{"id":1714,"date":"2025-05-08T05:39:09","date_gmt":"2025-05-08T05:39:09","guid":{"rendered":"https:\/\/sec-it.co.il\/?p=1714"},"modified":"2025-07-22T03:35:48","modified_gmt":"2025-07-22T03:35:48","slug":"zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8","status":"publish","type":"post","link":"https:\/\/sec-it.co.il\/en\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/","title":{"rendered":"Zero Trust is not a buzzword \u2013 it\u2019s what prevented a ransomware attack at my client"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1714\" class=\"elementor elementor-1714\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a66aae4 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"a66aae4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8c5207 elementor-widget elementor-widget-text-editor\" data-id=\"b8c5207\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For years, organizations have been accustomed to the \u201ctrust what\u2019s inside, block what\u2019s outside\u201d model. But in a world where people work from home, attackers jump between systems in the cloud, and hackers use an inside-out approach \u2013 this model simply doesn\u2019t hold up. Zero Trust is the modern answer that replaces the old model and requires authentication at every step and for every access, regardless of the user\u2019s location or device. This is exactly what happened to one of my clients: an internal system was compromised through an old VPN access, and a ransomware attack began trying to encrypt files. Only thanks to the early implementation of Zero Trust principles \u2013 the attacker was unable to move across the network, and the attack was stopped within minutes.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35e102a elementor-widget elementor-widget-heading\" data-id=\"35e102a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What exactly is Zero Trust? \n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e743b52 elementor-widget elementor-widget-text-editor\" data-id=\"e743b52\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust is not a product \u2013 it is a security concept. The core meaning is simple: trust no one, at any point, without re-verification. Every action is checked, every identity is examined, every system is checked by context. Instead of \u201conce logged in \u2013 always trusted\u201d, the method works according to \u201cnever trust, always verify\u201d.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29853b1 elementor-widget elementor-widget-heading\" data-id=\"29853b1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What does it look like in practice? \n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2c0183 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f2c0183\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Every user is required to have multi-step verification \u2013 at every login, no matter where. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Permissions are minimal \u2013 an employee can only access what they need, nothing else. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Every movement within the system is recorded and checked \u2013 even if the user is already authenticated. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Every connected system is monitored \u2013 including cloud applications, edge equipment, and internal servers. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2041e7 elementor-widget elementor-widget-heading\" data-id=\"e2041e7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The customer \u2013 and what saved him \n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b71a94f elementor-widget elementor-widget-text-editor\" data-id=\"b71a94f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The attack began with an unpatched VPN connection with stolen credentials. But when the attacker tried to access additional systems, he encountered additional authentication, micro-segmentation, and a lack of permissions to access sensitive data. The system recognized the pattern, froze the permission, and sent a real-time alert. This saved the organization from paying a ransom, downtime, and reputational damage.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f592798 elementor-widget elementor-widget-heading\" data-id=\"f592798\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Why is this especially important for businesses in Israel? \n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eeaedb1 elementor-widget elementor-widget-text-editor\" data-id=\"eeaedb1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In Israel, many small and medium-sized organizations still operate according to old principles \u2013 centralized login, open VPN, users with broad privileges. Each of them is an opening for an attack. So,\u00a0<a href=\"https:\/\/sec-it.co.il\/en\/%d7%90%d7%91%d7%98%d7%97%d7%aa-%d7%9e%d7%99%d7%93%d7%a2-%d7%9c%d7%a2%d7%a1%d7%a7%d7%99%d7%9d-%d7%a7%d7%98%d7%a0%d7%99%d7%9d-%d7%9e%d7%93%d7%a8%d7%99%d7%9a-%d7%9c%d7%9e%d7%a0%d7%9b%d7%9c%d7%99%d7%9d\/\">Information security for small businesses<\/a>\u00a0It is very important that these organizations need unique strategies like Zero Trust to effectively protect their religion. Zero Trust is exactly right for such businesses: it is flexible, can be implemented gradually, and most of the necessary tools already exist in systems like Microsoft 365, Google Workspace, or cloud security solutions.\u00a0\u00a0<b>How do you start?<\/b>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19629e9 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"19629e9\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Mapping of all users, systems and data. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enable MFA on every interface. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reducing privileges by role. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Division of the network into isolated areas. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Continuous monitoring of abnormal activity. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42a0e37 elementor-widget elementor-widget-heading\" data-id=\"42a0e37\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">In conclusion \n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8cc876 elementor-widget elementor-widget-text-editor\" data-id=\"f8cc876\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tZero Trust is not a trend \u2013 it is a realistic shield. Every organization \u2013 small or large \u2013 must change its perception: it is not enough to block the front door, you need to lock each room individually. It is the difference between an attack that ends in the headlines, and a malfunction that is blocked before it starts. Cybersecurity and IT \u2013 Two worlds, one solution.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u05d1\u05de\u05e9\u05da \u05e9\u05e0\u05d9\u05dd, \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d4\u05ea\u05e8\u05d2\u05dc\u05d5 \u05dc\u05de\u05d5\u05d3\u05dc \u05e9\u05dc \u201c\u05e1\u05d5\u05de\u05da \u05e2\u05dc \u05de\u05d4 \u05e9\u05d1\u05e4\u05e0\u05d9\u05dd, \u05d7\u05d5\u05e1\u05dd \u05d0\u05ea \u05de\u05d4 \u05e9\u05d1\u05d7\u05d5\u05e5\u201d. \u05d0\u05d1\u05dc \u05d1\u05e2\u05d5\u05dc\u05dd \u05e9\u05d1\u05d5 \u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05de\u05d4\u05d1\u05d9\u05ea, \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05de\u05d3\u05dc\u05d2\u05d9\u05dd \u05d1\u05d9\u05df \u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05d1\u05e2\u05e0\u05df, \u05d5\u05d4\u05d0\u05e7\u05e8\u05d9\u05dd \u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05d1\u05d2\u05d9\u05e9\u05ea Inside-Out \u2013 \u05d4\u05de\u05d5\u05d3\u05dc \u05d4\u05d6\u05d4 \u05e4\u05e9\u05d5\u05d8 \u05dc\u05d0 \u05de\u05d7\u05d6\u05d9\u05e7 \u05de\u05e2\u05de\u05d3. Zero Trust \u05d4\u05d5\u05d0 \u05d4\u05de\u05e2\u05e0\u05d4 \u05d4\u05de\u05d5\u05d3\u05e8\u05e0\u05d9 \u05e9\u05de\u05d7\u05dc\u05d9\u05e3 \u05d0\u05ea \u05d4\u05de\u05d5\u05d3\u05dc \u05d4\u05d9\u05e9\u05df \u05d5\u05d3\u05d5\u05e8\u05e9 \u05d0\u05d9\u05de\u05d5\u05ea \u05d1\u05db\u05dc \u05e9\u05dc\u05d1 \u05d5\u05dc\u05db\u05dc \u05d2\u05d9\u05e9\u05d4, \u05dc\u05dc\u05d0 \u05ea\u05dc\u05d5\u05ea \u05d1\u05de\u05d9\u05e7\u05d5\u05dd \u05d4\u05de\u05e9\u05ea\u05de\u05e9 \u05d0\u05d5 \u05d4\u05de\u05db\u05e9\u05d9\u05e8.\u00a0\u05d6\u05d4 \u05d1\u05d3\u05d9\u05d5\u05e7 \u05de\u05d4 \u05e9\u05e7\u05e8\u05d4 \u05d0\u05e6\u05dc \u05d0\u05d7\u05d3 \u05de\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea\u05d9\u05d9: \u05de\u05e2\u05e8\u05db\u05ea \u05e4\u05e0\u05d9\u05de\u05d9\u05ea \u05e0\u05e4\u05e8\u05e6\u05d4 \u05d3\u05e8\u05da \u05d2\u05d9\u05e9\u05ea VPN \u05d9\u05e9\u05e0\u05d4, \u05d5\u05d4\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05d4\u05ea\u05d7\u05d9\u05dc\u05d4 \u05dc\u05e0\u05e1\u05d5\u05ea \u05dc\u05d4\u05e6\u05e4\u05d9\u05df \u05e7\u05d1\u05e6\u05d9\u05dd. \u05e8\u05e7 \u05d4\u05d5\u05d3\u05d5\u05ea \u05dc\u05d9\u05d9\u05e9\u05d5\u05dd \u05de\u05d5\u05e7\u05d3\u05dd \u05e9\u05dc \u05e2\u05e7\u05e8\u05d5\u05e0\u05d5\u05ea Zero Trust \u2013 \u05d4\u05ea\u05d5\u05e7\u05e3 \u05dc\u05d0 \u05d4\u05e6\u05dc\u05d9\u05d7 \u05dc\u05e0\u05d5\u05e2 \u05dc\u05e8\u05d5\u05d7\u05d1 \u05d4\u05e8\u05e9\u05ea, \u05d5\u05d4\u05de\u05ea\u05e7\u05e4\u05d4 \u05e0\u05e2\u05e6\u05e8\u05d4 \u05d1\u05ea\u05d5\u05da \u05d3\u05e7\u05d5\u05ea.\u00a0 \u05de\u05d4 \u05d6\u05d4 \u05d1\u05e2\u05e6\u05dd Zero Trust? Zero Trust \u05d4\u05d5\u05d0 \u05dc\u05d0 \u05de\u05d5\u05e6\u05e8 \u2013 \u05d0\u05dc\u05d0 \u05ea\u05e4\u05d9\u05e1\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4. \u05d4\u05de\u05e9\u05de\u05e2\u05d5\u05ea \u05d4\u05de\u05e8\u05db\u05d6\u05d9\u05ea \u05d4\u05d9\u05d0 \u05e4\u05e9\u05d5\u05d8\u05d4: \u05dc\u05d0 \u05e1\u05d5\u05de\u05db\u05d9\u05dd \u05e2\u05dc \u05d0\u05e3 \u05d0\u05d7\u05d3, \u05d1\u05e9\u05d5\u05dd \u05e9\u05dc\u05d1, \u05d1\u05dc\u05d9 \u05d0\u05d9\u05de\u05d5\u05ea \u05de\u05d7\u05d5\u05d3\u05e9. \u05db\u05dc \u05e4\u05e2\u05d5\u05dc\u05d4 \u05e0\u05d1\u05d3\u05e7\u05ea, \u05db\u05dc \u05d6\u05d4\u05d5\u05ea \u05e0\u05d1\u05d7\u05e0\u05ea, \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05e0\u05d1\u05d3\u05e7\u05ea \u05dc\u05e4\u05d9 \u05d4\u05e7\u05e9\u05e8.\u00a0\u00a0\u05d1\u05de\u05e7\u05d5\u05dd \u201conce logged in \u2013 always trusted\u201d, \u05d4\u05e9\u05d9\u05d8\u05d4 \u05e2\u05d5\u05d1\u05d3\u05ea \u05dc\u05e4\u05d9 \u201cnever trust, always verify\u201d.\u00a0 \u05d0\u05d9\u05da \u05d6\u05d4 \u05e0\u05e8\u05d0\u05d4 \u05d1\u05e4\u05d5\u05e2\u05dc? \u05db\u05dc \u05de\u05e9\u05ea\u05de\u05e9 \u05e0\u05d3\u05e8\u05e9 \u05dc\u05d0\u05d9\u05de\u05d5\u05ea \u05e8\u05d1-\u05e9\u05dc\u05d1\u05d9 \u2013 \u05d1\u05db\u05dc \u05db\u05e0\u05d9\u05e1\u05d4, \u05dc\u05d0 \u05de\u05e9\u05e0\u05d4 \u05de\u05d0\u05d9\u05e4\u05d4. \u05d4\u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05d4\u05df \u05de\u05d9\u05e0\u05d9\u05de\u05dc\u05d9\u05d5\u05ea \u2013 \u05e2\u05d5\u05d1\u05d3 \u05d9\u05db\u05d5\u05dc \u05dc\u05d2\u05e9\u05ea \u05e8\u05e7 \u05dc\u05de\u05d4 \u05e9\u05d4\u05d5\u05d0 \u05e6\u05e8\u05d9\u05da, \u05dc\u05d0 \u05dc\u05e9\u05d5\u05dd \u05d3\u05d1\u05e8 \u05d0\u05d7\u05e8. \u05db\u05dc \u05ea\u05e0\u05d5\u05e2\u05d4 \u05d1\u05ea\u05d5\u05da \u05d4\u05de\u05e2\u05e8\u05db\u05ea \u05e0\u05e8\u05e9\u05de\u05ea \u05d5\u05e0\u05d1\u05d3\u05e7\u05ea \u2013 \u05d2\u05dd \u05d0\u05dd \u05d4\u05de\u05e9\u05ea\u05de\u05e9 \u05db\u05d1\u05e8 \u05de\u05d0\u05d5\u05de\u05ea. \u05db\u05dc \u05de\u05e2\u05e8\u05db\u05ea \u05de\u05d7\u05d5\u05d1\u05e8\u05ea \u05de\u05e4\u05d5\u05e7\u05d7\u05ea \u2013 \u05db\u05d5\u05dc\u05dc \u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d5\u05ea \u05e2\u05e0\u05df, \u05e6\u05d9\u05d5\u05d3 \u05e7\u05e6\u05d4, \u05d5\u05e9\u05e8\u05ea\u05d9\u05dd \u05e4\u05e0\u05d9\u05de\u05d9\u05d9\u05dd. \u05d4\u05dc\u05e7\u05d5\u05d7 \u2013 \u05d5\u05de\u05d4 \u05e9\u05d4\u05e6\u05d9\u05dc \u05d0\u05d5\u05ea\u05d5 \u05d4\u05de\u05ea\u05e7\u05e4\u05d4 \u05d4\u05ea\u05d7\u05d9\u05dc\u05d4 \u05d3\u05e8\u05da \u05d4\u05ea\u05d7\u05d1\u05e8\u05d5\u05ea VPN \u05e9\u05dc\u05d0 \u05e2\u05d5\u05d3\u05db\u05e0\u05d4, \u05e2\u05dd \u05e4\u05e8\u05d8\u05d9 \u05d2\u05d9\u05e9\u05d4 \u05e9\u05e0\u05d2\u05e0\u05d1\u05d5. \u05d0\u05d1\u05dc \u05db\u05e9\u05d4\u05ea\u05d5\u05e7\u05e3 \u05e0\u05d9\u05e1\u05d4 \u05dc\u05d4\u05d9\u05db\u05e0\u05e1 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea \u2013 \u05d4\u05d5\u05d0 \u05e0\u05ea\u05e7\u05dc \u05d1\u05d0\u05d9\u05de\u05d5\u05ea \u05e0\u05d5\u05e1\u05e3, \u05e7\u05d9\u05e8\u05d5\u05d9 \u05de\u05d9\u05e7\u05e8\u05d5-\u05e1\u05d2\u05de\u05e0\u05d8\u05e6\u05d9\u05d4 (micro-segmentation), \u05d5\u05d7\u05d5\u05e1\u05e8 \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05dc\u05d2\u05e9\u05ea \u05dc\u05e0\u05ea\u05d5\u05e0\u05d9\u05dd \u05e8\u05d2\u05d9\u05e9\u05d9\u05dd.\u00a0\u00a0\u05d4\u05de\u05e2\u05e8\u05db\u05ea \u05d6\u05d9\u05d4\u05ea\u05d4 \u05d0\u05ea \u05d4\u05d3\u05e4\u05d5\u05e1, \u05d4\u05e7\u05e4\u05d9\u05d0\u05d4 \u05d0\u05ea \u05d4\u05d4\u05e8\u05e9\u05d0\u05d4, \u05d5\u05e9\u05dc\u05d7\u05d4 \u05d4\u05ea\u05e8\u05d0\u05d4 \u05d1\u05d6\u05de\u05df \u05d0\u05de\u05ea. \u05db\u05da \u05e0\u05d7\u05e1\u05da \u05de\u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05ea\u05e9\u05dc\u05d5\u05dd \u05db\u05d5\u05e4\u05e8, \u05d4\u05e9\u05d1\u05ea\u05d4, \u05d5\u05e0\u05d6\u05e7 \u05ea\u05d3\u05de\u05d9\u05ea\u05d9.\u00a0 \u05dc\u05de\u05d4 \u05d6\u05d4 \u05d7\u05e9\u05d5\u05d1 \u05d1\u05de\u05d9\u05d5\u05d7\u05d3 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc? \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc, \u05e8\u05d1\u05d9\u05dd \u05de\u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d4\u05e7\u05d8\u05e0\u05d9\u05dd \u05d5\u05d4\u05d1\u05d9\u05e0\u05d5\u05e0\u05d9\u05d9\u05dd \u05e2\u05d3\u05d9\u05d9\u05df \u05e4\u05d5\u05e2\u05dc\u05d9\u05dd \u05dc\u05e4\u05d9 \u05e2\u05e7\u05e8\u05d5\u05e0\u05d5\u05ea \u05d9\u05e9\u05e0\u05d9\u05dd \u2013 \u05db\u05e0\u05d9\u05e1\u05d4 \u05de\u05e8\u05d5\u05db\u05d6\u05ea, VPN \u05e4\u05ea\u05d5\u05d7, \u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05e2\u05dd \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05e8\u05d7\u05d1\u05d5\u05ea. \u05db\u05dc \u05d0\u05d7\u05d3 \u05de\u05d4\u05dd \u05d4\u05d5\u05d0 \u05e4\u05ea\u05d7 \u05dc\u05ea\u05d5\u05e7 \u05e3.\u05db\u05bc\u05b5\u05df \u05e2\u05b7\u05dc \u05db\u05bc\u05b8\u05da\u05b0\u00a0\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd \u05e7\u05d8\u05e0\u05d9\u05dd\u00a0\u05d4\u05b4\u05d9\u05d0 \u05d7\u05b2\u05e9\u05c1\u05d5\u05bc\u05d1\u05b8\u05d4 \u05de\u05b0\u05d0\u05b9\u05d3, \u05db\u05bc\u05b4\u05d9 \u05d0\u05d5\u05b9\u05e8\u05b0\u05d2\u05b8\u05e0\u05b4\u05d9\u05d6\u05b8\u05e6\u05b4\u05d9\u05d5\u05b9\u05ea \u05d0\u05b5\u05dc\u05bc\u05d5\u05bc \u05d6\u05b0\u05e7\u05bb\u05e7\u05d5\u05b9\u05ea \u05dc\u05b0\u05d0\u05b7\u05e1\u05b0\u05d8\u05b0\u05e8\u05b8\u05d8\u05b6\u05d2\u05b4\u05d9\u05d5\u05b9\u05ea \u05de\u05b0\u05d9\u05bb\u05d7\u05b8\u05d3\u05d5\u05b9\u05ea \u05db\u05bc\u05b0\u05de\u05d5\u05b9 Zero Trust \u05db\u05bc\u05b0\u05d3\u05b5\u05d9 \u05dc\u05b0\u05d4\u05b8\u05d2\u05b5\u05df \u05e2\u05b7\u05dc \u05d4\u05b7\u05d3\u05bc\u05b8\u05bc\u05ea\u05bc\u05b8\u05d4 \u05e9\u05c1\u05b6\u05dc\u05b8\u05bc\u05d4\u05b6\u05dd \u05d1\u05bc\u05b0\u05d0\u05d5\u05b9\u05e4\u05b6\u05df \u05d9\u05b0\u05e2\u05b4\u05d9\u05dc.\u00a0Zero Trust \u05de\u05ea\u05d0\u05d9\u05dd \u05d1\u05d3\u05d9\u05d5\u05e7 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd \u05db\u05d0\u05dc\u05d4: \u05d4\u05d5\u05d0 \u05d2\u05de\u05d9\u05e9, \u05e0\u05d9\u05ea\u05df \u05dc\u05d4\u05d8\u05de\u05e2\u05d4 \u05d4\u05d3\u05e8\u05d2\u05ea\u05d9\u05ea, \u05d5\u05e8\u05d5\u05d1 \u05d4\u05db\u05dc\u05d9\u05dd \u05d4\u05d3\u05e8\u05d5\u05e9\u05d9\u05dd \u05db\u05d1\u05e8 \u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05d1\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05db\u05de\u05d5 Microsoft 365, Google Workspace, \u05d0\u05d5 \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d1\u05e2\u05e0\u05df.\u00a0\u00a0\u05d0\u05d9\u05da \u05de\u05ea\u05d7\u05d9\u05dc\u05d9\u05dd?\u00a0 \u05de\u05d9\u05e4\u05d5\u05d9 \u05e9\u05dc \u05db\u05dc\u05dc \u05d4\u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd, \u05d4\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05d5\u05d4\u05e0\u05ea\u05d5\u05e0\u05d9\u05dd. \u05d4\u05e4\u05e2\u05dc\u05ea MFA \u05d1\u05db\u05dc \u05de\u05de\u05e9\u05e7. \u05d4\u05e4\u05d7\u05ea\u05ea \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05dc\u05e4\u05d9 \u05ea\u05e4\u05e7\u05d9\u05d3\u05d9\u05dd. \u05d7\u05dc\u05d5\u05e7\u05d4 \u05e9\u05dc \u05d4\u05e8\u05e9\u05ea \u05dc\u05d0\u05d6\u05d5\u05e8\u05d9\u05dd \u05de\u05d1\u05d5\u05d3\u05d3\u05d9\u05dd. \u05e0\u05d9\u05d8\u05d5\u05e8 \u05e8\u05e6\u05d9\u05e3 \u05e9\u05dc \u05e4\u05e2\u05d9\u05dc\u05d5\u05ea \u05d7\u05e8\u05d9\u05d2\u05d4. \u05dc\u05e1\u05d9\u05db\u05d5\u05dd Zero Trust \u05d6\u05d4 \u05dc\u05d0 \u05d8\u05e8\u05e0\u05d3 \u2013 \u05d6\u05d4 \u05de\u05d2\u05df \u05de\u05e6\u05d9\u05d0\u05d5\u05ea\u05d9. \u05db\u05dc \u05d0\u05e8\u05d2\u05d5\u05df \u2013 \u05e7\u05d8\u05df \u05db\u05d2\u05d3\u05d5\u05dc \u2013 \u05d7\u05d9\u05d9\u05d1 \u05dc\u05e9\u05e0\u05d5\u05ea \u05d0\u05ea \u05d4\u05ea\u05e4\u05d9\u05e1\u05d4: \u05dc\u05d0 \u05de\u05e1\u05e4\u05d9\u05e7 \u05dc\u05d7\u05e1\u05d5\u05dd \u05d0\u05ea \u05d4\u05d3\u05dc\u05ea \u05d4\u05e7\u05d3\u05de\u05d9\u05ea, \u05e6\u05e8\u05d9\u05da \u05dc\u05e0\u05e2\u05d5\u05dc \u05db\u05dc \u05d7\u05d3\u05e8 \u05d1\u05e0\u05e4\u05e8\u05d3. \u05d6\u05d4 \u05d4\u05d4\u05d1\u05d3\u05dc \u05d1\u05d9\u05df \u05de\u05ea\u05e7\u05e4\u05d4 \u05e9\u05de\u05e1\u05ea\u05d9\u05d9\u05de\u05ea \u05d1\u05db\u05d5\u05ea\u05e8\u05d5\u05ea \u05d1\u05e2\u05d9\u05ea\u05d5\u05df, \u05dc\u05d1\u05d9\u05df \u05ea\u05e7\u05dc\u05d4 \u05e9\u05e0\u05d7\u05e1\u05de\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e9\u05d4\u05ea\u05d7\u05d9\u05dc\u05d4. \u05d0\u05d1\u05d8\u05d7\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5-IT \u2013 \u05e9\u05e0\u05d9 \u05e2\u05d5\u05dc\u05de\u05d5\u05ea, \u05e4\u05ea\u05e8\u05d5\u05df \u05d0\u05d7\u05d3.<\/p>","protected":false},"author":2,"featured_media":1715,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-23"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust \u05d6\u05d4 \u05dc\u05d0 \u05d1\u05d0\u05d6\u05d6 \u2013 \u05d6\u05d4 \u05de\u05d4 \u05e9\u05de\u05e0\u05e2 \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05d0\u05e6\u05dc \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 - IdanZabari Consultant<\/title>\n<meta name=\"description\" content=\"\u05d0\u05e1\u05d8\u05e8\u05d8\u05d2\u05d9\u05d9\u05ea Zero Trust \u05d4\u05e6\u05d9\u05dc\u05d4 \u05d0\u05ea \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 \u05de\u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05e9\u05e2\u05dc\u05d5\u05dc\u05d4 \u05d4\u05d9\u05d9\u05ea\u05d4 \u05dc\u05e2\u05dc\u05d5\u05ea \u05dc\u05d5 \u05de\u05d0\u05d5\u05ea \u05d0\u05dc\u05e4\u05d9 \u05e9\u05e7\u05dc\u05d9\u05dd. \u05db\u05da \u05d6\u05d4 \u05e2\u05d1\u05d3 \u05d1\u05e4\u05d5\u05e2\u05dc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sec-it.co.il\/en\/zero-trust-\u05de\u05ea\u05e7\u05e4\u05ea-\u05db\u05d5\u05e4\u05e8\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust \u05d6\u05d4 \u05dc\u05d0 \u05d1\u05d0\u05d6\u05d6 \u2013 \u05d6\u05d4 \u05de\u05d4 \u05e9\u05de\u05e0\u05e2 \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05d0\u05e6\u05dc \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 - IdanZabari Consultant\" \/>\n<meta property=\"og:description\" content=\"\u05d0\u05e1\u05d8\u05e8\u05d8\u05d2\u05d9\u05d9\u05ea Zero Trust \u05d4\u05e6\u05d9\u05dc\u05d4 \u05d0\u05ea \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 \u05de\u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05e9\u05e2\u05dc\u05d5\u05dc\u05d4 \u05d4\u05d9\u05d9\u05ea\u05d4 \u05dc\u05e2\u05dc\u05d5\u05ea \u05dc\u05d5 \u05de\u05d0\u05d5\u05ea \u05d0\u05dc\u05e4\u05d9 \u05e9\u05e7\u05dc\u05d9\u05dd. \u05db\u05da \u05d6\u05d4 \u05e2\u05d1\u05d3 \u05d1\u05e4\u05d5\u05e2\u05dc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sec-it.co.il\/en\/zero-trust-\u05de\u05ea\u05e7\u05e4\u05ea-\u05db\u05d5\u05e4\u05e8\/\" \/>\n<meta property=\"og:site_name\" content=\"IdanZabari Consultant\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/idan.zabari.7\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-08T05:39:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-22T03:35:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/05\/Zero-Trust.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"457\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Idan Zabari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/05\/Zero-Trust.webp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Idan Zabari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust \u05d6\u05d4 \u05dc\u05d0 \u05d1\u05d0\u05d6\u05d6 \u2013 \u05d6\u05d4 \u05de\u05d4 \u05e9\u05de\u05e0\u05e2 \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05d0\u05e6\u05dc \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 - IdanZabari Consultant","description":"\u05d0\u05e1\u05d8\u05e8\u05d8\u05d2\u05d9\u05d9\u05ea Zero Trust \u05d4\u05e6\u05d9\u05dc\u05d4 \u05d0\u05ea \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 \u05de\u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05e9\u05e2\u05dc\u05d5\u05dc\u05d4 \u05d4\u05d9\u05d9\u05ea\u05d4 \u05dc\u05e2\u05dc\u05d5\u05ea \u05dc\u05d5 \u05de\u05d0\u05d5\u05ea \u05d0\u05dc\u05e4\u05d9 \u05e9\u05e7\u05dc\u05d9\u05dd. \u05db\u05da \u05d6\u05d4 \u05e2\u05d1\u05d3 \u05d1\u05e4\u05d5\u05e2\u05dc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sec-it.co.il\/en\/zero-trust-\u05de\u05ea\u05e7\u05e4\u05ea-\u05db\u05d5\u05e4\u05e8\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust \u05d6\u05d4 \u05dc\u05d0 \u05d1\u05d0\u05d6\u05d6 \u2013 \u05d6\u05d4 \u05de\u05d4 \u05e9\u05de\u05e0\u05e2 \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05d0\u05e6\u05dc \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 - IdanZabari Consultant","og_description":"\u05d0\u05e1\u05d8\u05e8\u05d8\u05d2\u05d9\u05d9\u05ea Zero Trust \u05d4\u05e6\u05d9\u05dc\u05d4 \u05d0\u05ea \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 \u05de\u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05e9\u05e2\u05dc\u05d5\u05dc\u05d4 \u05d4\u05d9\u05d9\u05ea\u05d4 \u05dc\u05e2\u05dc\u05d5\u05ea \u05dc\u05d5 \u05de\u05d0\u05d5\u05ea \u05d0\u05dc\u05e4\u05d9 \u05e9\u05e7\u05dc\u05d9\u05dd. \u05db\u05da \u05d6\u05d4 \u05e2\u05d1\u05d3 \u05d1\u05e4\u05d5\u05e2\u05dc.","og_url":"https:\/\/sec-it.co.il\/en\/zero-trust-\u05de\u05ea\u05e7\u05e4\u05ea-\u05db\u05d5\u05e4\u05e8\/","og_site_name":"IdanZabari Consultant","article_publisher":"https:\/\/www.facebook.com\/idan.zabari.7","article_published_time":"2025-05-08T05:39:09+00:00","article_modified_time":"2025-07-22T03:35:48+00:00","og_image":[{"width":800,"height":457,"url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/05\/Zero-Trust.webp","type":"image\/webp"}],"author":"Idan Zabari","twitter_card":"summary_large_image","twitter_image":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/05\/Zero-Trust.webp","twitter_misc":{"Written by":"Idan Zabari","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/#article","isPartOf":{"@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/"},"author":{"name":"Idan Zabari","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/cfd7ba754ca3d9c3abf2ba2999f8c280"},"headline":"Zero Trust \u05d6\u05d4 \u05dc\u05d0 \u05d1\u05d0\u05d6\u05d6 \u2013 \u05d6\u05d4 \u05de\u05d4 \u05e9\u05de\u05e0\u05e2 \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05d0\u05e6\u05dc \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9","datePublished":"2025-05-08T05:39:09+00:00","dateModified":"2025-07-22T03:35:48+00:00","mainEntityOfPage":{"@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/"},"wordCount":37,"commentCount":0,"publisher":{"@id":"https:\/\/sec-it.co.il\/#organization"},"image":{"@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/#primaryimage"},"thumbnailUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/05\/Zero-Trust.webp","articleSection":["\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/","url":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/","name":"Zero Trust \u05d6\u05d4 \u05dc\u05d0 \u05d1\u05d0\u05d6\u05d6 \u2013 \u05d6\u05d4 \u05de\u05d4 \u05e9\u05de\u05e0\u05e2 \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05d0\u05e6\u05dc \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 - IdanZabari Consultant","isPartOf":{"@id":"https:\/\/sec-it.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/#primaryimage"},"image":{"@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/#primaryimage"},"thumbnailUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/05\/Zero-Trust.webp","datePublished":"2025-05-08T05:39:09+00:00","dateModified":"2025-07-22T03:35:48+00:00","description":"\u05d0\u05e1\u05d8\u05e8\u05d8\u05d2\u05d9\u05d9\u05ea Zero Trust \u05d4\u05e6\u05d9\u05dc\u05d4 \u05d0\u05ea \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9 \u05de\u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05e9\u05e2\u05dc\u05d5\u05dc\u05d4 \u05d4\u05d9\u05d9\u05ea\u05d4 \u05dc\u05e2\u05dc\u05d5\u05ea \u05dc\u05d5 \u05de\u05d0\u05d5\u05ea \u05d0\u05dc\u05e4\u05d9 \u05e9\u05e7\u05dc\u05d9\u05dd. \u05db\u05da \u05d6\u05d4 \u05e2\u05d1\u05d3 \u05d1\u05e4\u05d5\u05e2\u05dc.","breadcrumb":{"@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/#primaryimage","url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/05\/Zero-Trust.webp","contentUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/05\/Zero-Trust.webp","width":800,"height":457,"caption":"Zero Trust"},{"@type":"BreadcrumbList","@id":"https:\/\/sec-it.co.il\/zero-trust-%d7%9e%d7%aa%d7%a7%d7%a4%d7%aa-%d7%9b%d7%95%d7%a4%d7%a8\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sec-it.co.il\/"},{"@type":"ListItem","position":2,"name":"Zero Trust \u05d6\u05d4 \u05dc\u05d0 \u05d1\u05d0\u05d6\u05d6 \u2013 \u05d6\u05d4 \u05de\u05d4 \u05e9\u05de\u05e0\u05e2 \u05de\u05ea\u05e7\u05e4\u05ea \u05db\u05d5\u05e4\u05e8 \u05d0\u05e6\u05dc \u05d4\u05dc\u05e7\u05d5\u05d7 \u05e9\u05dc\u05d9"}]},{"@type":"WebSite","@id":"https:\/\/sec-it.co.il\/#website","url":"https:\/\/sec-it.co.il\/","name":"IdanZabari Consultant","description":"","publisher":{"@id":"https:\/\/sec-it.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sec-it.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sec-it.co.il\/#organization","name":"IdanZabari Consultant","url":"https:\/\/sec-it.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/blog1.jpg","contentUrl":"https:\/\/sec-it.co.il\/wp-content\/uploads\/2025\/03\/blog1.jpg","width":517,"height":244,"caption":"IdanZabari Consultant"},"image":{"@id":"https:\/\/sec-it.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/idan.zabari.7","https:\/\/www.linkedin.com\/in\/idan-zabari\/"]},{"@type":"Person","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/cfd7ba754ca3d9c3abf2ba2999f8c280","name":"Idan Zabari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sec-it.co.il\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5a419db52cf16c061d540c62de30ee19bea96079b9901c8724b52c1ecb2958d2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5a419db52cf16c061d540c62de30ee19bea96079b9901c8724b52c1ecb2958d2?s=96&d=mm&r=g","caption":"Idan Zabari"}}]}},"_links":{"self":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts\/1714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/comments?post=1714"}],"version-history":[{"count":0,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/posts\/1714\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/media\/1715"}],"wp:attachment":[{"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/media?parent=1714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/categories?post=1714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sec-it.co.il\/en\/wp-json\/wp\/v2\/tags?post=1714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}