{"id":52791,"date":"2024-03-05T14:53:43","date_gmt":"2024-03-05T14:53:43","guid":{"rendered":"https:\/\/www.n-able.com\/?p=52791"},"modified":"2024-03-07T16:05:08","modified_gmt":"2024-03-07T16:05:08","slug":"demystifying-zero-trust-why-msps-need-to-take-it-seriously","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously","title":{"rendered":"Demystifying Zero Trust: Why MSPs Need to Take it Seriously"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">If you\u2019re still relying on VPN servers to protect customers\u2019 infrastructure, you could be leaving them as sitting ducks for cyber-attacks.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">This may sound like scaremongering, but VPN servers have increasingly come under the spotlight since COVID-19 forced the world to embrace remote working, and then again in 2021 as hackers shutdown the Colonial Oil Pipeline in the U.S. after gaining VPN access. However, VPN is now facing a much larger threat: an extinction event, driven by Zero Trust.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">As an MSP, you no doubt understand the importance of providing secure and reliable network access to your customers and the role it plays in maintaining their trust (and your reputation). So what is Zero Trust and how can it help you and your customers? <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In essence Zero Trust means that\u00a0regardless of whether a user is inside or outside the company network, systems do not take it for granted that they are who they say they are. This means that additional verification is required for any user trying to gain access to company resources. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Marc Barry, <\/span><span class=\"s2\">Co-Founder &amp; Chief Product Officer at <a href=\"https:\/\/enclave.io\/\" target=\"_blank\" rel=\"noopener\">Enclave<\/a>, a member of <a href=\"https:\/\/www.n-able.com\/partnerships\/technology-alliance-program\" target=\"_blank\" rel=\"noopener\">N&#8209;able&#8217;s Technology Alliance Program<\/a>, explains<\/span><span class=\"s1\">: \u201cBroadly speaking, Zero Trust and Zero Trust Network Access represent a foundational shift in the way in which we approach the security of systems.\u00a0They provide a framework for a new way of thinking that&#8217;s been broadly supported by a coalition of governments around the world who have much bigger fish to fry when it comes to security. They\u2019re essentially saying this is a better way of approaching security.\u201d\u00a0<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\"><b>Zero Trust for your customers<\/b><\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Marc continues: \u201cWe speak to many MSPs, both prospects and existing customers, and the pattern we see is that they have an appetite and desire to shift towards security. This doesn\u2019t necessarily mean they all want to become MSSPs, it\u2019s more about them wanting to take responsibility for their customers\u2019 security. This in itself is often driven by the understanding that if one of their customers gets breached, whether they&#8217;re responsible for the security or not, they\u2019re guilty by association. So they have to take that security seriously\u2026 and let\u2019s be honest exposed VPN servers discoverable on the public Internet are no longer a fit for purpose solution when it comes to the role of modern secure connectivity. So shifting customers towards a Zero Trust security model makes a lot of sense. \u201d <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">MSPs will need to be able to explain this shift to their customers; and this means effectively communicating the value of Zero Trust in a way that resonates with them. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">The trend towards Zero Trust gained serious momentum after the U.S. government introduced<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\"> mandatory requirements for federal agencies<\/span><\/a> to adopt it in the wake of cyber-attacks against\u00a0<\/span><span class=\"s4\">critical infrastructure<\/span><span class=\"s1\">\u00a0on the 6th of May, 2021.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Six days later, the Biden Administration issued an\u00a0<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">Executive Order<\/span><\/a>\u00a0mandating the adoption of Zero Trust. Just 11 days after that the British National Cyber Security Centre (NCSC) followed suit publishing\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/collection\/zero-trust-architecture\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">Zero Trust architecture guidance<\/span><\/a><\/span><span class=\"s4\">.<\/span><\/p>\n<p class=\"p5\"><span class=\"s6\">Almost overnight, a new standard in cybersecurity practices was ratified. <\/span><span class=\"s1\">\u201cYes, this shift has been happening at the macro level, the government level,\u201d says Marc, \u201cbut it&#8217;s wholly applicable at the micro level too; for the SMB and mid-market.\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Here are four reasons why Zero Trust is such a game-changer for your customers.<\/span><\/p>\n<ol>\n<li class=\"p2\"><span class=\"s1\"><b>Enhance security.<\/b> Zero Trust isn\u2019t just another security measure; it\u2019s a tactical fortress against a wide range of threats, from ransomware, malware and credential theft, to brute force attacks and phishing and more.<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\"><b>Reduce risk.<\/b> Improvements in security posture can also help to reduce risk, and Zero Trust plays a pivotal role here. It\u2019s not just about preventing breaches; it\u2019s about safeguarding your customers\u2019 reputation, data, and finances. Maintaining tight control over access can help drastically lower the chances of breaches, which is a top concern for many businesses.<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\"><b>Helping with compliance.<\/b> Zero Trust also eases the compliance journey, whether that\u2019s Cyber Essentials in the UK, NIST or HIPAA in the U.S., or others; because it helps align organizations with regulatory requirements like strict access control and the principle of least privilege access.<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\"><b>Improved customer experience.<\/b> Your customers aren\u2019t just getting more secure networks and systems; they\u2019re getting better reliability and likely to have fewer interruptions due to security issues. A seamless customer experience is worth its weight in gold for MSP reputation and customer retention.<\/span><\/li>\n<\/ol>\n<h2 class=\"p6\"><span class=\"s1\"><b>Zero Trust for you<\/b><\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">The\u00a0<a href=\"https:\/\/www.huntress.com\/resources\/report\/smb-threat-report\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">2023 SMB Threat report<\/span><\/a>\u00a0from Huntress shows 65% of attacks on small and medium businesses leveraged RMM tools to gain unauthorized access to victim\u2019s systems. Crucial for MSP operations, but increasingly under attack, the trend of\u00a0<a href=\"https:\/\/securityboulevard.com\/2023\/08\/cisa-unveils-plan-to-slow-the-hacker-abuse-of-rmm-tools\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">threat actors<\/span><\/a>\u00a0targeting\u00a0<a href=\"https:\/\/www.channele2e.com\/news\/cybersecurity-trends-2023-rmm-software-misuse-in-smb-cyber-attacks\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">RMM software<\/span><\/a>\u00a0poses a threat to your infrastructure and customer security. By adopting Zero Trust, every interaction with your RMM platform is authenticated and authorized, significantly strengthening your defence against unauthorized access and breaches.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">This is where you can leverage your position as an MSP with not-for-resale (NFR) licences. Not only an excellent opportunity to learn about ZT and ZTNA products, but to simultaneously deploy state of the art protections without additional cost around the crown jewels of your business: access to the RMM.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">More than that, getting the right mix of vendors into your technology stack is likely to simplify network management, cutting through the complexity of traditional security tooling, and instead focusing on what\u2019s crucial\u2014strict authentication and minimal access.<\/span><\/p>\n<h2 class=\"p6\"><span class=\"s1\"><b>Giving yourself a competitive edge<\/b><\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">We\u2019ve already mentioned security vulnerabilities undermining the traditional security perimeter exacerbated by the shift towards work-from-home arrangements and COVID-19; but there\u2019s also a time-sensitive reason to adopt Zero Trust now: competitive advantage.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Today, Zero Trust is a market differentiator, not a standard customer expectation. In the competitive MSP landscape, adopting advanced security measures like Zero Trust can set your services apart from others. While Zero Trust is gaining attention, it\u2019s not yet ubiquitous, meaning that implementing it now can give you a leading edge. Strong differentiation can be a significant factor in attracting new customers who are looking for top-tier security, as well as an edge in retaining existing customers, offering them the latest in network security and positioning your business as a forward-thinking and security-conscious early adopter of new technologies.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Think of Zero Trust as an investment in your business\u2019s future, not just a security protocol. By implementing it, you\u2019re not only enhancing your security posture but also building a foundation for growth, reliability, and customer confidence.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">There\u2019s a lot going on in the space at the moment and the challenge for MSPs is breaking through the noise. \u201cIt&#8217;s all too easy to get lost in the nuances of the technology and the architecture,\u201d says Marc.\u00a0\u201cThis is an extremely crowded market.\u00a0There&#8217;s a lot of thought leadership being released by vendors and analysts that aims to provide helpful ways to distil and understand the shift.\u00a0But if you&#8217;re sort of boots on the ground, operationally trying to deliver value for your customers, it can be really hard to take a step back and figure out how to parachute into this new set of ideas, technologies, architectures, and approaches and figure out the right way of doing things.\u00a0One of the things that we&#8217;ve noticed is that often marketing feels a bit like who can shout the loudest with the right keywords.\u201d\u00a0<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">He continues: \u201cAt Enclave we\u2019ve tried to take a step back and say, while there are many roads that can take you to Zero Trust Network Access, actually there&#8217;s not that much to learn. If you can get a handle on the different architectures, their strengths, trade offs, and weaknesses, it becomes much easier for you to assess and match the right tool for the right job, for the right customer.\u00a0<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cZero Trust and Zero Trust Network Access have a very clearly defined relationship. But until you&#8217;ve really stepped into the space, it can feel a bit nebulous and hard to understand. I think there&#8217;s an argument here that says a lot of the marketing terms that are coined with good intention\u2014to help customers understand and separate products and architectures from one another\u2014but actually they don&#8217;t always aid the discussion. And of course, there&#8217;s a lot of customers out there that don&#8217;t have an innate expertise in security. Security is something that&#8217;s really easy to get wrong\u2014and it\u2019s really easy to be sold snake oil if you&#8217;re not well versed in the domain.\u201d\u00a0<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Recognising this, in the following series of blogs we\u2019ll dive into the different models and ultimately take a look at how to go about implementing Zero Trust in a way that\u2019s right sized for you and for your customers. <\/span><\/p>\n<p class=\"p7\"><span class=\"s1\">\u201cWhile the Zero Trust motion in the market might seem daunting, modernising your technology stack early can help to position your business for growth as the world transitions from \u2018trust but verify\u2019 security towards \u2018never trust, always verify\u2019,\u201d concludes Marc.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"15%\" valign=\"top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\" alt=\"\" width=\"252\" height=\"259\" class=\"alignnone size-full wp-image-52798\" \/><\/td>\n<td width=\"2%&quot;\"><\/td>\n<td><strong><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\"><a href=\"https:\/\/www.n-able.com\/integrations\/enclave\" target=\"_blank\" rel=\"noopener\">Enclave<\/a> has developed and maintains integrations with N&#8209;sight and N&#8209;central, via close collaboration with N&#8209;able&#8217;s Technology Alliance Program. You can find out more about TAP by visting <a href=\"https:\/\/www.n-able.com\/partnerships\/technology-alliance-program\" target=\"_blank\" rel=\"noopener\">www.n-able.com\/partnerships\/technology-alliance-program<\/a>.\u00a0<\/span><\/strong><\/p>\n<p><strong>To see all the industry-leading integrations provided by our TAP Partners visit <a href=\"https:\/\/www.n-able.com\/integrations\" target=\"_blank\" rel=\"noopener\">www.n-able.com\/integrations<\/a><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>For MSPs, understanding and implementing Zero Trust for customers can be daunting. In this series of blogs Enclave\u2019s Marc Barry guides Pete Roythorne through the process.<\/p>\n","protected":false},"author":63,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-52791","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Demystifying Zero Trust: Why MSPs Need to Take it Seriously - N-able<\/title>\n<meta name=\"description\" content=\"For MSPs, understanding and implementing Zero Trust for customers can be daunting. Enclave\u2019s Marc Barry guides Pete Roythorne through the process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demystifying Zero Trust: Why MSPs Need to Take it Seriously - N-able\" \/>\n<meta property=\"og:description\" content=\"For MSPs, understanding and implementing Zero Trust for customers can be daunting. Enclave\u2019s Marc Barry guides Pete Roythorne through the process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-05T14:53:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-07T16:05:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/240228_BB_DemystifyingZeroTrust_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pete Roythorne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Roythorne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously\"},\"author\":{\"name\":\"Pete Roythorne\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\"},\"headline\":\"Demystifying Zero Trust: Why MSPs Need to Take it Seriously\",\"datePublished\":\"2024-03-05T14:53:43+00:00\",\"dateModified\":\"2024-03-07T16:05:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously\"},\"wordCount\":1573,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously\",\"name\":\"Demystifying Zero Trust: Why MSPs Need to Take it Seriously - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\",\"datePublished\":\"2024-03-05T14:53:43+00:00\",\"dateModified\":\"2024-03-07T16:05:08+00:00\",\"description\":\"For MSPs, understanding and implementing Zero Trust for customers can be daunting. Enclave\u2019s Marc Barry guides Pete Roythorne through the process.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Demystifying Zero Trust: Why MSPs Need to Take it Seriously\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\",\"name\":\"Pete Roythorne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"caption\":\"Pete Roythorne\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Demystifying Zero Trust: Why MSPs Need to Take it Seriously - N-able","description":"For MSPs, understanding and implementing Zero Trust for customers can be daunting. Enclave\u2019s Marc Barry guides Pete Roythorne through the process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously","og_locale":"de_DE","og_type":"article","og_title":"Demystifying Zero Trust: Why MSPs Need to Take it Seriously - N-able","og_description":"For MSPs, understanding and implementing Zero Trust for customers can be daunting. Enclave\u2019s Marc Barry guides Pete Roythorne through the process.","og_url":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-03-05T14:53:43+00:00","article_modified_time":"2024-03-07T16:05:08+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/240228_BB_DemystifyingZeroTrust_ss.jpg","type":"image\/jpeg"}],"author":"Pete Roythorne","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Pete Roythorne","Gesch\u00e4tzte Lesezeit":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously"},"author":{"name":"Pete Roythorne","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837"},"headline":"Demystifying Zero Trust: Why MSPs Need to Take it Seriously","datePublished":"2024-03-05T14:53:43+00:00","dateModified":"2024-03-07T16:05:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously"},"wordCount":1573,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png","articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously","url":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously","name":"Demystifying Zero Trust: Why MSPs Need to Take it Seriously - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png","datePublished":"2024-03-05T14:53:43+00:00","dateModified":"2024-03-07T16:05:08+00:00","description":"For MSPs, understanding and implementing Zero Trust for customers can be daunting. Enclave\u2019s Marc Barry guides Pete Roythorne through the process.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Demystifying Zero Trust: Why MSPs Need to Take it Seriously"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837","name":"Pete Roythorne","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","caption":"Pete Roythorne"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/52791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=52791"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/52791\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=52791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}