{"id":3077,"date":"2023-08-09T22:03:06","date_gmt":"2023-08-09T20:03:06","guid":{"rendered":"https:\/\/www.nlogic.no\/?page_id=3077"},"modified":"2023-11-22T23:42:25","modified_gmt":"2023-11-22T22:42:25","slug":"zero-trust-network-access","status":"publish","type":"page","link":"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/","title":{"rendered":"Zero Trust Network Access"},"content":{"rendered":"<div class=\"nlogic-hero alignfull with-pattern-hexagons with-excerpt with-cta is-style-light wp-block-nlogic-hero\">\n\t\t\t<div class=\"hero-content container\">\n\t\t\t\t<svg width=\"1455\" height=\"1176\" viewBox=\"0 0 1455 1176\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g opacity=\"0.5\">\n<path d=\"M1168.75 137.814L1335.53 231.699C1339.05 233.68 1341.23 237.403 1341.23 241.441V426.191C1341.23 430.243 1339.03 433.978 1335.5 435.953L1168.71 529.06C1165.33 530.951 1161.2 530.951 1157.81 529.06L991.03 435.953C987.493 433.978 985.3 430.243 985.3 426.191L985.3 241.441C985.3 237.403 987.478 233.68 990.996 231.699L1157.78 137.814C1161.18 135.898 1165.34 135.898 1168.75 137.814Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1041.23 267.621L985.976 235.455\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1162.25 475.297L1162.98 530.139\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1163.26 599.246L1163.26 670.541\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1395.58 204.379L1451.53 170.742\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M931.85 204.379L874.067 170.377\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1167.65 75.1873L1390.88 201.8C1393.66 203.378 1395.38 206.331 1395.38 209.53V462.475C1395.38 465.674 1393.66 468.627 1390.88 470.205L1167.65 596.818C1164.93 598.36 1161.6 598.36 1158.88 596.818L935.655 470.205C932.872 468.627 931.152 465.674 931.152 462.475V209.53C931.152 206.331 932.872 203.378 935.655 201.8L1158.88 75.1873C1161.6 73.6449 1164.93 73.6449 1167.65 75.1873Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1171.09 4.9566L1446.1 165.115C1450.94 167.939 1453.93 173.127 1453.93 178.739V494.759C1453.93 500.378 1450.94 505.572 1446.08 508.394L1170.91 668.164C1166.01 671.01 1159.96 671.005 1155.06 668.153L881.074 508.575C876.231 505.754 873.249 500.573 873.243 494.968L872.897 178.734C872.891 173.121 875.87 167.928 880.719 165.099L1155.21 4.96261C1160.12 2.10074 1166.18 2.09845 1171.09 4.9566Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1103.63 361.715V302.965L1162.98 336.317V367.782V398.925L1106.99 367.463C1104.91 366.296 1103.63 364.098 1103.63 361.715ZM1163.26 335.82L1103.92 302.475L1160.03 270.945C1162.04 269.818 1164.49 269.818 1166.49 270.945L1222.6 302.475L1163.26 335.82ZM1163.55 336.317L1222.9 302.965V361.715C1222.9 364.098 1221.61 366.296 1219.54 367.463L1163.55 398.925V367.782V336.317Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1166.34 199.004L1281.55 265.416C1283.95 266.797 1285.43 269.354 1285.43 272.121V401.105C1285.43 403.893 1283.93 406.466 1281.5 407.84L1166.28 473.066C1163.91 474.413 1160.99 474.405 1158.62 473.044L1044.98 407.849C1042.58 406.469 1041.1 403.908 1041.1 401.135V272.09C1041.1 269.339 1042.56 266.795 1044.93 265.407L1158.57 199.026C1160.97 197.626 1163.93 197.617 1166.34 199.004Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1285.56 267.621L1339.11 236.498\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M878.731 641.635L1045.51 735.519C1049.03 737.5 1051.21 741.224 1051.21 745.261V930.012C1051.21 934.063 1049.02 937.798 1045.48 939.773L878.696 1032.88C875.309 1034.77 871.184 1034.77 867.798 1032.88L701.014 939.773C697.476 937.798 695.284 934.063 695.284 930.012L695.284 745.261C695.284 741.224 697.461 737.5 700.979 735.519L867.763 641.635C871.168 639.718 875.326 639.718 878.731 641.635Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M751.217 771.441L695.96 739.276\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M872.232 979.117L872.966 1033.96\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M873.248 1103.07L873.248 1174.36\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M1105.56 708.199L1161.52 674.563\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M641.833 708.199L584.05 674.197\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M877.635 579.008L1100.86 705.62C1103.65 707.199 1105.37 710.151 1105.37 713.35V966.296C1105.37 969.495 1103.65 972.447 1100.86 974.025L877.635 1100.64C874.916 1102.18 871.586 1102.18 868.867 1100.64L645.638 974.025C642.855 972.447 641.136 969.495 641.136 966.296V713.35C641.136 710.151 642.855 707.199 645.638 705.62L868.867 579.008C871.586 577.465 874.916 577.465 877.635 579.008Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M881.072 508.777L1156.08 668.935C1160.93 671.759 1163.91 676.948 1163.91 682.559V998.58C1163.91 1004.2 1160.92 1009.39 1156.06 1012.21L880.893 1171.98C875.991 1174.83 869.939 1174.83 865.041 1171.97L591.057 1012.4C586.214 1009.57 583.232 1004.39 583.226 998.789L582.881 682.555C582.875 676.941 585.853 671.748 590.702 668.92L865.193 508.783C870.099 505.921 876.164 505.919 881.072 508.777Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M813.609 865.536V806.785L872.959 840.137V871.603V902.746L816.972 871.283C814.895 870.116 813.609 867.919 813.609 865.536ZM873.246 839.641L813.907 806.295L870.016 774.765C872.022 773.638 874.47 773.638 876.476 774.765L932.585 806.295L873.246 839.641ZM873.533 840.137L932.883 806.785V865.536C932.883 867.919 931.597 870.116 929.52 871.283L873.533 902.746V871.603V840.137Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M876.321 702.824L991.538 769.236C993.935 770.618 995.412 773.174 995.412 775.941V904.925C995.412 907.713 993.912 910.286 991.485 911.66L876.268 976.886C873.889 978.233 870.976 978.225 868.604 976.864L754.968 911.669C752.563 910.289 751.08 907.728 751.08 904.956V775.91C751.08 773.159 752.54 770.615 754.915 769.227L868.552 702.847C870.95 701.446 873.915 701.437 876.321 702.824Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M995.547 771.441L1049.09 740.318\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M296.51 641.635L463.293 735.519C466.812 737.5 468.989 741.224 468.989 745.261V930.012C468.989 934.063 466.796 937.798 463.258 939.773L296.475 1032.88C293.088 1034.77 288.963 1034.77 285.576 1032.88L118.793 939.773C115.255 937.798 113.063 934.063 113.063 930.012L113.063 745.261C113.063 741.224 115.24 737.5 118.758 735.519L285.542 641.635C288.946 639.718 293.105 639.718 296.51 641.635Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M168.996 771.441L113.738 739.276\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M290.011 979.117L290.745 1033.96\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M291.026 1103.07L291.026 1174.36\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M523.339 708.199L579.296 674.563\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M59.6123 708.199L1.82895 674.197\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M295.414 579.008L518.642 705.62C521.425 707.199 523.144 710.151 523.144 713.35V966.296C523.144 969.495 521.425 972.447 518.642 974.025L295.414 1100.64C292.694 1102.18 289.365 1102.18 286.645 1100.64L63.4167 974.025C60.6341 972.447 58.9146 969.495 58.9146 966.296V713.35C58.9146 710.151 60.6341 707.199 63.4167 705.62L286.645 579.008C289.365 577.465 292.694 577.465 295.414 579.008Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M298.851 508.777L573.857 668.935C578.706 671.759 581.689 676.948 581.689 682.559V998.58C581.689 1004.2 578.699 1009.39 573.839 1012.21L298.671 1171.98C293.77 1174.83 287.718 1174.83 282.82 1171.97L8.83616 1012.4C3.99275 1009.57 1.01122 1004.39 1.00509 998.789L0.659534 682.555C0.6534 676.941 3.6323 671.748 8.48084 668.92L282.972 508.783C287.878 505.921 293.943 505.919 298.851 508.777Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M231.388 865.536V806.785L290.738 840.137V871.603V902.746L234.751 871.283C232.674 870.116 231.388 867.919 231.388 865.536ZM291.025 839.641L231.686 806.295L287.795 774.765C289.801 773.638 292.249 773.638 294.255 774.765L350.363 806.295L291.025 839.641ZM291.311 840.137L350.662 806.785V865.536C350.662 867.919 349.376 870.116 347.299 871.283L291.311 902.746V871.603V840.137Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M294.1 702.824L409.316 769.236C411.714 770.618 413.191 773.174 413.191 775.941V904.925C413.191 907.713 411.691 910.286 409.264 911.66L294.047 976.886C291.668 978.233 288.754 978.225 286.383 976.864L172.747 911.669C170.342 910.289 168.858 907.728 168.858 904.956V775.91C168.858 773.159 170.319 770.615 172.694 769.227L286.331 702.847C288.729 701.446 291.694 701.437 294.1 702.824Z\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<path d=\"M413.325 771.441L466.868 740.318\" stroke=\"#111111\" stroke-width=\"0.573307\"\/>\n<\/g>\n<\/svg>\n\n\t\t\t\t<h1>Zero Trust Network Access<\/h1>\n\t\t\t\t<div class=\"excerpt\"><p>Med Zero Trust Network Access (ZTNA) kan du proaktivt oppdage og utbedre IT-problemer og sikkerhetss\u00e5rbarheter, f\u00f8r de ansatte vet at de har et problem. <\/p>\n<\/div>\n\t\t\t\t\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.nlogic.no\/be-om-en-demo\/\">Be om en demo<\/a><\/div>\n<\/div>\n\n\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\n<div class=\"nlogic-section alignfull layout-1-column content-align-top is-style-transparent wp-block-nlogic-section\">\n\t\t\t<div class=\"content-columns container\">\n\t\t\t\t\n\t\t\t\t\n<div class=\"nlogic-section-content wp-block-nlogic-section-content\">\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h2 class=\"wp-block-heading\" id=\"hva-er-zero-trust-network-1\">Hva er Zero Trust Network? <\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Zero Trust Network Access (ZTNA) er en samling av teknologier som gir sikker ekstern tilgang til applikasjoner og tjenester basert p\u00e5 definerte retningslinjer for tilgangskontroll. Forskjellen mellom ZTNA-l\u00f8sninger og VPN, er at VPN gir full tilgang til et lokalt nettverk, mens ZTNA gir bare tilgang til tjenester brukeren eksplisitt har f\u00e5tt tilgang til. <\/p>\n<\/div>\n<\/div>\n\n<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\n<div class=\"nlogic-section alignfull layout-1-column content-align-top is-style-transparent wp-block-nlogic-section\">\n\t\t\t<div class=\"content-columns container\">\n\t\t\t\t\n\t\t\t\t\n<div class=\"nlogic-section-content wp-block-nlogic-section-content\">\n\n<h2 class=\"wp-block-heading has-text-align-left\" id=\"veien-til-a-oppna-zero-trust\">Veien til \u00e5 oppn\u00e5 Zero Trust<\/h2>\n\n\n\n<p>Zero Trust handler om \u00e5 s\u00f8rge at enhver identitet verifiseres f\u00f8r det blir gitt tilgang til bedriftens data og systemer. Vi hjelper deg med \u00e5 oppn\u00e5 Zero Trust gjennom 6 steg.  <\/p>\n\n\n<ul class=\"t2-link-list has-3-columns alignwide wp-block-t2-link-list\">\n\t<li class=\"t2-link-list-item wp-block-t2-link-list-item\">\n\t\t<a\n\t\t\thref=\"\"\n\t\t\tclass=\"t2-link-list-item__link t2-link-list__icon--inline-left\"\n\t\t\t\t\t>\n\t\t\t\t\t\t<div class=\"t2-link-list-item__content\">\n\t\t\t\t<span class=\"t2-link-list-item__text\">\n\t\t\t\t\t<span class=\"t2-link-list-item__icon\"><span class=\"t2-link-list-item__icon-box\"><\/span><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 34 21\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><clipPath id=\"a\"><path d=\"m0 0h34v21h-34z\"\/><\/clipPath><g clip-path=\"url(#a)\"><path clip-rule=\"evenodd\" d=\"m28.5456 9.09456-6.3061-6.27616 1.9147-1.923869 9.6029 9.557169-9.6029 9.5572-1.9147-1.9239 6.3061-6.2762h-28.379096v-2.71424z\" fill=\"#e03135\" fill-rule=\"evenodd\"\/><\/g><\/svg><\/span>1. Registrer enheten\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/a>\n\t<\/li>\n\t\n\n\t<li class=\"t2-link-list-item wp-block-t2-link-list-item\">\n\t\t<a\n\t\t\thref=\"\"\n\t\t\tclass=\"t2-link-list-item__link t2-link-list__icon--inline-left\"\n\t\t\t\t\t>\n\t\t\t\t\t\t<div class=\"t2-link-list-item__content\">\n\t\t\t\t<span class=\"t2-link-list-item__text\">\n\t\t\t\t\t<span class=\"t2-link-list-item__icon\"><span class=\"t2-link-list-item__icon-box\"><\/span><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 34 21\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><clipPath id=\"a\"><path d=\"m0 0h34v21h-34z\"\/><\/clipPath><g clip-path=\"url(#a)\"><path clip-rule=\"evenodd\" d=\"m28.5456 9.09456-6.3061-6.27616 1.9147-1.923869 9.6029 9.557169-9.6029 9.5572-1.9147-1.9239 6.3061-6.2762h-28.379096v-2.71424z\" fill=\"#e03135\" fill-rule=\"evenodd\"\/><\/g><\/svg><\/span>2. Autentiser brukeren \t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/a>\n\t<\/li>\n\t\n\n\t<li class=\"t2-link-list-item wp-block-t2-link-list-item\">\n\t\t<a\n\t\t\thref=\"\"\n\t\t\tclass=\"t2-link-list-item__link t2-link-list__icon--inline-left\"\n\t\t\t\t\t>\n\t\t\t\t\t\t<div class=\"t2-link-list-item__content\">\n\t\t\t\t<span class=\"t2-link-list-item__text\">\n\t\t\t\t\t<span class=\"t2-link-list-item__icon\"><span class=\"t2-link-list-item__icon-box\"><\/span><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 34 21\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><clipPath id=\"a\"><path d=\"m0 0h34v21h-34z\"\/><\/clipPath><g clip-path=\"url(#a)\"><path clip-rule=\"evenodd\" d=\"m28.5456 9.09456-6.3061-6.27616 1.9147-1.923869 9.6029 9.557169-9.6029 9.5572-1.9147-1.9239 6.3061-6.2762h-28.379096v-2.71424z\" fill=\"#e03135\" fill-rule=\"evenodd\"\/><\/g><\/svg><\/span>3. Sikkert nettverk og data\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/a>\n\t<\/li>\n\t\n\n\t<li class=\"t2-link-list-item wp-block-t2-link-list-item\">\n\t\t<a\n\t\t\thref=\"\"\n\t\t\tclass=\"t2-link-list-item__link t2-link-list__icon--inline-left\"\n\t\t\t\t\t>\n\t\t\t\t\t\t<div class=\"t2-link-list-item__content\">\n\t\t\t\t<span class=\"t2-link-list-item__text\">\n\t\t\t\t\t<span class=\"t2-link-list-item__icon\"><span class=\"t2-link-list-item__icon-box\"><\/span><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 34 21\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><clipPath id=\"a\"><path d=\"m0 0h34v21h-34z\"\/><\/clipPath><g clip-path=\"url(#a)\"><path clip-rule=\"evenodd\" d=\"m28.5456 9.09456-6.3061-6.27616 1.9147-1.923869 9.6029 9.557169-9.6029 9.5572-1.9147-1.9239 6.3061-6.2762h-28.379096v-2.71424z\" fill=\"#e03135\" fill-rule=\"evenodd\"\/><\/g><\/svg><\/span>4. Tilkobling til app basert p\u00e5 autorisasjon\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/a>\n\t<\/li>\n\t\n\n\t<li class=\"t2-link-list-item wp-block-t2-link-list-item\">\n\t\t<a\n\t\t\thref=\"\"\n\t\t\tclass=\"t2-link-list-item__link t2-link-list__icon--inline-left\"\n\t\t\t\t\t>\n\t\t\t\t\t\t<div class=\"t2-link-list-item__content\">\n\t\t\t\t<span class=\"t2-link-list-item__text\">\n\t\t\t\t\t<span class=\"t2-link-list-item__icon\"><span class=\"t2-link-list-item__icon-box\"><\/span><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 34 21\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><clipPath id=\"a\"><path d=\"m0 0h34v21h-34z\"\/><\/clipPath><g clip-path=\"url(#a)\"><path clip-rule=\"evenodd\" d=\"m28.5456 9.09456-6.3061-6.27616 1.9147-1.923869 9.6029 9.557169-9.6029 9.5572-1.9147-1.9239 6.3061-6.2762h-28.379096v-2.71424z\" fill=\"#e03135\" fill-rule=\"evenodd\"\/><\/g><\/svg><\/span>5. Kontinuerlig overv\u00e5king av enheter, data, nettverk og brukeratferd\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/a>\n\t<\/li>\n\t\n\n\t<li class=\"t2-link-list-item wp-block-t2-link-list-item\">\n\t\t<a\n\t\t\thref=\"\"\n\t\t\tclass=\"t2-link-list-item__link t2-link-list__icon--inline-left\"\n\t\t\t\t\t>\n\t\t\t\t\t\t<div class=\"t2-link-list-item__content\">\n\t\t\t\t<span class=\"t2-link-list-item__text\">\n\t\t\t\t\t<span class=\"t2-link-list-item__icon\"><span class=\"t2-link-list-item__icon-box\"><\/span><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 34 21\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><clipPath id=\"a\"><path d=\"m0 0h34v21h-34z\"\/><\/clipPath><g clip-path=\"url(#a)\"><path clip-rule=\"evenodd\" d=\"m28.5456 9.09456-6.3061-6.27616 1.9147-1.923869 9.6029 9.557169-9.6029 9.5572-1.9147-1.9239 6.3061-6.2762h-28.379096v-2.71424z\" fill=\"#e03135\" fill-rule=\"evenodd\"\/><\/g><\/svg><\/span>6. Oppdage og redusere trusler\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/a>\n\t<\/li>\n\t\n<\/ul>\n<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\" id=\"sikker-nettverksinfrastruktur\">Sikker nettverksinfrastruktur <\/h2>\n\n\n\n<p>Det er mange gode grunner til \u00e5 implementere Zero Trust Network Access i dagens komplekse trusselbilde. Vi bist\u00e5r deg med \u00e5 kartlegge hvilke behov du har og er din r\u00e5dgiver fra \u00e5 finne riktig strategi, til \u00e5 implementere og vedlikeholde. <\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-sikkerhet-backup-1-1024x683.jpg\" alt=\"\" class=\"wp-image-3775 size-full\" srcset=\"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-sikkerhet-backup-1-1024x683.jpg 1024w, https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-sikkerhet-backup-1-300x200.jpg 300w, https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-sikkerhet-backup-1-768x512.jpg 768w, https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-sikkerhet-backup-1-1536x1025.jpg 1536w, https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-sikkerhet-backup-1.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"fordeler-med-zero-trust-network-access\">Fordeler med Zero Trust Network Access<\/h2>\n\n\n\n<p>ZTNA gir virksomheter en mer sikker og skalerbar tiln\u00e6rming til nettverkssikkerhet som passer bedre til dagens komplekse og dynamiske trusselbilde. Nedenfor presenterer vi de st\u00f8rste fordelen for din virksomhet med ZTNA. <\/p>\n\n\n<div class=\"t2-accordion wp-block-t2-accordion\" data-allow-multiple>\n<div class=\"t2-accordion-item wp-block-t2-accordion-item\">\t<h2 class=\"t2-accordion-title\">\n\t\t<button\n\t\t\taria-controls=\"accordion-panel\"\n\t\t\taria-expanded=\"false\"\n\t\t\tclass=\"t2-accordion-trigger\"\n\t\t\tid=\"utvidet-nettverkstilgang\"\n\t\t\ttype=\"button\"\n\t\t>\n\t\t\tUtvidet nettverkstilgang\t\t\t<span class=\"t2-accordion-icon is-closed-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 19c-.285156 0-.519531-.097656-.710938-.289062C11.097656 18.519531 11 18.285156 11 18v-5H6c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h5V6c0-.285156.097656-.519531.289062-.710938C11.480469 5.097656 11.714844 5 12 5c.285156 0 .519531.097656.710938.289062C12.902344 5.480469 13 5.714844 13 6v5h5c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13h-5v5c0 .285156-.097656.519531-.289062.710938C12.519531 18.902344 12.285156 19 12 19Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t\t<span class=\"t2-accordion-icon is-open-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M6 13c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h12c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t<\/button>\n\t<\/h2>\n\t\t<div\n\t\taria-labelledby=\"utvidet-nettverkstilgang\"\n\t\tclass=\"t2-accordion-item__inner-container\"\n\t\tid=\"accordion-panel\"\n\t\trole=\"region\"\n\t\thidden\n\t>\n\t\t\n\n<p>Tradisjonelle nettverkssikkerhetsmodeller antar ofte at enheter som er koblet til det interne nettverket, er trygge. Imidlertid arbeider dagens bedrifter i stadig st\u00f8rre grad med skybaserte tjenester, eksterne ansatte og mobilbrukere. ZTNA gir en sikker tiln\u00e6rming til \u00e5 gi begrenset og kontrollert tilgang til applikasjoner og tjenester uavhengig av hvor brukeren eller enheten befinner seg.<\/p>\n\n\t<\/div>\n\t<\/div>\n\n<div class=\"t2-accordion-item wp-block-t2-accordion-item\">\t<h2 class=\"t2-accordion-title\">\n\t\t<button\n\t\t\taria-controls=\"accordion-panel-1\"\n\t\t\taria-expanded=\"false\"\n\t\t\tclass=\"t2-accordion-trigger\"\n\t\t\tid=\"strongbegrensning-av-angrepsflaterstrong\"\n\t\t\ttype=\"button\"\n\t\t>\n\t\t\tBegrensning av angrepsflater\t\t\t<span class=\"t2-accordion-icon is-closed-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 19c-.285156 0-.519531-.097656-.710938-.289062C11.097656 18.519531 11 18.285156 11 18v-5H6c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h5V6c0-.285156.097656-.519531.289062-.710938C11.480469 5.097656 11.714844 5 12 5c.285156 0 .519531.097656.710938.289062C12.902344 5.480469 13 5.714844 13 6v5h5c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13h-5v5c0 .285156-.097656.519531-.289062.710938C12.519531 18.902344 12.285156 19 12 19Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t\t<span class=\"t2-accordion-icon is-open-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M6 13c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h12c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t<\/button>\n\t<\/h2>\n\t\t<div\n\t\taria-labelledby=\"strongbegrensning-av-angrepsflaterstrong\"\n\t\tclass=\"t2-accordion-item__inner-container\"\n\t\tid=\"accordion-panel-1\"\n\t\trole=\"region\"\n\t\thidden\n\t>\n\t\t\n\n<p>ZTNA reduserer angrepsflater ved \u00e5 minimere eksponeringen av interne ressurser. Den gir kun tilgang til de n\u00f8dvendige applikasjonene og ressursene for godkjente brukere, og hindrer dermed potensielle angripere i \u00e5 utnytte un\u00f8dvendig tilgang.<\/p>\n\n\t<\/div>\n\t<\/div>\n\n<div class=\"t2-accordion-item wp-block-t2-accordion-item\">\t<h2 class=\"t2-accordion-title\">\n\t\t<button\n\t\t\taria-controls=\"accordion-panel-2\"\n\t\t\taria-expanded=\"false\"\n\t\t\tclass=\"t2-accordion-trigger\"\n\t\t\tid=\"mikrosegmentering\"\n\t\t\ttype=\"button\"\n\t\t>\n\t\t\tMikrosegmentering\t\t\t<span class=\"t2-accordion-icon is-closed-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 19c-.285156 0-.519531-.097656-.710938-.289062C11.097656 18.519531 11 18.285156 11 18v-5H6c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h5V6c0-.285156.097656-.519531.289062-.710938C11.480469 5.097656 11.714844 5 12 5c.285156 0 .519531.097656.710938.289062C12.902344 5.480469 13 5.714844 13 6v5h5c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13h-5v5c0 .285156-.097656.519531-.289062.710938C12.519531 18.902344 12.285156 19 12 19Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t\t<span class=\"t2-accordion-icon is-open-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M6 13c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h12c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t<\/button>\n\t<\/h2>\n\t\t<div\n\t\taria-labelledby=\"mikrosegmentering\"\n\t\tclass=\"t2-accordion-item__inner-container\"\n\t\tid=\"accordion-panel-2\"\n\t\trole=\"region\"\n\t\thidden\n\t>\n\t\t\n\n<p>ZTNA gir mulighet for mikrosegmentering, som er en tiln\u00e6rming der nettverket deles opp i mindre soner som er beskyttet av strenge tilgangskontroller. Dette gir ekstra beskyttelse ved \u00e5 begrense spredningen av eventuelle sikkerhetsbrudd.<\/p>\n\n\t<\/div>\n\t<\/div>\n\n<div class=\"t2-accordion-item wp-block-t2-accordion-item\">\t<h2 class=\"t2-accordion-title\">\n\t\t<button\n\t\t\taria-controls=\"accordion-panel-3\"\n\t\t\taria-expanded=\"false\"\n\t\t\tclass=\"t2-accordion-trigger\"\n\t\t\tid=\"mobilitet-og-fleksibilitet\"\n\t\t\ttype=\"button\"\n\t\t>\n\t\t\tMobilitet og fleksibilitet\t\t\t<span class=\"t2-accordion-icon is-closed-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 19c-.285156 0-.519531-.097656-.710938-.289062C11.097656 18.519531 11 18.285156 11 18v-5H6c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h5V6c0-.285156.097656-.519531.289062-.710938C11.480469 5.097656 11.714844 5 12 5c.285156 0 .519531.097656.710938.289062C12.902344 5.480469 13 5.714844 13 6v5h5c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13h-5v5c0 .285156-.097656.519531-.289062.710938C12.519531 18.902344 12.285156 19 12 19Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t\t<span class=\"t2-accordion-icon is-open-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M6 13c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h12c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t<\/button>\n\t<\/h2>\n\t\t<div\n\t\taria-labelledby=\"mobilitet-og-fleksibilitet\"\n\t\tclass=\"t2-accordion-item__inner-container\"\n\t\tid=\"accordion-panel-3\"\n\t\trole=\"region\"\n\t\thidden\n\t>\n\t\t\n\n<p>Moderne arbeidsstyrker er mobile og arbeider fra ulike steder og enheter. ZTNA gir brukere mulighet til \u00e5 f\u00e5 tilgang til n\u00f8dvendige ressurser p\u00e5 en sikker m\u00e5te uavhengig av hvor de befinner seg, samtidig som selskapets sikkerhetsstandarder opprettholdes.<\/p>\n\n\t<\/div>\n\t<\/div>\n\n<div class=\"t2-accordion-item wp-block-t2-accordion-item\">\t<h2 class=\"t2-accordion-title\">\n\t\t<button\n\t\t\taria-controls=\"accordion-panel-4\"\n\t\t\taria-expanded=\"false\"\n\t\t\tclass=\"t2-accordion-trigger\"\n\t\t\tid=\"bedre-respons-p-trusler\"\n\t\t\ttype=\"button\"\n\t\t>\n\t\t\tBedre respons p\u00e5 trusler\t\t\t<span class=\"t2-accordion-icon is-closed-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 19c-.285156 0-.519531-.097656-.710938-.289062C11.097656 18.519531 11 18.285156 11 18v-5H6c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h5V6c0-.285156.097656-.519531.289062-.710938C11.480469 5.097656 11.714844 5 12 5c.285156 0 .519531.097656.710938.289062C12.902344 5.480469 13 5.714844 13 6v5h5c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13h-5v5c0 .285156-.097656.519531-.289062.710938C12.519531 18.902344 12.285156 19 12 19Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t\t<span class=\"t2-accordion-icon is-open-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M6 13c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h12c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t<\/button>\n\t<\/h2>\n\t\t<div\n\t\taria-labelledby=\"bedre-respons-p-trusler\"\n\t\tclass=\"t2-accordion-item__inner-container\"\n\t\tid=\"accordion-panel-4\"\n\t\trole=\"region\"\n\t\thidden\n\t>\n\t\t\n\n<p>ZTNA gir mulighet for mer detaljert overv\u00e5king av nettverkstrafikk og brukeratferd. Dette gj\u00f8r det lettere \u00e5 oppdage unormal aktivitet og potensielle trusler tidligere, slik at selskaper raskere kan reagere og begrense skaden.<\/p>\n\n\t<\/div>\n\t<\/div>\n\n<div class=\"t2-accordion-item wp-block-t2-accordion-item\">\t<h2 class=\"t2-accordion-title\">\n\t\t<button\n\t\t\taria-controls=\"accordion-panel-5\"\n\t\t\taria-expanded=\"false\"\n\t\t\tclass=\"t2-accordion-trigger\"\n\t\t\tid=\"compliance-og-reguleringer\"\n\t\t\ttype=\"button\"\n\t\t>\n\t\t\tCompliance og reguleringer\t\t\t<span class=\"t2-accordion-icon is-closed-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 19c-.285156 0-.519531-.097656-.710938-.289062C11.097656 18.519531 11 18.285156 11 18v-5H6c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h5V6c0-.285156.097656-.519531.289062-.710938C11.480469 5.097656 11.714844 5 12 5c.285156 0 .519531.097656.710938.289062C12.902344 5.480469 13 5.714844 13 6v5h5c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13h-5v5c0 .285156-.097656.519531-.289062.710938C12.519531 18.902344 12.285156 19 12 19Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t\t<span class=\"t2-accordion-icon is-open-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M6 13c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h12c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t<\/button>\n\t<\/h2>\n\t\t<div\n\t\taria-labelledby=\"compliance-og-reguleringer\"\n\t\tclass=\"t2-accordion-item__inner-container\"\n\t\tid=\"accordion-panel-5\"\n\t\trole=\"region\"\n\t\thidden\n\t>\n\t\t\n\n<p>Mange bransjer er underlagt strenge compliance-regler n\u00e5r det gjelder databeskyttelse og personvern. ZTNA kan hjelpe bedrifter med \u00e5 oppfylle disse kravene ved \u00e5 implementere streng tilgangskontroll og sikre overholdelse av retningslinjene.<\/p>\n\n\t<\/div>\n\t<\/div>\n\n<div class=\"t2-accordion-item wp-block-t2-accordion-item\">\t<h2 class=\"t2-accordion-title\">\n\t\t<button\n\t\t\taria-controls=\"accordion-panel-6\"\n\t\t\taria-expanded=\"false\"\n\t\t\tclass=\"t2-accordion-trigger\"\n\t\t\tid=\"redusert-angrepsrisiko\"\n\t\t\ttype=\"button\"\n\t\t>\n\t\t\tRedusert angrepsrisiko\t\t\t<span class=\"t2-accordion-icon is-closed-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 19c-.285156 0-.519531-.097656-.710938-.289062C11.097656 18.519531 11 18.285156 11 18v-5H6c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h5V6c0-.285156.097656-.519531.289062-.710938C11.480469 5.097656 11.714844 5 12 5c.285156 0 .519531.097656.710938.289062C12.902344 5.480469 13 5.714844 13 6v5h5c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13h-5v5c0 .285156-.097656.519531-.289062.710938C12.519531 18.902344 12.285156 19 12 19Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t\t<span class=\"t2-accordion-icon is-open-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M6 13c-.285156 0-.519531-.097656-.710938-.289062C5.097656 12.519531 5 12.285156 5 12c0-.285156.097656-.519531.289062-.710938C5.480469 11.097656 5.714844 11 6 11h12c.285156 0 .519531.097656.710938.289062C18.902344 11.480469 19 11.714844 19 12c0 .285156-.097656.519531-.289062.710938C18.519531 12.902344 18.285156 13 18 13Zm0 0\"\/><\/svg>\t\t\t<\/span>\n\t\t<\/button>\n\t<\/h2>\n\t\t<div\n\t\taria-labelledby=\"redusert-angrepsrisiko\"\n\t\tclass=\"t2-accordion-item__inner-container\"\n\t\tid=\"accordion-panel-6\"\n\t\trole=\"region\"\n\t\thidden\n\t>\n\t\t\n\n<p>Ved \u00e5 implementere ZTNA kan bedrifter redusere risikoen for vellykkede angrep, da denne tiln\u00e6rmingen krever autentisering og autorisering p\u00e5 flere niv\u00e5er f\u00f8r tilgang blir gitt til ressurser.<\/p>\n\n\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"nlogic-section alignfull layout-1-column content-align-top is-style-transparent wp-block-nlogic-section\">\n\t\t\t<div class=\"content-columns container\">\n\t\t\t\t\n\t\t\t\t\n<div class=\"nlogic-section-content wp-block-nlogic-section-content\">\n\n<h2 class=\"wp-block-heading\" id=\"bedre-sikkerhet-med-risk-based-zero-trust-strategy\">Bedre sikkerhet med Risk-Based Zero Trust strategy<\/h2>\n\n\n\n<p>Sammen med v\u00e5r partner Ivanti hjelper vi virksomheter med \u00e5 forbedre sikkerheten i nettverksinfrastrukturen gjennom sikkerhetsl\u00f8sningen Zero Trust Network Access. <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.nlogic.no\/nettverksteknologi\/ivanti\/\">Ivanti Zero Trust Network Access<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\n<div class=\"nlogic-section alignfull layout-1-column content-align-top is-style-light wp-block-nlogic-section\">\n\t\t\t<div class=\"content-columns container\">\n\t\t\t\t\n\t\t\t\t\n<div class=\"nlogic-section-content wp-block-nlogic-section-content\">\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\" id=\"be-om-en-demo\">Be om en demo<\/h2>\n\n\n\n<p>\u00d8nsker du en demo av v\u00e5re l\u00f8sninger? Fyll inn skjema for \u00e5 kontakte oss. En av v\u00e5re eksperter vil kontakte deg p\u00e5 e-post. <\/p>\n\n\n<div class=\"nlogic-button-modal wp-block-nlogic-button-modal\">\n\t\t\t<div class=\"wp-block-buttons is-layout-flex\">\n\t\t\t\t<div class=\"wp-block-button nlogic-button-modal__button\">\n\t\t\t\t\t<a class=\"wp-block-button__link has-white-color has-text-color\" data-micromodal-trigger=\"nlogic-modal1\">Be om en demo<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div id=\"nlogic-modal1\" class=\"modal micromodal-slide\" aria-hidden=\"true\">\n\t\t\t<div class=\"modal__overlay\" tabindex=\"-1\" data-micromodal-close>\n\t\t\t\t<div class=\"modal__container\" role=\"dialog\" aria-modal=\"true\" aria-labelledby=\"Be om en demo for Zero Trust Network Access\" >\n\t\t\t\t\t<div class=\"modal__content_container\">\n\t\t\t\t\t\t<h2 class=\"modal__title\">Be om en demo for Zero Trust Network Access<\/h2>\n\t\t\t\t\t\t<main class=\"modal__content\">\n\t\t\t\t\t\t\t\n\n<p><\/p>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"8798010\",\n    formId: \"6a7e630c-823e-4ddb-abf6-aa59a4b5b67a\"\n  });\n<\/script>\n\n\n\t\t\t\t\t\t<\/main>\n\t\t\t\t\t\t<button class=\"modal__close\" aria-label=\"Close modal\" data-micromodal-close><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon\" aria-hidden=\"true\" focusable=\"false\"><path d=\"m12 13.4-4.9 4.9c-.2.2-.4.3-.7.3-.3 0-.5-.1-.7-.3-.2-.2-.3-.4-.3-.7s.1-.5.3-.7l4.9-4.9-4.9-4.9c-.2-.2-.3-.4-.3-.7 0-.3.1-.5.3-.7.2-.2.4-.3.7-.3.3 0 .5.1.7.3l4.9 4.9 4.9-4.9c.2-.2.4-.3.7-.3s.5.1.7.3c.2.2.3.4.3.7 0 .3-.1.5-.3.7L13.4 12l4.9 4.9c.2.2.3.4.3.7s-.1.5-.3.7c-.2.2-.4.3-.7.3s-.5-.1-.7-.3L12 13.4z\"\/><\/svg><\/button>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><svg class=\"svg\">\n  <clipPath id=\"person-hexagon-mask\" clipPathUnits=\"objectBoundingBox\"><path d=\"M0.455,0.013 C0.485,-0.002,0.521,-0.002,0.551,0.013 L0.753,0.115 L0.953,0.22 C0.983,0.235,1,0.264,1,0.294 L1,0.501 L1,0.709 C1,0.739,0.983,0.767,0.953,0.783 L0.753,0.888 L0.551,0.99 C0.521,1,0.485,1,0.455,0.99 L0.253,0.888 L0.053,0.783 C0.023,0.767,0.005,0.739,0.005,0.709 L0.003,0.501 L0.005,0.294 C0.005,0.264,0.023,0.235,0.053,0.22 L0.253,0.115 L0.455,0.013\"><\/path><\/clipPath>\n<\/svg><div class=\"t2-featured-single-post t2-featured-content is-post-type-person role-losningsradgiver wp-block-t2-featured-single-post\">\n<div class=\"wp-block-group alignfull is-card-people is-layout-flow wp-block-group-is-layout-flow\">\n<figure  class=\"t2-post-featured-image has-image-ratio-16-9 wp-block-t2-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1498\" height=\"1498\" src=\"https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/Lau_2-e1736168609449.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Foto av Lau S\u00f8rensen.\" srcset=\"https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/Lau_2-e1736168609449.jpg 1498w, https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/Lau_2-e1736168609449-300x300.jpg 300w, https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/Lau_2-e1736168609449-1024x1024.jpg 1024w, https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/Lau_2-e1736168609449-150x150.jpg 150w, https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/Lau_2-e1736168609449-768x768.jpg 768w\" sizes=\"auto, (max-width: 1498px) 100vw, 1498px\" \/><\/figure>\n\n<div class=\"wp-block-group alignfull post-details is-layout-flow wp-block-group-is-layout-flow\">\n\t<h2 class=\"t2-post-title wp-block-t2-post-title\">Lau S\u00f8rensen<\/h2>\n\t\n\t<div class=\"card-info wp-block-t2-people-meta\"><div class=\"card-info__post-meta meta-key-people_email\"><a href=\"mailto:lau.sorensen@nlogic.no\">lau.sorensen@nlogic.no<\/a><\/div><div class=\"card-info__post-meta meta-key-people_phone\"><a href=\"tel:+47 905 33 524\">+47 905 33 524<\/a><\/div><\/div>\n<\/div>\n\n<\/div>\n\n<\/div><\/div>\n<\/div>\n\n<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Med Zero Trust Network Access (ZTNA) kan du proaktivt oppdage og utbedre IT-problemer og sikkerhetss\u00e5rbarheter, f\u00f8r de ansatte vet at de har et problem. <\/p>\n","protected":false},"author":5,"featured_media":5103,"parent":2849,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"dk_card_image_id":0,"footnotes":""},"class_list":["post-3077","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fordeler med Zero Trust Network Access<\/title>\n<meta name=\"description\" content=\"Med Zero Trust Network Access (ZTNA) kan du proaktivt oppdage og utbedre IT-problemer og sikkerhetss\u00e5rbarheter.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Network Access\" \/>\n<meta property=\"og:description\" content=\"Med Zero Trust Network Access (ZTNA) kan du proaktivt oppdage og utbedre IT-problemer og sikkerhetss\u00e5rbarheter.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/\" \/>\n<meta property=\"og:site_name\" content=\"nLogic - Powered by Knowledge. Driven by Trust.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nLogicAS\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-22T22:42:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-people-meeting-office.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1366\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/\",\"url\":\"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/\",\"name\":\"Fordeler med Zero Trust Network Access\",\"isPartOf\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/#website\"},\"datePublished\":\"2023-08-09T20:03:06+00:00\",\"dateModified\":\"2023-11-22T22:42:25+00:00\",\"description\":\"Med Zero Trust Network Access (ZTNA) kan du proaktivt oppdage og utbedre IT-problemer og sikkerhetss\u00e5rbarheter.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"L\u00f8sninger\",\"item\":\"https:\/\/www.nlogic.no\/english\/losninger\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sikkerhet\",\"item\":\"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sikker nettverksinfrastruktur\",\"item\":\"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zero Trust Network Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#website\",\"url\":\"https:\/\/www.nlogic.no\/english\/\",\"name\":\"nLogic - Powered by Knowledge. Driven by Trust.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nlogic.no\/english\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#organization\",\"name\":\"nLogic - Powered by Knowledge. Driven by Trust.\",\"url\":\"https:\/\/www.nlogic.no\/english\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-logo-1.svg\",\"contentUrl\":\"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-logo-1.svg\",\"caption\":\"nLogic - Powered by Knowledge. Driven by Trust.\"},\"image\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nLogicAS\",\"https:\/\/www.linkedin.com\/company\/nlogic-as\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fordeler med Zero Trust Network Access","description":"Med Zero Trust Network Access (ZTNA) kan du proaktivt oppdage og utbedre IT-problemer og sikkerhetss\u00e5rbarheter.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Zero Trust Network Access","og_description":"Med Zero Trust Network Access (ZTNA) kan du proaktivt oppdage og utbedre IT-problemer og sikkerhetss\u00e5rbarheter.","og_url":"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/","og_site_name":"nLogic - Powered by Knowledge. Driven by Trust.","article_publisher":"https:\/\/www.facebook.com\/nLogicAS","article_modified_time":"2023-11-22T22:42:25+00:00","og_image":[{"width":2048,"height":1366,"url":"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-people-meeting-office.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/","url":"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/","name":"Fordeler med Zero Trust Network Access","isPartOf":{"@id":"https:\/\/www.nlogic.no\/english\/#website"},"datePublished":"2023-08-09T20:03:06+00:00","dateModified":"2023-11-22T22:42:25+00:00","description":"Med Zero Trust Network Access (ZTNA) kan du proaktivt oppdage og utbedre IT-problemer og sikkerhetss\u00e5rbarheter.","breadcrumb":{"@id":"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/zero-trust-network-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"L\u00f8sninger","item":"https:\/\/www.nlogic.no\/english\/losninger\/"},{"@type":"ListItem","position":2,"name":"Sikkerhet","item":"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/"},{"@type":"ListItem","position":3,"name":"Sikker nettverksinfrastruktur","item":"https:\/\/www.nlogic.no\/english\/losninger\/sikkerhet\/nettverkssikkerhet\/"},{"@type":"ListItem","position":4,"name":"Zero Trust Network Access"}]},{"@type":"WebSite","@id":"https:\/\/www.nlogic.no\/english\/#website","url":"https:\/\/www.nlogic.no\/english\/","name":"nLogic - Powered by Knowledge. Driven by Trust.","description":"","publisher":{"@id":"https:\/\/www.nlogic.no\/english\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nlogic.no\/english\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nlogic.no\/english\/#organization","name":"nLogic - Powered by Knowledge. Driven by Trust.","url":"https:\/\/www.nlogic.no\/english\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nlogic.no\/english\/#\/schema\/logo\/image\/","url":"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-logo-1.svg","contentUrl":"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-logo-1.svg","caption":"nLogic - Powered by Knowledge. Driven by Trust."},"image":{"@id":"https:\/\/www.nlogic.no\/english\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nLogicAS","https:\/\/www.linkedin.com\/company\/nlogic-as\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/pages\/3077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/comments?post=3077"}],"version-history":[{"count":5,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/pages\/3077\/revisions"}],"predecessor-version":[{"id":5780,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/pages\/3077\/revisions\/5780"}],"up":[{"embeddable":true,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/pages\/2849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/media\/5103"}],"wp:attachment":[{"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/media?parent=3077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}