{"id":78904,"date":"2021-09-24T10:22:43","date_gmt":"2021-09-24T08:22:43","guid":{"rendered":"https:\/\/mwtsolutions.eu\/?p=78904"},"modified":"2022-01-25T10:11:29","modified_gmt":"2022-01-25T09:11:29","slug":"proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive","status":"publish","type":"post","link":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/","title":{"rendered":"Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78904\" class=\"elementor elementor-78904\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a5dc7c elementor-section-boxed elementor-section-height-default elementor-section-height-default force-full-width-no\" data-id=\"1a5dc7c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bde7587\" data-id=\"bde7587\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c5daa7 elementor-widget elementor-widget-text-editor\" data-id=\"9c5daa7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>V roce 2010 p\u0159edstavil John Kindervag koncept \u201enulov\u00e9 d\u016fv\u011bry\u201c, kter\u00fd se stal z\u00e1kladn\u00edm kamenem kybernetick\u00e9 odolnosti a trval\u00e9 bezpe\u010dnosti. Zero Trust nen\u00ed bezpe\u010dnostn\u00ed produkt, architektura ani technologie. Je to strategie nebo soubor z\u00e1sad definuj\u00edc\u00edch, jak p\u0159istupovat k zabezpe\u010den\u00ed; stanov\u00ed p\u0159edpoklady toho, co d\u011bl\u00e1me. Z\u00e1kladn\u00ed z\u00e1sadou nulov\u00e9 d\u016fv\u011bryhodnosti je \u201eNikdy ned\u016fv\u011b\u0159ujte, v\u017edy ov\u011b\u0159ujte!\u201c Bez ohledu na za\u0159\u00edzen\u00ed, u\u017eivatele, syst\u00e9m nebo um\u00edst\u011bn\u00ed, a\u0165 u\u017e uvnit\u0159 nebo vn\u011b organizace, by nem\u011blo b\u00fdt nikomu nikdy d\u016fv\u011b\u0159ov\u00e1no.<\/strong><\/p><p>\u00a0<\/p><p>Strategie nulov\u00e9 d\u016fv\u011bry zahrnuje t\u0159i v\u011bci:<\/p><ul><li>V\u017edy ov\u011b\u0159ovat a autorizovat.<\/li><li>Pou\u017e\u00edt z\u00e1sadu nejm\u00e9n\u011b privilegi\u00ed.<\/li><li>Pr\u016fb\u011b\u017en\u011b monitorovat a p\u0159izp\u016fsobovat.<\/li><\/ul><p>Jak n\u00e1zev napov\u00edd\u00e1, nic by nem\u011blo b\u00fdt d\u016fv\u011bryhodn\u00e9 a v\u0161e by m\u011blo b\u00fdt ov\u011b\u0159eno. Principy, jako je p\u0159\u00edstup podle posledn\u00edch opr\u00e1vn\u011bn\u00ed, mikrosegmentace s\u00edt\u00ed s r\u016fzn\u00fdmi p\u0159ihla\u0161ovac\u00edmi \u00fadaji, kontrola vyu\u017eit\u00ed dat a nep\u0159etr\u017eit\u00e1 validace v re\u00e1ln\u00e9m \u010dase, mohou organizac\u00edm pomoci zm\u00edrnit nevyhnuteln\u00e9 \u00fatoky do s\u00edt\u00ed.<\/p><p>COVID-19 podporuje kulturu \u201ehome office\u201c, kter\u00e1 n\u00e1sledn\u011b vedla k rychl\u00e9mu p\u0159echodu do hybridn\u00edho pracovn\u00edho prost\u0159ed\u00ed. Zam\u011bstnanci ji\u017e nejsou v\u00e1z\u00e1ni na pracov\u00ed hranice. Vyu\u017eit\u00ed cloudu a zrychlen\u00e9 p\u0159ijet\u00ed sc\u00e9n\u00e1\u0159\u016f vzd\u00e1len\u00e9 pr\u00e1ce zv\u00fd\u0161ilo hrozby a otev\u0159elo cesty k v\u011bt\u0161\u00edm zranitelnostem infrastruktury. S t\u00edmto posunem se mus\u00ed zm\u011bnit bezpe\u010dnostn\u00ed model ka\u017ed\u00e9 organizace.<\/p><p>Kdy\u017e n\u011bkdo po\u017eaduje p\u0159\u00edstup k jak\u00fdmkoli dat\u016fm, organizace se mus\u00ed rozhodnout, zda p\u0159\u00edstup ud\u011bl\u00ed nebo omez\u00ed, t\u00edm, \u017ee zjist\u00ed, kdo, kdy, kde, pro\u010d a jak. Nulov\u00e1 d\u016fv\u011bra umo\u017e\u0148uje podnik\u016fm fungovat efektivn\u011bji t\u00edm, \u017ee poskytuje lep\u0161\u00ed viditelnost, granul\u00e1rn\u00ed p\u0159\u00edstup u\u017eivatel\u016fm a tak\u00e9 pom\u00e1h\u00e1 kdykoli zru\u0161it p\u0159\u00edstup k jak\u00e9mukoli zdroji.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30856b3 elementor-widget elementor-widget-text-editor\" data-id=\"30856b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Zde je p\u011bt bod\u016f o architektu\u0159e Zero Trust a o tom, pro\u010d by ka\u017ed\u00e1 organizace m\u011bla zv\u00e1\u017eit jej\u00ed implementaci.<\/p><p>\u00a0<\/p><p style=\"text-align: center;\"><strong style=\"font-size: 2.4rem;\"><a href=\"https:\/\/go.forrester.com\/blogs\/zero-trust-is-not-a-security-solution-it-is-a-strategy\/\">Nulov\u00e1 d\u016fv\u011bra nen\u00ed bezpe\u010dnostn\u00ed \u0159e\u0161en\u00ed, je to strategie<\/a><\/strong><\/p><p>\u00a0<\/p><p>Zero Trust nen\u00ed jeden produkt nebo platforma, je to bezpe\u010dnostn\u00ed r\u00e1mec. Zero Trust eXtended (ZTX) je ekosyst\u00e9m s technologick\u00fdmi i netechnick\u00fdmi prvky, kter\u00fd bere v \u00favahu i dal\u0161\u00ed oblasti, jako je nap\u0159\u00edklad spr\u00e1va identit a p\u0159\u00edstupu (IAM) a spr\u00e1va privilegovan\u00e9ho p\u0159\u00edstupu (PAM). Implementace bezpe\u010dnostn\u00ed strategie Zero Trust by m\u011bla b\u00fdt n\u00e1strojem, kter\u00fd umo\u017en\u00ed digit\u00e1ln\u00ed transformaci a v\u017edy vyv\u00e1\u017e\u00ed zabezpe\u010den\u00ed organizace a zku\u0161enosti zam\u011bstnanc\u016f.<\/p><p>\u00a0<\/p><p style=\"text-align: center;\"><strong><a style=\"font-size: 2.4rem;\" href=\"https:\/\/www.gartner.com\/teamsiteanalytics\/servePDF?g=\/imagesrv\/media-products\/pdf\/Qi-An-Xin\/Qi-An-Xin-1-1OKONUN2.pdf\">Architektura a \u0159e\u0161en\u00ed nulov\u00e9 d\u016fv\u011bryhodnosti (ZTNA)<\/a><\/strong><\/p><p>\u00a0<\/p><p>ZTNA je bezpe\u010dnostn\u00ed model, kter\u00fd vytv\u00e1\u0159\u00ed perimetr zalo\u017een\u00fd na identit\u011b, kontextu a logick\u00e9m p\u0159\u00edstupu, \u010d\u00edm\u017e eliminuje rozd\u00edl mezi t\u00edm, zda je na firemn\u00edm perimetru nebo mimo n\u011bj. ZTNA p\u0159edpokl\u00e1d\u00e1, \u017ee v\u0161echny vnit\u0159n\u00ed i vn\u011bj\u0161\u00ed s\u00edt\u011b jsou ned\u016fv\u011bryhodn\u00e9, kde je p\u0159\u00edstup poskytov\u00e1n a\u017e po ov\u011b\u0159en\u00ed z\u00e1m\u011bru a identity. Pom\u00e1h\u00e1 tak\u00e9 p\u0159i identifikaci neobvykl\u00e9ho a \u0161kodliv\u00e9ho chov\u00e1n\u00ed t\u00edm, \u017ee ozna\u010duje pokusy o p\u0159\u00edstup k omezen\u00fdm zdroj\u016fm a masivn\u00ed pokusy o stahov\u00e1n\u00ed dat. Tento v\u00fdzkum uv\u00e1d\u00ed, \u017ee do roku 2022 bude k 80% nov\u00fdch aplikac\u00ed pro digit\u00e1ln\u00ed podnik\u00e1n\u00ed p\u0159istupov\u00e1no prost\u0159ednictv\u00edm ZTNA a do roku 2023 bude 60% podnik\u016f postupn\u011b ukon\u010dovat v\u011bt\u0161inu sv\u00fdch VPN pro vzd\u00e1len\u00fd p\u0159\u00edstup, p\u0159i\u010dem\u017e up\u0159ednost\u0148uje model nulov\u00e9 d\u016fv\u011bryhodnosti.<\/p><p>\u00a0<\/p><p style=\"text-align: center;\"><a style=\"font-size: 2.4rem;\" href=\"https:\/\/www.cioinsight.com\/blogs\/zero-trust-security-benefits\/\"><strong>Pro\u010d byste m\u011bli implementovat Zero Trust Security v roce 2021?<\/strong><\/a><\/p><p>\u00a0<\/p><p>Tato \u201ehome office\u201c kultura \u0159\u00edzen\u00e1 pandemi\u00ed vedla ke zv\u00fd\u0161en\u00ed po\u010dtu koncov\u00fdch bod\u016f, v\u010detn\u011b osobn\u00edch za\u0159\u00edzen\u00ed zam\u011bstnanc\u016f, kter\u00e9 maj\u00ed p\u0159\u00edstup k dat\u016fm organizace. Zaji\u0161t\u011bn\u00ed zm\u011bn v operac\u00edch pro obchod se tak stalo d\u016fle\u017eit\u011bj\u0161\u00edm ne\u017e kdy d\u0159\u00edve. Bezpe\u010dnostn\u00ed strategie Zero Trust spol\u00e9h\u00e1 na spr\u00e1vu identit a p\u0159\u00edstupu, spr\u00e1vu \u0159\u00edzen\u00ed koncov\u00fdch bod\u016f a efektivn\u00ed schopnost monitorov\u00e1n\u00ed zabezpe\u010den\u00ed. Organizace nyn\u00ed p\u0159ech\u00e1zej\u00ed na automatizaci a odezvu orchestrace zabezpe\u010den\u00ed, kter\u00e1 m\u016f\u017ee \u00fa\u010dinn\u011b zkr\u00e1tit dobu odezvy a sn\u00ed\u017eit z\u00e1t\u011b\u017e opakuj\u00edc\u00edch se \u00fakol\u016f automatizac\u00ed identifikovan\u00fdch zranitelnost\u00ed a implementac\u00ed p\u0159eddefinovan\u00fdch workflow.<\/p><p>\u00a0<\/p><p style=\"text-align: center;\"><strong><a style=\"font-size: 2.4rem;\" href=\"https:\/\/www.techrepublic.com\/article\/5-tips-for-implementing-a-zero-trust-model\/\">5 tip\u016f pro implementaci modelu nulov\u00e9 d\u016fv\u011bry<\/a><\/strong><\/p><p>\u00a0<\/p><p style=\"text-align: left;\">Organizace implementuj\u00edc\u00ed Zero Trust by m\u011bla nejprve identifikovat sv\u00e9 u\u017eivatele a za\u0159\u00edzen\u00ed, kter\u00e1 se p\u0159ipojuj\u00ed nebo se pokou\u0161\u00ed p\u0159ipojit k va\u0161\u00ed s\u00edti pomoc\u00ed \u0159e\u0161en\u00ed IAM. V\u0161echna data by m\u011bla b\u00fdt klasifikov\u00e1na a prost\u0159ednictv\u00edm mikrosegmentace mohou organizace definovat \u0159\u00edzen\u00ed p\u0159\u00edstupu k dat\u016fm, aplikac\u00edm a slu\u017eb\u00e1m. S\u00edt\u011b by m\u011bly b\u00fdt nep\u0159etr\u017eit\u011b monitorov\u00e1ny a organizace by m\u011bly posuzovat d\u016fv\u011bru poka\u017ed\u00e9, kdy\u017e nov\u00e9 za\u0159\u00edzen\u00ed po\u017eaduje p\u0159\u00edstup ke sv\u00fdm koncov\u00fdm bod\u016fm.<\/p><h3 style=\"text-align: center;\"><strong><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/02\/12\/why-a-zero-trust-policy-is-important-for-remote-companies-and-cybersecurity-effectiveness\/?sh=6108742c20f5\">Pro\u010d je politika Zero-Trust d\u016fle\u017eit\u00e1 pro online firmy a \u00fa\u010dinnost kybernetick\u00e9 bezpe\u010dnosti<\/a><\/strong><\/h3><div>\u00a0<\/div><p>N\u00e1r\u016fst vzd\u00e1len\u00e9 pr\u00e1ce p\u0159ich\u00e1z\u00ed s nov\u00fdmi v\u00fdzvami v oblasti kybernetick\u00e9 bezpe\u010dnosti, kter\u00e9 maj\u00ed za n\u00e1sledek men\u0161\u00ed kontrolu nad prost\u0159edky organizace a zv\u00fd\u0161en\u00e9 riziko \u00faniku dat. D\u00edky tomu je d\u016fle\u017eit\u011bj\u0161\u00ed ne\u017e kdy jindy p\u0159istupovat ke kybernetick\u00e9 bezpe\u010dnosti z pohledu rizika. Model Zero Trust pou\u017e\u00edv\u00e1 princip nejm\u00e9n\u011b privilegi\u00ed, kter\u00fd zaji\u0161\u0165uje, \u017ee nikdo nem\u00e1 v\u011bt\u0161\u00ed p\u0159\u00edstup k dat\u016fm a zdroj\u016fm, ne\u017e ve skute\u010dnosti vy\u017eaduj\u00ed. Tento model nejen ov\u011b\u0159uje za\u0159\u00edzen\u00ed, ale tak\u00e9 ov\u011b\u0159uje identitu; ov\u011b\u0159ov\u00e1n\u00ed je adaptivn\u00ed, kontextov\u00e9 a zalo\u017een\u00e9 na riziku.<\/p><p>Lid\u00e9 nejsou nejslab\u0161\u00edm \u010dl\u00e1nkem; jsou prim\u00e1rn\u00edm vektorem \u00fatoku, co\u017e je p\u00e1dn\u00fd d\u016fvod, pro\u010d mus\u00ed b\u00fdt p\u0159\u00edstup k dat\u016fm co nejv\u00edce omezen. Implementace bezpe\u010dnostn\u00ed strategie Zero Trust vy\u017eaduje m\u011bs\u00edce tvrd\u00e9 pr\u00e1ce s hodinami sledov\u00e1n\u00ed a spr\u00e1vy; av\u0161ak tato tvrd\u00e1 pr\u00e1ce se vyplat\u00ed, jeliko\u017e slou\u017e\u00ed jako pl\u00e1n budouc\u00ed kybernetick\u00e9 bezpe\u010dnosti.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>V roce 2010 p\u0159edstavil John Kindervag koncept \u201enulov\u00e9 d\u016fv\u011bry\u201c, kter\u00fd se stal z\u00e1kladn\u00edm kamenem kybernetick\u00e9 odolnosti a trval\u00e9 bezpe\u010dnosti. Zero Trust nen\u00ed bezpe\u010dnostn\u00ed produkt, architektura ani technologie. Je to strategie nebo soubor z\u00e1sad definuj\u00edc\u00edch, jak p\u0159istupovat k zabezpe\u010den\u00ed; stanov\u00ed p\u0159edpoklady toho, co d\u011bl\u00e1me. Z\u00e1kladn\u00ed z\u00e1sadou nulov\u00e9 d\u016fv\u011bryhodnosti je \u201eNikdy ned\u016fv\u011b\u0159ujte, v\u017edy ov\u011b\u0159ujte!\u201c Bez ohledu na [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":78926,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_links_to":"","_links_to_target":""},"categories":[274,289],"tags":[353,474,475,328,473],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve? - MWT Solutions<\/title>\n<meta name=\"description\" content=\"Zero Trust nen\u00ed produkt ani technologie, ale strategie, jak p\u0159istupovat k zabezpe\u010den\u00ed. \u201eNikdy ned\u016fv\u011b\u0159ujte, v\u017edy ov\u011b\u0159ujte!\u201c\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve? - MWT Solutions\" \/>\n<meta property=\"og:description\" content=\"Zero Trust nen\u00ed produkt ani technologie, ale strategie, jak p\u0159istupovat k zabezpe\u010den\u00ed. \u201eNikdy ned\u016fv\u011b\u0159ujte, v\u017edy ov\u011b\u0159ujte!\u201c\" \/>\n<meta property=\"og:url\" content=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/\" \/>\n<meta property=\"og:site_name\" content=\"MWT Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-24T08:22:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-25T09:11:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/09\/Implementation-of-Zero-Trust.png\" \/>\n\t<meta property=\"og:image:width\" content=\"4805\" \/>\n\t<meta property=\"og:image:height\" content=\"2517\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marketing@mwtsolutions.eu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"marketing@mwtsolutions.eu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/\"},\"author\":{\"name\":\"marketing@mwtsolutions.eu\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\"},\"headline\":\"Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve?\",\"datePublished\":\"2021-09-24T08:22:43+00:00\",\"dateModified\":\"2022-01-25T09:11:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/\"},\"wordCount\":1081,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"keywords\":[\"home office\",\"kxbernetick\u00e1 bezpe\u010dnost\",\"pr\u00e1ce na d\u00e1lku. home office\",\"UEM\",\"zero trust\"],\"articleSection\":[\"\u010cl\u00e1nky\",\"Novinky\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/\",\"name\":\"Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve? - MWT Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\"},\"datePublished\":\"2021-09-24T08:22:43+00:00\",\"dateModified\":\"2022-01-25T09:11:29+00:00\",\"description\":\"Zero Trust nen\u00ed produkt ani technologie, ale strategie, jak p\u0159istupovat k zabezpe\u010den\u00ed. \u201eNikdy ned\u016fv\u011b\u0159ujte, v\u017edy ov\u011b\u0159ujte!\u201c\",\"breadcrumb\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/i.mwtsolutions.eu\/cs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pro\u010d je&nbsp;implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"name\":\"MWT Solutions\",\"description\":\"Kolejna witryna oparta na WordPressie\",\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"cs\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\",\"name\":\"MWT Solutions\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"contentUrl\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"width\":2825,\"height\":850,\"caption\":\"MWT Solutions\"},\"image\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pl.linkedin.com\/company\/mwt-solutions\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\",\"name\":\"marketing@mwtsolutions.eu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"caption\":\"marketing@mwtsolutions.eu\"},\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve? - MWT Solutions","description":"Zero Trust nen\u00ed produkt ani technologie, ale strategie, jak p\u0159istupovat k zabezpe\u010den\u00ed. \u201eNikdy ned\u016fv\u011b\u0159ujte, v\u017edy ov\u011b\u0159ujte!\u201c","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/","og_locale":"cs_CZ","og_type":"article","og_title":"Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve? - MWT Solutions","og_description":"Zero Trust nen\u00ed produkt ani technologie, ale strategie, jak p\u0159istupovat k zabezpe\u010den\u00ed. \u201eNikdy ned\u016fv\u011b\u0159ujte, v\u017edy ov\u011b\u0159ujte!\u201c","og_url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/","og_site_name":"MWT Solutions","article_published_time":"2021-09-24T08:22:43+00:00","article_modified_time":"2022-01-25T09:11:29+00:00","og_image":[{"width":4805,"height":2517,"url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/09\/Implementation-of-Zero-Trust.png","type":"image\/png"}],"author":"marketing@mwtsolutions.eu","twitter_card":"summary_large_image","twitter_misc":{"Napsal(a)":"marketing@mwtsolutions.eu","Odhadovan\u00e1 doba \u010dten\u00ed":"4 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/#article","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/"},"author":{"name":"marketing@mwtsolutions.eu","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe"},"headline":"Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve?","datePublished":"2021-09-24T08:22:43+00:00","dateModified":"2022-01-25T09:11:29+00:00","mainEntityOfPage":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/"},"wordCount":1081,"commentCount":0,"publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"keywords":["home office","kxbernetick\u00e1 bezpe\u010dnost","pr\u00e1ce na d\u00e1lku. home office","UEM","zero trust"],"articleSection":["\u010cl\u00e1nky","Novinky"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/","url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/","name":"Pro\u010d je implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve? - MWT Solutions","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/#website"},"datePublished":"2021-09-24T08:22:43+00:00","dateModified":"2022-01-25T09:11:29+00:00","description":"Zero Trust nen\u00ed produkt ani technologie, ale strategie, jak p\u0159istupovat k zabezpe\u010den\u00ed. \u201eNikdy ned\u016fv\u011b\u0159ujte, v\u017edy ov\u011b\u0159ujte!\u201c","breadcrumb":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/proc-je-implementace-zero-trust-dulezitejsi-nez-kdy-drive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/i.mwtsolutions.eu\/cs\/"},{"@type":"ListItem","position":2,"name":"Pro\u010d je&nbsp;implementace Zero Trust d\u016fle\u017eit\u011bj\u0161\u00ed, ne\u017e kdy d\u0159\u00edve?"}]},{"@type":"WebSite","@id":"https:\/\/i.mwtsolutions.eu\/#website","url":"https:\/\/i.mwtsolutions.eu\/","name":"MWT Solutions","description":"Kolejna witryna oparta na WordPressie","publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"cs"},{"@type":"Organization","@id":"https:\/\/i.mwtsolutions.eu\/#organization","name":"MWT Solutions","url":"https:\/\/i.mwtsolutions.eu\/","logo":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/","url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","contentUrl":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","width":2825,"height":850,"caption":"MWT Solutions"},"image":{"@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/mwt-solutions"]},{"@type":"Person","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe","name":"marketing@mwtsolutions.eu","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","caption":"marketing@mwtsolutions.eu"},"url":"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/"}]}},"_links":{"self":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/78904"}],"collection":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/comments?post=78904"}],"version-history":[{"count":41,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/78904\/revisions"}],"predecessor-version":[{"id":78949,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/78904\/revisions\/78949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media\/78926"}],"wp:attachment":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media?parent=78904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/categories?post=78904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/tags?post=78904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}