{"id":25057,"date":"2023-09-21T16:19:58","date_gmt":"2023-09-21T14:19:58","guid":{"rendered":"https:\/\/datanets.ro\/faruk-hairedin-business-development-director-datanet-systems-we-need-zero-trust-as-cloud-and-remote-work-completely-changed-the-cybersecurity-landscape\/"},"modified":"2023-09-21T16:25:02","modified_gmt":"2023-09-21T14:25:02","slug":"interview-faruk-hairedin-bdd-zero-trust","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/","title":{"rendered":"Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [&#8230;.]&#8221;"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Nowadays, Zero Trust is the most promising cybersecurity approach, based on a simple but powerful concept \u201c<em>Never trust, always verify<\/em>\u201d. This security model assumes that no user or device can be trusted by default, therefore all access to resources is restricted, and users must authenticate and authorize themselves before they are granted access. <\/strong><\/p>\n<p style=\"text-align: justify;\">As Romania is not exempt from the cybercrime wave that floods the global economy, Datanet Systems and Cisco offer organizations the technology, consultancy, and services needed to develop a modern Zero Trust architecture.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-25046 size-full aligncenter\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk.png\" alt=\"\" width=\"900\" height=\"600\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk.png 900w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk-300x200.png 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk-768x512.png 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Why is Zero Trust important?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">In today\u2019s digitalization, mobility, and remote work expansion, defending a large perimeter has become challenging for organizations. Traditional solutions have already proven inefficient, and security teams are desperately looking for help.<\/p>\n<blockquote><p>&#8220;<em>In the past, defining the network infrastructure\u2019s perimeter was easy, and all those within the network were considered trusted and protected by a firewall, from outsiders. However, nowadays, this traditional approach falls short. The mediaconstantly reports on alarming incidents such as ransomware attacks, data theft, and compromised IT infrastructure. As the global cyber environment becomes increasingly complex, the challenges facing organizations grow in sophistication. In recent years, we have witnessed a surge in high-profile cyberattacks, targeting both public and private sectors, with attack volumes reaching over 100% growth since the onset of the Ukrainian war. These attacks have highlighted the need for organizations to adopt a more resilient and secure IT strategy,\u201d states<\/em>\u00a0<strong>Faruk Hairedin, Business Development Director la Datanet Systems.<\/strong><\/p><\/blockquote>\n<h2><\/h2>\n<h2><strong>What is Zero Trust in non-tech terms?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Zero Trust is a security model based on the principle of least privilege. This means that users and devices are only granted the access they need to perform their jobs and no more. Zero Trust also assumes that no user or device can be trusted by default and that all access to resources must be authenticated and authorized.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\">&#8220;These days, organizations heavily invest in securing networks and company systems, so breaching the firewall that protects the company\u2019s critical resources is highly changeling. However, it has become extremely easy to hack a user account, which leads to credential theft and enables more extensive attacks. Through social engineering or AI-based phishing schemes, users often fall into traps, becoming the weakest link in the security chain&#8221;, considers <strong>Faruk Hairedin.<\/strong><\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">In a traditional security architecture, trust is automatically granted through access authentication, which allows attackers to move freely once they infiltrate the systems via a compromised account. Zero Trust, however, grants trust to each activity, blocking lateral movements and securing all resources, including the cloud, hybrid environment, remote work endpoints, and BYOD.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\">&#8220;The novelty brought by Zero-Trust, as the name implies, revolves around the concept of \u2018implicit distrust.\u2019 Even a legitimate user, using a company-managed device and connected to a workplace\u2019s network, will no longer have automatic access to the company\u2019s resources and data. First of all, they will have to prove their trustworthiness. Depending on the level of trust verified, they will only receive access to the specific applications necessary, and their network activities will be continuously monitored. Should any event diminish the user\u2019s trust level, their network access will be automatically restricted&#8221;, mentioned <strong>Faruk Hairedin<\/strong>.<\/p>\n<\/blockquote>\n<p>There are four main functions of\u00a0 Zero Trust:<\/p>\n<ul>\n<li><strong>Identity and access management (IAM)<\/strong>: This function is responsible for identifying and authenticating users and devices before they are granted access to resources.<\/li>\n<li><strong>Micro-segmentation:<\/strong> This function is responsible for dividing the network into small, isolated segments. This makes it more difficult for attackers to move laterally through the network if they gain access to one segment.<\/li>\n<li><strong>Continuous monitoring<\/strong>: This function is responsible for monitoring all network traffic for suspicious activity. This helps to identify and respond to attacks quickly.<\/li>\n<li><strong>Threat intelligence:<\/strong> This function is responsible for collecting and analyzing threat intelligence data. This data can be used to identify and mitigate emerging threats.<\/li>\n<\/ul>\n<h2><\/h2>\n<h2><strong>What does Datanet Systems offer in terms of Zero Trust?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>As the main Cisco partner in Romania, Datanet Systems offers a solution based on the Cisco Zero Trust framework, an approach that secures endpoints, cloud services, networks, and applications.<\/p>\n<blockquote><p>&#8220;We, at Datanet, take into account all three pillars of Zero-Trust, prioritizing the users and their devices, protecting private and cloud infrastructure, and securingapplications and data. By building upon our clients\u2019 existing infrastructure, we integrate our comprehensive vision of security architecture, defining the business flows we aim to protect. After that, we identify potential attack vectors and outline the attack surface. Finally, we select the necessary security solutions to counter all threats that may affect these specific business flows. Our commitment to security at Datanet ensures that our clients\u2019 assets and data are protected with a Zero Trust approach&#8221;, explains\u00a0 <strong>Faruk Hairedin<\/strong>.<\/p><\/blockquote>\n<p>For that, Datanet Systems integrates an extensive set of solutions that includes:<\/p>\n<ul>\n<li><strong>Cisco Duo<\/strong>, a user-centric zero-trust security platform with two-factor authentication to protect access to sensitive data for all users and devices.<\/li>\n<li><strong>Secure Endpoint,<\/strong> a solution that offers advanced endpoint protection across control points, enabling your business to stay resilient.<\/li>\n<li><strong>Cisco Identity Services Engine (ISE)<\/strong>: ISE is a comprehensive IAM solution that can help organizations identify and authenticate users and devices before they are granted access to resources.<\/li>\n<li><strong>Cisco Secure Access Service Edge (SASE)<\/strong>: SASE is a cloud-based solution that combines networking, security, and cloud access services. SASE can help organizations implement Zero Trust by providing secure access to resources from anywhere, at any time.<\/li>\n<li><strong>Cisco Secure Workload (SW)<\/strong>: SW is a cloud-based solution that provides micro-segmentation for cloud workloads. SW can help organizations protect their cloud workloads from attack by isolating them from each other.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Another important component in the Zero Trust architecture built on Cisco technology is <strong>SecureX<\/strong>. The SecureX platform collects data from all Cisco solutions and, through correlation with other threat-hunting and intelligence data, understands and contextualizes the actions of each user. Available with the purchase of any Cisco product.<\/p>\n<blockquote>\n<p style=\"text-align: left;\">&#8220;Zero Trust is gaining increasing importance as a security model, given the ever-evolving cyber threat landscape. Its effectiveness in tackling current challenges is generating growing interest in this approach for the years ahead. It is estimated that by 2025, 60% of organizations worldwide will adopt a Zero Trust strategy. However, this adoption will take time, as it requires a long-term vision, concerted efforts at the organizational level, phased objectives based on priorities and available resources, and a shift in mindset.<\/p>\n<p>At Datanet Systems, we offer comprehensive end-to-end support to organizations implementing Zero Trust and improving their security posture, effectively protecting data from potential attacks. While each client\u2019s business flows are unique, we skilfully address their specific needs by combining a powerful security solutions portfolio with the expertise of our engineers. With our holistic approach, we ensure successful outcomes for any market request<span style=\"font-size: 17.6px;\">&#8220;, concludes <\/span><strong style=\"font-size: 17.6px;\">Faruk Hairedin, Business Development Director la Datanet Systems<\/strong><span style=\"font-size: 17.6px;\">.<\/span><\/p><\/blockquote>\n<p>______________________<\/p>\n<p style=\"text-align: justify;\"><em>Note: Article published in Business Review &#8211; <a href=\"https:\/\/business-review.eu\/tech\/faruk-hairedin-business-development-director-datanet-systems-we-need-zero-trust-as-cloud-and-remote-work-completely-changed-the-cybersecurity-landscape-251345\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About the Zero Trust approach in a Business Review interview with Faruk Hairedin, Business Development Director at Datanet Systems.<\/p>\n","protected":false},"author":10,"featured_media":25049,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[59],"tags":[250,248,165,209,307],"class_list":["post-25057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press-articles","tag-automation-en","tag-cybersecurity-en-2","tag-efficiency","tag-it-security-architecture-en","tag-zero-trust-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [....]&quot;<\/title>\n<meta name=\"description\" content=\"About the Zero Trust approach in a Business Review interview with Faruk Hairedin, Business Development Director at Datanet Systems\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Faruk Hairedin, Business Development Director Datanet Systems -\u201dWe need Zero-Trust&quot;\" \/>\n<meta property=\"og:description\" content=\"About the Zero Trust approach in a Business Review interview with Faruk Hairedin, Business Development Director at Datanet Systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-21T14:19:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T14:25:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk-2.png\" \/>\n<meta name=\"author\" content=\"Diana Zaharia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana Zaharia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/\"},\"author\":{\"name\":\"Diana Zaharia\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/8e0fc08f37652fac2a619b527cca0248\"},\"headline\":\"Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [&#8230;.]&#8221;\",\"datePublished\":\"2023-09-21T14:19:58+00:00\",\"dateModified\":\"2023-09-21T14:25:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/\"},\"wordCount\":1149,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Thumbnail_BR_Faruk-2.png\",\"keywords\":[\"Automation\",\"Cybersecurity\",\"Efficiency\",\"IT Security Architecture\",\"Zero Trust\"],\"articleSection\":[\"Press Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/\",\"name\":\"Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [....]\\\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Thumbnail_BR_Faruk-2.png\",\"datePublished\":\"2023-09-21T14:19:58+00:00\",\"dateModified\":\"2023-09-21T14:25:02+00:00\",\"description\":\"About the Zero Trust approach in a Business Review interview with Faruk Hairedin, Business Development Director at Datanet Systems\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Thumbnail_BR_Faruk-2.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Thumbnail_BR_Faruk-2.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/interview-faruk-hairedin-bdd-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEWS AND EVENTS\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/category\\\/all-articles\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Press Articles\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/category\\\/all-articles\\\/press-articles\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [&#8230;.]&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/8e0fc08f37652fac2a619b527cca0248\",\"name\":\"Diana Zaharia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"caption\":\"Diana Zaharia\"},\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/diana-zaharia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [....]\"","description":"About the Zero Trust approach in a Business Review interview with Faruk Hairedin, Business Development Director at Datanet Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Faruk Hairedin, Business Development Director Datanet Systems -\u201dWe need Zero-Trust\"","og_description":"About the Zero Trust approach in a Business Review interview with Faruk Hairedin, Business Development Director at Datanet Systems","og_url":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2023-09-21T14:19:58+00:00","article_modified_time":"2023-09-21T14:25:02+00:00","og_image":[{"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk-2.png","type":"","width":"","height":""}],"author":"Diana Zaharia","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Diana Zaharia","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/"},"author":{"name":"Diana Zaharia","@id":"https:\/\/datanets.ro\/#\/schema\/person\/8e0fc08f37652fac2a619b527cca0248"},"headline":"Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [&#8230;.]&#8221;","datePublished":"2023-09-21T14:19:58+00:00","dateModified":"2023-09-21T14:25:02+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/"},"wordCount":1149,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk-2.png","keywords":["Automation","Cybersecurity","Efficiency","IT Security Architecture","Zero Trust"],"articleSection":["Press Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/","url":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/","name":"Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [....]\"","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk-2.png","datePublished":"2023-09-21T14:19:58+00:00","dateModified":"2023-09-21T14:25:02+00:00","description":"About the Zero Trust approach in a Business Review interview with Faruk Hairedin, Business Development Director at Datanet Systems","breadcrumb":{"@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk-2.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/09\/Thumbnail_BR_Faruk-2.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/en\/interview-faruk-hairedin-bdd-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NEWS AND EVENTS","item":"https:\/\/datanets.ro\/en\/category\/all-articles\/"},{"@type":"ListItem","position":3,"name":"Press Articles","item":"https:\/\/datanets.ro\/en\/category\/all-articles\/press-articles\/"},{"@type":"ListItem","position":4,"name":"Faruk Hairedin, Business Development Director Datanet Systems: We need Zero Trust [&#8230;.]&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/8e0fc08f37652fac2a619b527cca0248","name":"Diana Zaharia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","caption":"Diana Zaharia"},"url":"https:\/\/datanets.ro\/en\/author\/diana-zaharia\/"}]}},"modified_by":"Diana Zaharia","_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/25057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=25057"}],"version-history":[{"count":5,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/25057\/revisions"}],"predecessor-version":[{"id":25065,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/25057\/revisions\/25065"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/25049"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=25057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=25057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=25057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}