{"id":38280,"date":"2020-11-19T19:00:41","date_gmt":"2020-11-19T19:00:41","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92221"},"modified":"2020-11-19T19:00:41","modified_gmt":"2020-11-19T19:00:41","slug":"modernize-secure-access-for-your-on-premises-resources-with-zero-trust","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/","title":{"rendered":"Modernize secure access for your on-premises resources with Zero Trust"},"content":{"rendered":"<p>Change came quickly in 2020. More likely than not, a big chunk of your workforce has been forced into remote access. And with remote work came an explosion of bring-your-own-device (BYOD) scenarios, requiring your organization to extend the bounds of your network to include the entire internet (and the added security risks that come with it).<\/p>\n<p>At this year\u2019s Microsoft Ignite, we demonstrated how to bring your legacy on-premises resources into a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust<\/a> security model that provides seamless access to all\u2014SaaS, IaaS, PaaS, and on-premises\u2014with a global presence and no extra steps to remember. You\u2019re invited to watch our <a href=\"https:\/\/myignite.microsoft.com\/sessions\/dfea74c0-735f-42c6-9c1d-2483bb974f85\" target=\"_blank\" rel=\"noopener noreferrer\">full presentation<\/a> and review the highlights below.<\/p>\n<h2>The new decentralized workplace<\/h2>\n<p>Organizations that steadfastly relied on the \u201cflat network\u201d approach of firewalls and VPNs to regulate access now find themselves lacking the visibility, solution integration, and agility needed to deliver end-to-end security. A new model needed to adapt to a remote workforce, protecting people, devices, applications, and data\u2014from anywhere.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92222 size-full aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignite-1.png\" alt=\"Legacy access model \" width=\"1391\" height=\"785\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignite-1.png 1391w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignite-1-300x169.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignite-1-1024x578.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignite-1-768x433.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignite-1-539x303.png 539w\" sizes=\"auto, (max-width: 1391px) 100vw, 1391px\"><\/p>\n<p><em>Figure 1: Legacy access model <\/em><\/p>\n<p>In a Zero Trust security model, every access request is strongly inspected for anomalies before granting access. Everything from the user\u2019s identity to the application\u2019s hosting environment is authenticated and authorized using micro-segmentation and least privileged-access principles to minimize lateral movement.<\/p>\n<p>Zero Trust means adhering to three cohesive principles:<\/p>\n<ul>\n<li><strong>Verify explicitly:<\/strong> Always authenticate and authorize based on all available data points, including\u2014user identity, location, device health, service or workload, data classification, and anomalies.<\/li>\n<li><strong>Use least privileged access:<\/strong> Limit user access with just-in-time (JIT) and just-enough-access (JEA), risk-based adaptive polices, and data protection to help secure both data and productivity.<\/li>\n<li><strong>Assume breach:<\/strong> Minimize the blast radius and prevent lateral movement by segmenting access by network, user, devices, and app awareness. Verify all sessions are encrypted and use analytics to gain visibility, drive threat detection, and improve defenses.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92224 size-full aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2.png\" alt=\"Microsoft Zero Trust model\" width=\"1395\" height=\"784\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2.png 1395w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2-300x169.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2-1024x575.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2-768x432.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2-687x385.png 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2-1083x609.png 1083w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2-767x431.png 767w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-2-539x303.png 539w\" sizes=\"auto, (max-width: 1395px) 100vw, 1395px\"><\/p>\n<p><em>Figure 2: Microsoft Zero Trust model<\/em><\/p>\n<p>In the diagram above, you can see how access is unified across users, devices, and networks; all the various conditions that feed into the risk of a session. Acting as a gateway, the access policy is unified across your resources\u2014SaaS, IaaS, PaaS, on-premises, or in the cloud. This is true whether it\u2019s Azure, Amazon Web services (AWS), Google Cloud Platform (GCP) or some other cloud. In the event of a breach, rich intelligence, and analytics help us identify what happened and how to prevent it from happening again.<\/p>\n<h2>Cybersecurity for our time<\/h2>\n<p>The right security solution for our new perimeterless workplace employs the principles of Zero Trust, allowing users access only to the specific applications they need rather than the entire network. Because Zero Trust access is tied to the user\u2019s identity, it allows IT departments to quickly onboard new and remote users, often on non-corporate devices, scoping permissions appropriately.<\/p>\n<p>A cybersecurity model for today\u2019s digital estate should include:<\/p>\n<p>For the end-user:<\/p>\n<ul>\n<li>Access to all resources: SaaS, IaaS, PaaS, on-premises.<\/li>\n<li>Seamless experience: No extra steps or unique URLs to remember.<\/li>\n<li>Great performance: Proxy services should have a global presence and use geo-location.<\/li>\n<\/ul>\n<p>For the security\/IT admin:<\/p>\n<ul>\n<li>Segmentation by app, not network.<\/li>\n<li>Adaptive access based on the principles of Zero Trust.<\/li>\n<li>Reduce infrastructure complexity and maintenance.<\/li>\n<\/ul>\n<h2>Connect apps to an identity based, secure access solution<\/h2>\n<p>With <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Azure Active Directory<\/a> (Azure AD), it\u2019s easy to connect all your applications through a single identity-based control plane. When it comes to cloud apps, Azure AD supports standard authentication modes such as Security Assertion Markup Language (SAML) and OpenID Connect (OIDC). To accommodate new apps your organization may be developing, Azure AD also provides tools and software development kits (SDK) to help you integrate these as well.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92232 size-large\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/Screenshot-106-1024x569.png\" alt width=\"1024\" height=\"569\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/Screenshot-106-1024x569.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/Screenshot-106-300x167.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/Screenshot-106-768x427.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/Screenshot-106-1536x854.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/Screenshot-106.png 1955w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p><em>Figure 3: Microsoft Azure Active Directory<\/em><\/p>\n<p>When it comes to classic or on-premises applications, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/what-is-application-proxy\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD Application Proxy<\/a> enables your security team to easily apply the same policies and security controls used for cloud apps to your on-premises apps. All that\u2019s needed is to install a lightweight agent called a connector onto your Windows server, allowing a connection point to your on-premises network. In this way, one connector group can be configured to serve multiple back-end applications, giving you the freedom to architect a truly micro-segmented solution.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92226 size-full aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-5.png\" alt=\"Azure Active Directory Application Proxy\" width=\"1383\" height=\"768\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-5.png 1383w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-5-300x167.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-5-1024x569.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-5-768x426.png 768w\" sizes=\"auto, (max-width: 1383px) 100vw, 1383px\"><\/p>\n<p><em>Figure 4: Azure Active Directory Application Proxy<\/em><\/p>\n<p>Azure AD Application Proxy Connectors use outbound connections as well; meaning, no additional inbound firewall rules need to be opened. Also, it doesn\u2019t require placement in a demilitarized zone (DMZ), as was the case with the legacy <a href=\"https:\/\/en.wikipedia.org\/wiki\/Purdue_Enterprise_Reference_Architecture\" target=\"_blank\" rel=\"noopener noreferrer\">Purdue Model<\/a>. Your apps won\u2019t need to change, and Azure AD Application Proxy also supports multiple authentication modes; so your users can still get a single sign-on (SSO) experience. Users can then access the app from an external URL using any device\u2014no VPN required.<\/p>\n<p>Azure AD pre-authenticates every request, ensuring that only verified traffic ever gets to your app; thus giving you another layer of protection. In addition, any conditional access policies you\u2019ve set up can be enforced at that point.<\/p>\n<h2>Protecting you in real-time<\/h2>\n<p>Microsoft Cloud App Security integrates natively with Azure AD conditional access to extend real-time security into the session for both your cloud and on-premises applications. This native Microsoft solution stack ensures that your on-premises applications will still boot up quickly and look the same. The difference is you\u2019re now able to control granular actions, such as uploads, downloads, and cut, copy, and paste, based on the sensitivity of the data. For example, users accessing an on-premises instance of Team Foundation Server (TFS) through the App Proxy can use Cloud App Security to enable developers to make code changes but block their ability to download files onto an unmanaged device. Many other scenarios are supported like, blocking malware in file upload attempts to ensure that your on-premises infrastructure remains secure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92227 size-full aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-6.png\" alt=\"Malware detection screen\" width=\"475\" height=\"340\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-6.png 475w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/ignit-6-300x215.png 300w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\"><\/p>\n<p><em>Figure 5: Malware detection screen<\/em><\/p>\n<h2>See what else Azure AD and Microsoft Cloud App Security can do<\/h2>\n<p>At Microsoft, we believe that tight integration between identity and security is pivotal to your Zero Trust strategy, and we are constantly innovating in this area. To see some of the existing capabilities described in this blog come to life, watch the archived presentation for <a href=\"https:\/\/myignite.microsoft.com\/sessions\/dfea74c0-735f-42c6-9c1d-2483bb974f85\" target=\"_blank\" rel=\"noopener noreferrer\">demonstrations of the powerful capabilities that Microsoft identity and security tools enable for your on-premises applications.<\/a> Learn how you can easily set controls to allow or block access, require a password reset, block legacy authorization, require multifactor authentication, control sessions in real-time, and more.<\/p>\n<p>To learn more about Microsoft Security solutions <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our&nbsp;website<\/a>.&nbsp; Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/11\/19\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Change came quickly in 2020. More likely than not, a big chunk of your workforce has been forced into remote access. And with remote work came an explosion of bring-your-own-device (BYOD) scenarios, requiring your organization to extend the bounds of your network to include the entire internet (and the added security risks that come with&#8230;<br \/>\nThe post Modernize secure access for your on-premises resources with Zero Trust appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38281,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,3677],"class_list":["post-38280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Modernize secure access for your on-premises resources with Zero Trust 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modernize secure access for your on-premises resources with Zero Trust 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-19T19:00:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1391\" \/>\n\t<meta property=\"og:image:height\" content=\"785\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Modernize secure access for your on-premises resources with Zero Trust\",\"datePublished\":\"2020-11-19T19:00:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/\"},\"wordCount\":1120,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png\",\"keywords\":[\"Cybersecurity\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/\",\"name\":\"Modernize secure access for your on-premises resources with Zero Trust 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png\",\"datePublished\":\"2020-11-19T19:00:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png\",\"width\":1391,\"height\":785},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Modernize secure access for your on-premises resources with Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Modernize secure access for your on-premises resources with Zero Trust 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Modernize secure access for your on-premises resources with Zero Trust 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-19T19:00:41+00:00","og_image":[{"width":1391,"height":785,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Modernize secure access for your on-premises resources with Zero Trust","datePublished":"2020-11-19T19:00:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/"},"wordCount":1120,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png","keywords":["Cybersecurity","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/","url":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/","name":"Modernize secure access for your on-premises resources with Zero Trust 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png","datePublished":"2020-11-19T19:00:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust.png","width":1391,"height":785},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/modernize-secure-access-for-your-on-premises-resources-with-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Modernize secure access for your on-premises resources with Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38280"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38280\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38281"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}