{"id":43535,"date":"2021-10-21T17:00:12","date_gmt":"2021-10-21T17:00:12","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=98736"},"modified":"2021-10-21T17:00:12","modified_gmt":"2021-10-21T17:00:12","slug":"how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/","title":{"rendered":"How Microsoft is partnering with vendors to provide Zero Trust solutions"},"content":{"rendered":"<p>As workplaces around the world embrace hybrid work, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\">Zero Trust<\/a> provides the guiding strategy that keeps companies secure. However, no two organizations are alike. The Zero Trust journey will look unique for every organization that implements it. This means we must work together to create solutions that support the varied workplaces that exist today.<\/p>\n<p>At Microsoft, our mission is to create an amazing Zero Trust platform that protects our customers no matter what solutions they use. We realize that our customers use products that work well for them, and so we strive to meet them where they are. Our solutions are from Microsoft, but not just for Microsoft.<\/p>\n<p>To this end, we have established integrations with a wide variety of service providers and applications to support varied solutions and environments. For example, in addition to Microsoft apps, Microsoft Azure Active Directory (Azure AD) supports third-party and on-premises apps which are <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/27\/the-state-of-apps-by-microsoft-identity-azure-ad-app-gallery-apps-that-made-the-most-impact-in-2020\/\" target=\"_blank\" rel=\"noopener\">incredibly impactful for our customers<\/a>. Our recent analysis of the usage of the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access-management\/integrated-apps-azure-ad\" target=\"_blank\" rel=\"noopener\">Azure AD app gallery<\/a> showed that some of the fastest-growing applications are security tools like Citrix ADC, Palo Alto Networks Prisma Access, and Zscaler Private Access, which help employees securely access any application regardless of location. These integrations have been key for our customers as they secure remote access to applications and resources from anywhere.<\/p>\n<p>Additionally, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/#overview\" target=\"_blank\" rel=\"noopener\">Azure Sentinel<\/a> has added many built-in data connectors with leading security providers so our customers can easily deploy these solutions. Once Microsoft engineering teams validate these integrations, we feature these third-party solutions as part of the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/intelligent-security-association\" target=\"_blank\" rel=\"noopener\">Microsoft Intelligent Security Association<\/a> (MISA), which now includes over 175 independent software vendor (ISV) members and 250 integrations. Our joint integrations offer security solutions that meet the full breadth of our customers\u2019 needs.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-98751 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/ISV-Zero-Trust.png\" alt=\"Descriptive graphic showing the three levels of MISA membership, noting more than 175 ISV members, more than 250 app integrations, and more than 250 offers in Azure Marketplace.\" width=\"678\" height=\"365\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/ISV-Zero-Trust.png 678w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/ISV-Zero-Trust-300x162.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/ISV-Zero-Trust-389x209.png 389w\" sizes=\"auto, (max-width: 678px) 100vw, 678px\"><\/p>\n<p>We\u2019re also approaching partners and providing integration guidance to take the lead in solving our customers\u2019 problems. Our goal is to be transparent and helpful so that partners know how they can integrate with us to extend their own solutions. That\u2019s why we recently published <a href=\"https:\/\/docs.microsoft.com\/security\/zero-trust\/integrate\/overview\" target=\"_blank\" rel=\"noopener\">Zero Trust partner integration guidance<\/a>, which covers a wide range of integration opportunities with Microsoft products that support Zero Trust for our customers. We recognize that security is a team sport. These integrations will help our customers maximize their Microsoft investments as well as the investments they\u2019ve already made in existing solutions.<\/p>\n<p>Microsoft is proud to recognize a diverse slate of global companies with cybersecurity solutions that enhance support for our customers as they move towards an end-to-end Zero Trust security posture. The infographic below illustrates the range of additive offers for each of the core pillars of Zero Trust, supporting integrations across a wide variety of products and partners.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-98754 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/ISV-partners.png\" alt=\"Logos of participating vendors who contribute to a Zero Trust approach as part of the MISA program. The list includes: vendors Yubico, SailPoint, Thales and Imprivata for Identity solutions; Jamf, MobileIron, IBM, Lookout and Pradeo for Endpoints; Adobe, Secude, Box and Netskope for Data; HasiCorp; Check Point; Akamai and NGINX for Apps; Baracuda, Qualys, Imperva and Tenable for Infrastructure; and Zscaler, Citrix, F5, and NetFoundry as Network vendors.\" width=\"654\" height=\"683\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/ISV-partners.png 654w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/ISV-partners-287x300.png 287w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\"><\/p>\n<p>These integrated solutions provide real value for our customers. For example, when all its employees transitioned to work from home, Johnson Controls\u2019 VPN solution for remote employee access was overwhelmed. To address this, they <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/johnson-controls-makes-working-from-home-easier-and-more-secure\/ba-p\/1257348\" target=\"_blank\" rel=\"noopener\">deployed an integration between Azure AD and Zscaler Private Access<\/a> to strengthen their Zero Trust posture and improve employee experience. Dimitar Zlatarev, a Senior Manager on the Identity and Access Management (IAM) Team at Johnson Controls, explained that deploying the integration was simple, with 50,000 employees onboarded by the third week. It improved their security posture and \u201cWhen employees learned how convenient it was, they asked to be enabled.\u201d<\/p>\n<h2>Learn more<\/h2>\n<p>We have resources for you to get started finding a solution and to see the kinds of integrations we support. Our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/find-a-partner\" target=\"_blank\" rel=\"noopener\">security partners page<\/a> includes links for finding security solution provides and ISVs, as well as how to become a partner. In addition, our <a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/zero-trust\/integrate\/overview\" target=\"_blank\" rel=\"noopener\">Zero Trust integration guidance<\/a> explains how ISVs can integrate with Microsoft to create <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\">Zero Trust<\/a> solutions. With these integrations, we provide solutions for the broad diversity of our customers.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/10\/21\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No two organizations are alike. But our integrations with independent software vendors (ISVs) support Zero Trust in a diverse set of environments.<br \/>\nThe post How Microsoft is partnering with vendors to provide Zero Trust solutions appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43536,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,3677],"class_list":["post-43535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Microsoft is partnering with vendors to provide Zero Trust solutions 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Microsoft is partnering with vendors to provide Zero Trust solutions 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-21T17:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png\" \/>\n\t<meta property=\"og:image:width\" content=\"678\" \/>\n\t<meta property=\"og:image:height\" content=\"365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Microsoft is partnering with vendors to provide Zero Trust solutions\",\"datePublished\":\"2021-10-21T17:00:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png\",\"keywords\":[\"Cybersecurity\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/\",\"name\":\"How Microsoft is partnering with vendors to provide Zero Trust solutions 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png\",\"datePublished\":\"2021-10-21T17:00:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png\",\"width\":678,\"height\":365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Microsoft is partnering with vendors to provide Zero Trust solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Microsoft is partnering with vendors to provide Zero Trust solutions 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/","og_locale":"en_US","og_type":"article","og_title":"How Microsoft is partnering with vendors to provide Zero Trust solutions 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-21T17:00:12+00:00","og_image":[{"width":678,"height":365,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Microsoft is partnering with vendors to provide Zero Trust solutions","datePublished":"2021-10-21T17:00:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/"},"wordCount":679,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png","keywords":["Cybersecurity","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/","url":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/","name":"How Microsoft is partnering with vendors to provide Zero Trust solutions 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png","datePublished":"2021-10-21T17:00:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions.png","width":678,"height":365},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-microsoft-is-partnering-with-vendors-to-provide-zero-trust-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"How Microsoft is partnering with vendors to provide Zero Trust solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43535"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43535\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43536"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}