{"id":16556,"date":"2022-06-02T15:52:00","date_gmt":"2022-06-02T23:52:00","guid":{"rendered":"http:\/\/www.sumologic.com\/?post_type=resource&#038;p=16556"},"modified":"2025-05-08T19:41:14","modified_gmt":"2025-05-09T03:41:14","slug":"zero-trust-goes-beyond-standard-security","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/videos\/zero-trust-goes-beyond-standard-security","title":{"rendered":"Zero trust goes beyond standard security"},"content":{"rendered":"\n<p>Zero trust is a modern, strategic approach to cybersecurity that secures organizations by eliminating implicit trust and continuously validating all interactions and experiences. Zero trust moves cyber defenses from static, network-based perimeters to focus on users, assets, applications and resources without any implicit trust to enhance posture and reduce risk. At its core, Zero trust is a perimeterless security approach.<\/p>\n\n\n\n<p>With Sumo Logic, federal, state and local government and agencies can accelerate modern application delivery, monitor &amp; troubleshoot in real time and improve their security &amp; compliance posture with ease and confidence. Sumo Logic has numerous certifications that are needed in the federal, state, local and education space such as FedRamp\u00ae Moderate, HIPAA, ISO27001, FISMA &amp; CSA Star to name a few.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero trust is a modern, strategic approach to cybersecurity that secures organizations by eliminating implicit trust and continuously validating all interactions and experiences. Zero trust moves cyber defenses from static, network-based perimeters to focus on users, assets, applications and resources without any implicit trust to enhance posture and reduce risk. At its core, Zero trust [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"template":"","meta":{"_acf_changed":true,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[32],"resource-solution":[56]},"selected_primary_terms":{"resource-type":[],"resource-solution":[]},"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"3185,3180,3170","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[32],"resource-solution":[56],"class_list":["post-16556","resource","type-resource","status-publish","hentry","resource-type-videos","resource-solution-secops-and-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/resource\/16556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/4"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=16556"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/resource-type?post=16556"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/resource-solution?post=16556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}