Revolution Starts with You: Designing Security Into Every Product\",\"datePublished\":\"2024-11-23T17:49:44+00:00\",\"dateModified\":\"2024-11-24T15:11:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/\"},\"wordCount\":934,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg\",\"keywords\":[\"Embedded Security\",\"Embedded Zero Trust\",\"Network Security\",\"Product Security\",\"Secure By Design\",\"Secure Connectivity\",\"Security Innovation\",\"Zero Trust\",\"Zero Trust Products\"],\"articleSection\":[\"Secure By Design\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/\",\"name\":\"The Zero Trust Revolution Starts with You: Designing Security Into Every Product\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg\",\"datePublished\":\"2024-11-23T17:49:44+00:00\",\"dateModified\":\"2024-11-24T15:11:40+00:00\",\"description\":\"Transform the industry by embedding zero trust into your products. Lead the way in secure, easy-to-deploy solutions that build trust.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | The Zero Trust Revolution Starts with You: Designing Security Into Every Product\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Zero Trust Revolution Starts with You: Designing Security Into Every Product\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/7ddda5014d92bb1492a5a1a05023ef77\",\"name\":\"Bill Zujewski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bdf59b5798cc2692f903071c1a8c85b437963d87dd5aeb3fff185ce34a6e435d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bdf59b5798cc2692f903071c1a8c85b437963d87dd5aeb3fff185ce34a6e435d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bdf59b5798cc2692f903071c1a8c85b437963d87dd5aeb3fff185ce34a6e435d?s=96&d=mm&r=g\",\"caption\":\"Bill Zujewski\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/bill-zujewski\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Zero Trust Revolution Starts with You: Designing Security Into Every Product","description":"Transform the industry by embedding zero trust into your products. Lead the way in secure, easy-to-deploy solutions that build trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/","og_locale":"en_US","og_type":"article","og_title":"The Zero Trust Revolution Starts with You: Designing Security Into Every Product","og_description":"Transform the industry by embedding zero trust into your products. Lead the way in secure, easy-to-deploy solutions that build trust.","og_url":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2024-11-23T17:49:44+00:00","article_modified_time":"2024-11-24T15:11:40+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg","type":"image\/jpeg"}],"author":"Bill Zujewski","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Bill Zujewski","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/"},"author":{"name":"Bill Zujewski","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/7ddda5014d92bb1492a5a1a05023ef77"},"headline":"The Zero Trust Revolution Starts with You: Designing Security Into Every Product","datePublished":"2024-11-23T17:49:44+00:00","dateModified":"2024-11-24T15:11:40+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/"},"wordCount":934,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg","keywords":["Embedded Security","Embedded Zero Trust","Network Security","Product Security","Secure By Design","Secure Connectivity","Security Innovation","Zero Trust","Zero Trust Products"],"articleSection":["Secure By Design"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/","url":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/","name":"The Zero Trust Revolution Starts with You: Designing Security Into Every Product","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg","datePublished":"2024-11-23T17:49:44+00:00","dateModified":"2024-11-24T15:11:40+00:00","description":"Transform the industry by embedding zero trust into your products. Lead the way in secure, easy-to-deploy solutions that build trust.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product.jpg","width":1536,"height":804,"caption":"NetFoundry | The Zero Trust Revolution Starts with You: Designing Security Into Every Product"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/secure-by-design\/the-zero-trust-revolution-starts-with-you-designing-security-into-every-product\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"The Zero Trust Revolution Starts with You: Designing Security Into Every Product"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/7ddda5014d92bb1492a5a1a05023ef77","name":"Bill Zujewski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bdf59b5798cc2692f903071c1a8c85b437963d87dd5aeb3fff185ce34a6e435d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bdf59b5798cc2692f903071c1a8c85b437963d87dd5aeb3fff185ce34a6e435d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bdf59b5798cc2692f903071c1a8c85b437963d87dd5aeb3fff185ce34a6e435d?s=96&d=mm&r=g","caption":"Bill Zujewski"},"url":"https:\/\/netfoundry.io\/author\/bill-zujewski\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/42343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=42343"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/42343\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/42345"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=42343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=42343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=42343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}