{"id":47478,"date":"2022-07-12T14:21:35","date_gmt":"2022-07-12T14:21:35","guid":{"rendered":"https:\/\/www.darkreading.com\/operations\/deloitte-launches-zero-trust-access-a-new-managed-security-service"},"modified":"2022-07-12T14:21:35","modified_gmt":"2022-07-12T14:21:35","slug":"deloitte-launches-zero-trust-access-a-new-managed-security-service","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/","title":{"rendered":"Deloitte Launches Zero Trust Access, a New Managed Security Service"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>NEW YORK, July 11, 2022 \/PRNewswire\/ &#8212; To help organizations adopt zero trust more quickly and efficiently, Deloitte is launching a new managed service \u2013 <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=2908871999&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fpages%2Fadvisory%2Farticles%2Fzero-trust-strategy-insights.html%3Fid%3Dus%3A2el%3A3pr%3Aztams%3Aawa%3Aadv%3A071122%3Azta&amp;a=Zero+Trust+Access\" rel=\"nofollow noopener\" target=\"_blank\">Zero Trust Access<\/a>\u2014 that offers a cloud-native approach to securing communications between users, on any device, and enterprise applications, wherever they may reside. <\/p>\n<p>The Zero Trust concept commits to removing implicit trust within an information technology (IT) ecosystem and replacing it with a risk-based approach to accessing organizational resources across identities, workloads, data, networks and devices. This trend is gaining momentum, given legacy approaches to security architecture are no longer suitable to secure the ubiquitous nature of the modern enterprise.<\/p>\n<p>Part of the newly expanded Zero Trust by Deloitte, Zero Trust Access facilitates zero trust adoption and the evolving needs of organizations in protecting their applications, infrastructure, and data. Following the integration of <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=1315846918&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fpages%2Fabout-deloitte%2Farticles%2Fpress-releases%2Fdeloitte-acquires-zero-trust-network-access-provider.html%3Fid%3Dus%3A2el%3A3pr%3Aztams%3Aawa%3Aadv%3A071122%3Atrx&amp;a=recently+acquired+talent+and+technology\" rel=\"nofollow noopener\" target=\"_blank\">recently acquired talent and technology<\/a> into existing Deloitte services, the Zero Trust Access managed service connects users to applications through a frictionless cloud-native solution that is inherently scalable, resilient, agile, and secure. Further, the managed service is available standalone, integrated with other Deloitte offerings, or as part of a broader solution leveraging technologies from Deloitte&#8217;s alliances ecosystem.<\/p>\n<p>&#8220;As perimeter-based approaches are no longer suitable to secure the modern enterprise, many organizations are working to enhance protection for their IT ecosystems via zero trust,&#8221; said <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=1064711003&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fprofiles%2Fandrew-rafla.html%3Fid%3Dus%3A2el%3A3pr%3Aztams%3Aawa%3Aadv%3A071122%3Araf&amp;a=Andrew+Rafla\" rel=\"nofollow noopener\" target=\"_blank\">Andrew Rafla<\/a>, <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=3173977697&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fservices%2Fadvisory.html%3Fid%3Dus%3A2el%3A3pr%3Aztams%3Aawa%3Aadv%3A071122%3Arfa&amp;a=Deloitte+Risk+%26+Financial+Advisory%27s\" rel=\"nofollow noopener\" target=\"_blank\">Deloitte Risk &amp; Financial Advisory&#8217;s<\/a> <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=1723146432&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fpages%2Fadvisory%2Farticles%2Fzero-trust-strategy-insights.html%3Fid%3Dus%3A2el%3A3pr%3Aztams%3Aawa%3Aadv%3A071122%3Azta&amp;a=zero+trust\" rel=\"nofollow noopener\" target=\"_blank\">zero trust<\/a> offering leader and principal, Deloitte &amp; Touche LLP. &#8220;Zero Trust Access was built as a turnkey managed service helping ourselves and our clients accelerate adoption of this transformative security framework. Our goal was to create a cost-effective solution that can be delivered standalone or complementary to a broader ecosystem and ultimately help decrease the burden on IT and security teams who likely need to manage multiple heterogenous solutions to achieve similar outcomes.&#8221;<\/p>\n<p>With innovative data protection leveraging device-level secure microcontainer technology, Zero Trust Access helps protect infrastructure while also enabling organizations to protect sensitive enterprise data and enforce least privilege through dynamic access control to enterprise assets. The managed service can replace remote access solutions inclusive of virtual private network (VPN), virtual desktop infrastructure (VDI), and desktop as a service (DaaS), all of which typically require significant capital expenditure for infrastructure, high operating costs, and technology management overhead.<\/p>\n<p>Zero Trust Access includes features such as ephemeral connectivity built upon secure peer-to-peer (P2P) communication, conditional access and continuous authorization, as well as robust data protection for data at-rest, in-use, and in-transit are consistently applied to each session, regardless of the type or location of the applications being accessed (e.g., legacy hosted applications, software as a service (SaaS), thick-client, web-based applications). Implementation of Zero Trust Access can help organizations leverage outcome-based solutions that improve business agility, enhance user productivity, and reduce cost and complexity of security operations. <\/p>\n<p>&#8220;Beginning zero trust adoption isn&#8217;t simple, fast or easy for most organizations,&#8221; <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=3791694027&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fprofiles%2Fdebgolden.html%3Fid%3Dus%3A2el%3A3pr%3Aztams%3Aawa%3Aadv%3A071122%3Agol&amp;a=Deborah+Golden\" rel=\"nofollow noopener\" target=\"_blank\">Deborah Golden<\/a>, <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=4166300979&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fservices%2Fadvisory.html%3Fid%3Dus%3A2el%3A3pr%3Aztams%3Aawa%3Aadv%3A071122%3Arfa&amp;a=Deloitte+Risk+%26+Financial+Advisory\" rel=\"nofollow noopener\" target=\"_blank\">Deloitte Risk &amp; Financial Advisory<\/a> <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=1466561744&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fpages%2Frisk%2Fsolutions%2Fcyber-risk-services.html%3Fid%3Dus%3A2el%3A3pr%3Aztams%3Aawa%3Aadv%3A071122%3Acyb&amp;a=Cyber+and+Strategic+Risk\" rel=\"nofollow noopener\" target=\"_blank\">Cyber and Strategic Risk<\/a> leader and principal, Deloitte &amp; Touche LLP. &#8220;We&#8217;re launching Zero Trust Access as the first in many adoption-enabling services and solutions to come, so that our clients are better able to modernize their security programs, enable agile operations and confidently advance with emerging technologies and transformative risk management principles that can build more resilient security practices.&#8221;<\/p>\n<p><strong>About Deloitte<\/strong><\/p>\n<p>Deloitte provides industry-leading audit, consulting, tax and advisory services to many of the world&#8217;s most admired brands, including nearly 90% of the Fortune 500\u00ae and more than 7,000 private companies. Our people <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=3240650616&amp;u=https%3A%2F%2Fwww2.deloitte.com%2Fus%2Fen%2Fpages%2Fabout-deloitte%2Farticles%2Fcome-together-corporate-social-impact.html&amp;a=come+together\" rel=\"nofollow noopener\" target=\"_blank\">come together<\/a> for the greater good and work across the industry sectors that drive and shape today&#8217;s marketplace \u2014 delivering measurable and lasting results that help reinforce public trust in our capital markets, inspire clients to see challenges as opportunities to transform and thrive, and help lead the way toward a stronger economy and a healthier society. Deloitte is proud to be part of the largest global professional services network serving our clients in the markets that are most important to them. Building on more than 175 years of service, our network of member firms spans more than 150 countries and territories. Learn how Deloitte&#8217;s more than 345,000 people worldwide connect for impact at <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=948290270&amp;u=http%3A%2F%2Fwww.deloitte.com%2F&amp;a=www.deloitte.com\" rel=\"nofollow noopener\" target=\"_blank\">www.deloitte.com<\/a>.<\/p>\n<p>Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (&#8220;DTTL&#8221;), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as &#8220;Deloitte Global&#8221;) does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the &#8220;Deloitte&#8221; name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see <a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3590429-1&amp;h=395953646&amp;u=http%3A%2F%2Fwww.deloitte.com%2Fabout&amp;a=www.deloitte.com%2Fabout\" rel=\"nofollow noopener\" target=\"_blank\">www.deloitte.com\/about<\/a> to learn more about our global network of member firms.<\/p>\n<p>SOURCE Deloitte<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/operations\/deloitte-launches-zero-trust-access-a-new-managed-security-service\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>.Read More <a href=\"https:\/\/www.darkreading.com\/operations\/deloitte-launches-zero-trust-access-a-new-managed-security-service\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-47478","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deloitte Launches Zero Trust Access, a New Managed Security Service 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deloitte Launches Zero Trust Access, a New Managed Security Service 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-12T14:21:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Deloitte Launches Zero Trust Access, a New Managed Security Service\",\"datePublished\":\"2022-07-12T14:21:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/\"},\"wordCount\":830,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/\",\"name\":\"Deloitte Launches Zero Trust Access, a New Managed Security Service 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\",\"datePublished\":\"2022-07-12T14:21:35+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#primaryimage\",\"url\":\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\",\"contentUrl\":\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deloitte Launches Zero Trust Access, a New Managed Security Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deloitte Launches Zero Trust Access, a New Managed Security Service 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/","og_locale":"en_US","og_type":"article","og_title":"Deloitte Launches Zero Trust Access, a New Managed Security Service 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-12T14:21:35+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Deloitte Launches Zero Trust Access, a New Managed Security Service","datePublished":"2022-07-12T14:21:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/"},"wordCount":830,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/","url":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/","name":"Deloitte Launches Zero Trust Access, a New Managed Security Service 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2022-07-12T14:21:35+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/deloitte-launches-zero-trust-access-a-new-managed-security-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Deloitte Launches Zero Trust Access, a New Managed Security Service"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47478"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47478\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}