{"id":6111,"date":"2022-05-02T13:04:50","date_gmt":"2022-05-02T13:04:50","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=6111"},"modified":"2022-05-02T13:04:50","modified_gmt":"2022-05-02T13:04:50","slug":"microsoft-thales-confusion-and-planning-for-zero-trust-architectures","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/","title":{"rendered":"Microsoft &#038; Thales: Confusion and Planning for Zero Trust Architectures"},"content":{"rendered":"<p>By now, U.S. Government IT groups are well aware of Executive Order 14028 and its underlying promise to better protect and improve U.S. infrastructure security.<\/p>\n<p>The bigger challenge, however, is discerning the executive order&#8217;s requirements and determining who can help assemble a plan for successful implementation\u2014often with limited resources.<\/p>\n<p>To answer the critical questions surrounding solutions for planning and compliance, register for this Thales and Microsoft joint webinar, featuring Microsoft&#8217;s Senior Program Manager for Identity and Network Access, Peter Lenzke, and Alex Basin, Thales CPL Solution Engineer.<\/p>\n<p><a href=\"https:\/\/stuf.in\/b98ebf\" target=\"_blank\" rel=\"noopener\">Read More&#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Does U.S. Executive Order 14028 ring a bell? <\/p>\n<p>Intended to protect &#038; improve U.S. infrastructure security, the EO has far-reaching implications for your business. <\/p>\n<p>Organizations are now scrambling to discern the executive order&#8217;s requirements and determine who can help assemble a plan for successful implementation\u2014often with limited resources. <\/p>\n<p>To answer the critical questions surrounding solutions for planning and compliance, @Thales and @Microsoft are hosting a webinar on Thursday, May 5 at 12:00PM CST, featuring Microsoft&#8217;s Senior Program Manager for Identity and Network Access, Peter Lenzke, and Alex Basin, Thales CPL Solution Engineer. <\/p>\n<p>Register \ud83d\udc47 to ensure you understand the stakes of EO 14028.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1139,1136],"tags":[],"class_list":["post-6111","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft &amp; Thales: Confusion and Planning for Zero Trust Architectures - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft &amp; Thales: Confusion and Planning for Zero Trust Architectures - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Does U.S. Executive Order 14028 ring a bell?  Intended to protect &amp; improve U.S. infrastructure security, the EO has far-reaching implications for your business.  Organizations are now scrambling to discern the executive order&#039;s requirements and determine who can help assemble a plan for successful implementation\u2014often with limited resources.  To answer the critical questions surrounding solutions for planning and compliance, @Thales and @Microsoft are hosting a webinar on Thursday, May 5 at 12:00PM CST, featuring Microsoft&#039;s Senior Program Manager for Identity and Network Access, Peter Lenzke, and Alex Basin, Thales CPL Solution Engineer.  Register \ud83d\udc47 to ensure you understand the stakes of EO 14028.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-02T13:04:50+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Microsoft &#038; Thales: Confusion and Planning for Zero Trust Architectures\",\"datePublished\":\"2022-05-02T13:04:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/\"},\"wordCount\":102,\"articleSection\":[\"Microsoft\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/\",\"name\":\"Microsoft & Thales: Confusion and Planning for Zero Trust Architectures - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"datePublished\":\"2022-05-02T13:04:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft &#038; Thales: Confusion and Planning for Zero Trust Architectures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft & Thales: Confusion and Planning for Zero Trust Architectures - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft & Thales: Confusion and Planning for Zero Trust Architectures - TechTonic Times","og_description":"Does U.S. Executive Order 14028 ring a bell?  Intended to protect & improve U.S. infrastructure security, the EO has far-reaching implications for your business.  Organizations are now scrambling to discern the executive order's requirements and determine who can help assemble a plan for successful implementation\u2014often with limited resources.  To answer the critical questions surrounding solutions for planning and compliance, @Thales and @Microsoft are hosting a webinar on Thursday, May 5 at 12:00PM CST, featuring Microsoft's Senior Program Manager for Identity and Network Access, Peter Lenzke, and Alex Basin, Thales CPL Solution Engineer.  Register \ud83d\udc47 to ensure you understand the stakes of EO 14028.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/","og_site_name":"TechTonic Times","article_published_time":"2022-05-02T13:04:50+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Microsoft &#038; Thales: Confusion and Planning for Zero Trust Architectures","datePublished":"2022-05-02T13:04:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/"},"wordCount":102,"articleSection":["Microsoft","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/","name":"Microsoft & Thales: Confusion and Planning for Zero Trust Architectures - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"datePublished":"2022-05-02T13:04:50+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-thales-confusion-and-planning-for-zero-trust-architectures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft &#038; Thales: Confusion and Planning for Zero Trust Architectures"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=6111"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6111\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=6111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=6111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=6111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}