{"id":15792,"date":"2022-08-21T02:19:02","date_gmt":"2022-08-21T02:19:02","guid":{"rendered":"https:\/\/www.swimage.com\/staging\/?page_id=15792"},"modified":"2022-09-03T20:29:29","modified_gmt":"2022-09-03T20:29:29","slug":"zero-trust-security","status":"publish","type":"page","link":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/","title":{"rendered":"Zero Trust Security"},"content":{"rendered":"\n<div class=\"wp-block-group billboard billboard--secondary\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group billboard__body\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h1 class=\"billboard__title wp-block-heading\">Zero Trust Security <\/h1>\n<\/div><\/div>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/ZeroTrust-S.png\" alt=\"\" class=\"wp-image-15804\" width=\"400\" height=\"224\"\/><\/figure><\/div>\n\n\n<p><!-- \/wp:post-content --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- \/wp:group --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Swimage is a fundamental component of zero trust security frameworks.  Swimage integrates with security stacks and ensures that all PCs, regardless of location, remain secure, healthy, and compliant.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Swimage leverages a combination of templates, compliance rules, triggers, and actions to provision, build, and enforce a PC\u2019s desired state.  This ensures that PCs are built to your precise specifications and that the PCs remain in that state throughout their life.  If a PC is found to be out of compliance for any reason, Swimage automatically and immediately takes action to resolve the issue.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>The following are some of the ways Swimage fulfills zero trust security requirements:<\/p>\n<div class=\"wp-block-group layout-block\">\n<div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group layout-block__grid col3\">\n<div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group card\">\n<div class=\"wp-block-group__inner-container\"><!-- wp:image {\"id\":15801,\"sizeSlug\":\"large\",\"linkDestination\":\"none\",\"className\":\"card__figure\"} --><p><\/p>\n<figure class=\"wp-block-image size-large card__figure\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15810 size-large\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/Monitor2-M.png\" alt=\"\" width=\"680\" height=\"383\"><\/figure>\n<figure><\/figure>\n<figure class=\"wp-block-image size-large card__figure\"><strong><span style=\"color: inherit; font-size: 1.56em;\">Continuous Monitoring and Verification<\/span><\/strong><\/figure>\n<div class=\"wp-block-group card__main\">\n<div class=\"wp-block-group__inner-container\">\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>To fulfill the zero trust security requirement of continuous monitoring and verification, Swimage:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li>Continuously retrieves updated compliance rules from a central server and instantly enforces those rules to ensure all PCs remain healthy and compliant.<\/li>\n<li>Monitors the software and security stack and remediates immediately if the stack is not aligned with policy.  This includes restarting services, reinstalling software, locking the PC, or other actions as needed.<\/li>\n<li>Monitors for changes in state, such as IP, location, software, network usage, etc.  State changes may trigger reauthentication, as needed.<\/li>\n<li>Maintains and confirms the \u201cknown good sources\u201d when repairing or rebuilding a system.  This ensures that no application or OS component will be compromised.<\/li>\n<li>Prevents user interaction or login until the entire security stack has been applied and is functional.<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<\/div>\n<\/div>\n<p><!-- \/wp:group --><\/p>\n<\/div>\n<\/div>\n<p><!-- \/wp:group --><\/p>\n<p><!-- wp:group {\"className\":\"card\"} --><\/p>\n<div class=\"wp-block-group card\">\n<div class=\"wp-block-group__inner-container\"><!-- wp:image {\"id\":15798,\"sizeSlug\":\"large\",\"linkDestination\":\"none\",\"className\":\"card__figure\"} --><p><\/p>\n<figure class=\"wp-block-image size-large card__figure\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" class=\"wp-image-15798\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/BusinessContinuity-S.png\" alt=\"\" srcset=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/BusinessContinuity-S.png 640w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/BusinessContinuity-S-300x200.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n<figure><\/figure>\n<figure class=\"wp-block-image size-large card__figure\"><strong style=\"color: inherit; font-size: 1.56em;\">Limit the Impact of a Breach<\/strong><\/figure>\n<div class=\"wp-block-group card__main\">\n<div class=\"wp-block-group__inner-container\">\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>To fulfill the zero trust security requirement to limit the impact of a breach, Swimage:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul id=\"block-168c3538-04de-40d4-aa4c-28ee878aec34\">\n<li>Locks access to critical system files in order to maintain system integrity.<\/li>\n<li>Encrypts all server communication with private key hashes with multiple verification points.<\/li>\n<li>Responds in seconds to a breach and takes appropriate action to remediate the problem across the entire network.<\/li>\n<li>Immediately disables the network, locks the system, and initiates a full redeployment from validated sources.<\/li>\n<li>Executes actions regardless of PC location or state.<\/li>\n<li>Rebuilds the entire system &#8211; restoring all applications, security policies, settings, and data from known good sources.<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<\/div>\n<\/div>\n<p><!-- \/wp:group --><\/p>\n<\/div>\n<\/div>\n<p><!-- \/wp:group --><\/p>\n<p><!-- wp:group {\"className\":\"card\"} --><\/p>\n<div class=\"wp-block-group card\">\n<div class=\"wp-block-group__inner-container\"><!-- wp:image {\"id\":15799,\"sizeSlug\":\"large\",\"linkDestination\":\"none\",\"className\":\"card__figure\"} --><p><\/p>\n<figure class=\"wp-block-image size-large card__figure\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"482\" class=\"wp-image-15799\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/AI3.jpeg\" alt=\"\" srcset=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/AI3.jpeg 724w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/AI3-300x200.jpeg 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/figure>\n<figure><\/figure>\n<figure class=\"wp-block-image size-large card__figure\"><strong><span style=\"color: inherit; font-size: 1.56em;\">Fully Automate Data Analytics and Responses<\/span><\/strong><\/figure>\n<div class=\"wp-block-group card__main\">\n<div class=\"wp-block-group__inner-container\">\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>To fulfill the zero trust security requirement to fully automate data analytics and responses, Swimage:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li>Provides administrators full visibility into the current status of all endpoints with an intuitive and customizable portal.<\/li>\n<li>Monitors and applies instant lock or remediation actions based on configurable rules.<\/li>\n<li>Takes actions using graduated alert levels, including actions to report, lockout, remediate, or redeploy.<\/li>\n<li>Provides real-time status data processing and rule enforcement using automated response mechanisms.<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<\/div>\n<\/div>\n<p><!-- \/wp:group --><\/p>\n<\/div>\n<\/div>\n<p><!-- \/wp:group --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<\/div>\n<\/div>\n<p><!-- \/wp:group --><\/p>\n<\/div>\n<\/div>\n<p><!-- \/wp:group --><\/p>","protected":false},"excerpt":{"rendered":"<p>Zero Trust Security Swimage is a fundamental component of zero trust security frameworks. Swimage integrates with security stacks and ensures that all PCs, regardless of<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":11636,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-portfolio.php","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-15792","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust Security &#8226; Endpoint Management - Swimage<\/title>\n<meta name=\"description\" content=\"Integrate with security stacks and ensure that all PCs, regardless of location, remain secure, healthy, and compliant.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Security &#8226; Endpoint Management - Swimage\" \/>\n<meta property=\"og:description\" content=\"Integrate with security stacks and ensure that all PCs, regardless of location, remain secure, healthy, and compliant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Swimage\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Swimage-154425397911672\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-03T20:29:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/ZeroTrust-S.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@SwimageNow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/zero-trust-security\\\/\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/zero-trust-security\\\/\",\"name\":\"Zero Trust Security &#8226; Endpoint Management - Swimage\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/zero-trust-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/zero-trust-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/ZeroTrust-S.png\",\"datePublished\":\"2022-08-21T02:19:02+00:00\",\"dateModified\":\"2022-09-03T20:29:29+00:00\",\"description\":\"Integrate with security stacks and ensure that all PCs, regardless of location, remain secure, healthy, and compliant.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/zero-trust-security\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/zero-trust-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/zero-trust-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/ZeroTrust-S.png\",\"contentUrl\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/ZeroTrust-S.png\",\"width\":470,\"height\":265},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/zero-trust-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Benefits\",\"item\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/benefits\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero Trust Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#website\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/\",\"name\":\"Swimage\",\"description\":\"Modern PC Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#organization\",\"name\":\"Swimage\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Fish-blue-registered-white-background-768x512.png\",\"contentUrl\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Fish-blue-registered-white-background-768x512.png\",\"width\":768,\"height\":512,\"caption\":\"Swimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Swimage-154425397911672\",\"https:\\\/\\\/x.com\\\/SwimageNow\",\"https:\\\/\\\/youtu.be\\\/17rWsOZLSxk\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust Security &#8226; Endpoint Management - Swimage","description":"Integrate with security stacks and ensure that all PCs, regardless of location, remain secure, healthy, and compliant.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Security &#8226; Endpoint Management - Swimage","og_description":"Integrate with security stacks and ensure that all PCs, regardless of location, remain secure, healthy, and compliant.","og_url":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/","og_site_name":"Swimage","article_publisher":"https:\/\/www.facebook.com\/Swimage-154425397911672","article_modified_time":"2022-09-03T20:29:29+00:00","og_image":[{"url":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/ZeroTrust-S.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@SwimageNow","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/","url":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/","name":"Zero Trust Security &#8226; Endpoint Management - Swimage","isPartOf":{"@id":"https:\/\/www.swimage.com\/staging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/#primaryimage"},"image":{"@id":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/ZeroTrust-S.png","datePublished":"2022-08-21T02:19:02+00:00","dateModified":"2022-09-03T20:29:29+00:00","description":"Integrate with security stacks and ensure that all PCs, regardless of location, remain secure, healthy, and compliant.","breadcrumb":{"@id":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/#primaryimage","url":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/ZeroTrust-S.png","contentUrl":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/08\/ZeroTrust-S.png","width":470,"height":265},{"@type":"BreadcrumbList","@id":"https:\/\/www.swimage.com\/staging\/benefits\/zero-trust-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.swimage.com\/staging\/"},{"@type":"ListItem","position":2,"name":"Benefits","item":"https:\/\/www.swimage.com\/staging\/benefits\/"},{"@type":"ListItem","position":3,"name":"Zero Trust Security"}]},{"@type":"WebSite","@id":"https:\/\/www.swimage.com\/staging\/#website","url":"https:\/\/www.swimage.com\/staging\/","name":"Swimage","description":"Modern PC Management","publisher":{"@id":"https:\/\/www.swimage.com\/staging\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.swimage.com\/staging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.swimage.com\/staging\/#organization","name":"Swimage","url":"https:\/\/www.swimage.com\/staging\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.swimage.com\/staging\/#\/schema\/logo\/image\/","url":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2021\/07\/Fish-blue-registered-white-background-768x512.png","contentUrl":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2021\/07\/Fish-blue-registered-white-background-768x512.png","width":768,"height":512,"caption":"Swimage"},"image":{"@id":"https:\/\/www.swimage.com\/staging\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Swimage-154425397911672","https:\/\/x.com\/SwimageNow","https:\/\/youtu.be\/17rWsOZLSxk"]}]}},"_links":{"self":[{"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages\/15792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/comments?post=15792"}],"version-history":[{"count":9,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages\/15792\/revisions"}],"predecessor-version":[{"id":15865,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages\/15792\/revisions\/15865"}],"up":[{"embeddable":true,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages\/11636"}],"wp:attachment":[{"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/media?parent=15792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}