{"id":79367,"date":"2023-07-06T08:42:36","date_gmt":"2023-07-06T15:42:36","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/website-refresh\/asset-inventory-copy\/"},"modified":"2025-07-23T10:57:32","modified_gmt":"2025-07-23T14:57:32","slug":"zero-trust","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/solutions\/zero-trust\/","title":{"rendered":"Zero Trust"},"content":{"rendered":"<h1>Zero Trust<\/h1>\n<h3>Forescout delivers Zero Trust Assurance based on total visibility, least privilege network access and compliance\u00a0enforcement.<\/h3>\n<p>Forescout can help you adopt a NIST SP 800-207-based ZTA within your existing multi-vendor environment \u2013 from identifying, monitoring and controlling connected assets to orchestrating enforcement and remediation across connected infrastructure and clouds.<\/p>\n<p>Schedule a demo<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"\/webinars\/mastering-zero-trust-the-five-essential-steps-to-zero-trust-assurance\/\" title=\"Watch Webinar\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/Zero-Trust-Assurance-Webinar-Feature-v1-1200x628-1.webp\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Mastering Zero Trust: The Five Essential Steps to Zero Trust Assurance<\/h2>\n<p>Ready to take control of your network security strategy? Join Forescout\u2019s Todd Bertchume as he reveals the five crucial steps to achieving Zero Trust Assurance. Dive into the evolving world of Zero Trust and discover how organizations can secure their networks, mitigate risks, and stay ahead of cyber threats.<\/p>\n<p><a href=\"\/webinars\/mastering-zero-trust-the-five-essential-steps-to-zero-trust-assurance\/\" title=\"Watch Webinar\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Webinar<\/a><\/p>\n<h2 class=\"c-title\">Zero Trust: The de Facto Security Standard<\/h2>\n<p>Modern enterprises support IT\/IoT, IoMT, Ot, and CPS devices with software-defined boundaries. The principles of Zero Trust Architecture includes network designs that assume that the system will be breached (or that a breach has already occurred). Zero Trust Access and Assurance monitors all network activity, granting least-privilege access to only what is needed while constantly looking out for anomalous or malicious behavior. In other words, \u201cNever trust. Always\u00a0verify.\u201d<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/zero-trust-icon-2col.svg\" class=\"c-stats__img\" style=\"width:55%;height:auto\" alt=\"Zero Trust\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n96%<\/h3>\n<p class=\"c-stats__text\">% security decision-makers who say zero trust is critical to their organization\u2019s success<sup>1<\/sup><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/growth-chart-icon-2col.svg\" class=\"c-stats__img\" style=\"width:55%;height:auto\" alt=\"Growth Chart\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n1M<\/h3>\n<p class=\"c-stats__text\">Annual Dollar savings in average breach costs from organizations that have deployed a ZTA<sup>2<\/sup><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/globe-icon-2col.svg\" class=\"c-stats__img\" style=\"width:55%;height:auto\" alt=\"Remote access deployments that will use ZT network architecture vs. VPNs by 2025\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n70%<\/h3>\n<p class=\"c-stats__text\">of new remote access deployments that will use ZT network architecture vs. VPNs by 2025<sup>3<\/sup><\/p>\n<h2>Reach Zero Trust Mandates with an Adaptive Approach<\/h2>\n<p>As organizations work to meet regulatory requirements, adopting Zero Trust architectures can feel overwhelming, especially when managing expansive networks with millions of connected devices. The rise of unmanaged OT\/IoT devices further complicates security, increasing the risk of audit failures and breaches. Discover how an adaptive approach to Zero Trust can streamline the process and help organizations achieve compliance more efficiently.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/wp-reach-zero-trust-mandates-with-an-adaptive-approach\/\" title=\"Read White Paper\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">Read White Paper<\/a><\/p>\n<p><a href=\"https:\/\/www.forescout.com\/wp-reach-zero-trust-mandates-with-an-adaptive-approach\/\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/12\/Thumbnail-zero-trust-whitepaper-2024.webp\" loading=\"lazy\"><\/a><\/p>\n<h2 style=\"color: #009dea;text-align: center\">Customer Success with Zero Trust<\/h2>\n<p><button class=\"slider-navigation\" data-corresponding-slide=\"0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/04\/south-central-power-logo.png\" alt=\"South Central Power Co.\" loading=\"lazy\"><\/button><button class=\"slider-navigation\" data-corresponding-slide=\"1\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/US-State-Govt-Agency-Icon.png\" loading=\"lazy\"><\/button><button class=\"slider-navigation\" data-corresponding-slide=\"2\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/American-Energy-Co-Icon.png\" loading=\"lazy\"><\/button><\/p>\n<figure>\n<blockquote>\n<p>To gain the functionality that Forescout provides \u2013 from seeing and managing assets to triggering control actions and accelerating zero trust segmentation \u2013 we would have needed multiple tools. Going with Forescout was far more cost-effective.<\/p>\n<\/blockquote><figcaption>Jeff Haidet<br \/>\nDirector of Application Development and Architecture<br \/>\nSouth Central Power Co.<br \/>\n<\/figcaption><\/figure>\n<p><a href=\"\/resources\/south-central-power-company\/\" title=\"learn more\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\">learn more<\/a><\/p>\n<figure>\n<blockquote>\n<p>When there is trust, there is speed. The Forescout 4D Platform<sup>\u2122<\/sup> is invaluable because it provides the level of visibility that gives us that trust \u2013 trust that we know exactly what devices are on our network, along with the situational awareness both to be proactive and to address issues as they arise.<\/p>\n<\/blockquote><figcaption>Chief Technology Officer<br \/>\nU.S. State Government Agency<br \/>\n<\/figcaption><\/figure>\n<p><a href=\"\/resources\/u.s.state-government-agency\/\" title=\"learn more\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\">learn more<\/a><\/p>\n<figure>\n<blockquote>\n<p>The real-time accuracy and completeness of the visibility that Forescout provides is what really impresses us.<\/p>\n<\/blockquote><figcaption>Director of Security Operations, IT and Control Systems<br \/>\nAmerican Energy Company<br \/>\n<\/figcaption><\/figure>\n<p><a href=\"\/resources\/american-energy-company-case-study\/\" title=\"learn more\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\">learn more<\/a><\/p>\n<p>Previous<br \/>\nNext\n<h2 class=\"c-title\">How Forescout Enables a Multi-Vendor Zero Trust Architecture<\/h2>\n<p>Under a ZTA based on NIST SP 800-207, a central policy decision point (PDP) in the control layer collects all available security intelligence about an asset to determine the right controls to apply, then orchestrates enforcement of those controls across multiple policy enforcement points (PEPs). Forescout facilitates this process in four key ways.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/device-visibility-blue-round-icon.svg\" style=\"width:55%\" alt=\"Device Visibility\" loading=\"lazy\"><\/p>\n<h3>Device Visibility &amp; Classification<\/h3>\n<p>Network-based discovery produces a list of IP addresses \u2013 many vendors stop here. The Forescout 4D Platform<sup>\u2122<\/sup> combines intelligence sources to classify and group raw IP addresses into your business taxonomy.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Traffic-analysis-blue-round-icon.svg\" style=\"width:55%\" alt=\"Traffic Analysis\" loading=\"lazy\"><\/p>\n<h3>Traffic Analysis &amp; Visualization<\/h3>\n<p>An intuitive matrix of traffic among all connected assets facilitates segmentation compliance and policy design based on what should and should not be communicating.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Policy-Impact-blue-round-icon.svg\" style=\"width:55%\" alt=\"Policy Impact Simulation\" loading=\"lazy\"><\/p>\n<h3>Policy Impact Simulation<\/h3>\n<p>Simulating your ZTA designs using actual traffic flows allows you to validate controls, fine-tune policies and flag violations without causing costly business disruptions.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/central-policy-blue-round-icon.svg\" style=\"width:55%\" alt=\"Central Policy Decision Point\" loading=\"lazy\"><\/p>\n<h3>Central Policy Decision Point<\/h3>\n<p>The Forescout 4D Platform<sup>\u2122<\/sup> analyzes 800+ data points from activity logs, threat intelligence, compliance, identity management, SIEMs and more to orchestrate policy enforcement among your PEPs.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-5-Essentials-of-NetSec-eBook-Zero-Trust.svg\" alt=\"Forescout Zero Trust Architecture diagram\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title\">Related Products<\/h2>\n<p><a href=\"\/products\/eyesight\/\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/eyesight-in-screen.webp\" alt=\"eyeSight Product Screen\" loading=\"lazy\"><\/a><\/p>\n<h3>eyeSight<\/h3>\n<p>Continuously discover, assess, and govern assets without agents or active techniques that could compromise business operations.\u00a0\u00a0<\/p>\n<p><a href=\"\/products\/eyesight\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p><a href=\"\/products\/eyecontrol\/\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/eyecontrol-in-screen.webp\" alt=\"Eyecontrol In Screen\" loading=\"lazy\"><\/a><\/p>\n<h3>eyeControl<\/h3>\n<p>Enforce and automate policy-based controls to mitigate threats, incidents and compliance gaps.\u00a0\u00a0\u00a0<\/p>\n<p><a href=\"\/products\/eyecontrol\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p><a href=\"\/products\/eyesegment\/\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/eyesegment-in-screen.webp\" alt=\"eyeSegment In Screen\" loading=\"lazy\"><\/a><\/p>\n<h3>eyeSegment<\/h3>\n<p>Accelerate the design, planning and deployment of dynamic zero trust segmentation across the extended enterprise to reduce your attack surface and regulatory risk.<\/p>\n<p><a href=\"\/products\/eyesegment\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p><a href=\"\/products\/eyeextend\/\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/eyeextend-in-screen.webp\" alt=\"Eyeextend\" loading=\"lazy\"><\/a><\/p>\n<h3>eyeExtend<\/h3>\n<p>Orchestrated security powered by the world\u2019s best device intelligence and rapid threat response.\u00a0\u00a0\u00a0<\/p>\n<p><a href=\"\/products\/eyeextend\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p style=\"text-align: left\"><small><sup>1<\/sup> <a href=\"https:\/\/info.microsoft.com\/ww-landing-zero-trust-adoption-report-gate.html\" target=\"new\">Zero Trust Adoption Report 2021, Microsoft<\/a><br \/>\n<sup>2<\/sup> <a href=\"https:\/\/securityintelligence.com\/articles\/cybersecurity-trends-ibm-predictions-2023\/\" target=\"new\">Cybersecurity Trends: IBM\u2019s Predictions for 2023, SecurityIntelligence<\/a><br \/>\n<sup>3<\/sup> <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-10-13-gartner-identifies-three-factors-influencing-growth-i\" target=\"new\">Gartner Identifies Three Factors Influencing Growth in Security Spending, Oct. 13, 2022<\/a><br \/>\n<\/small>\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust Forescout delivers Zero Trust Assurance based on total visibility, least privilege network access and compliance\u00a0enforcement. Forescout can help you adopt a NIST SP 800-207-based ZTA within your existing multi-vendor environment \u2013 from identifying, monitoring and controlling connected assets to orchestrating enforcement and remediation across connected infrastructure and clouds. Schedule a demo \u00a0 Mastering [&hellip;]<\/p>\n","protected":false},"author":147,"featured_media":80914,"parent":80153,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[666],"class_list":["post-79367","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust Security for the Edgeless Perimeter - Forescout<\/title>\n<meta name=\"description\" content=\"Achieve Zero Trust Assurance with Forescout&#039;s comprehensive visibility platform. Verify all devices, control network access, and enforce compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/solutions\/zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Security for the Edgeless Perimeter - Forescout\" \/>\n<meta property=\"og:description\" content=\"Achieve Zero Trust Assurance with Forescout&#039;s comprehensive visibility platform. Verify all devices, control network access, and enforce compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/solutions\/zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T14:57:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/zero-trust\/\",\"url\":\"https:\/\/www.forescout.com\/solutions\/zero-trust\/\",\"name\":\"Zero Trust Security for the Edgeless Perimeter - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"datePublished\":\"2023-07-06T15:42:36+00:00\",\"dateModified\":\"2025-07-23T14:57:32+00:00\",\"description\":\"Achieve Zero Trust Assurance with Forescout's comprehensive visibility platform. Verify all devices, control network access, and enforce compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/solutions\/zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/zero-trust\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Forescout Demo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/www.forescout.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust Security for the Edgeless Perimeter - Forescout","description":"Achieve Zero Trust Assurance with Forescout's comprehensive visibility platform. Verify all devices, control network access, and enforce compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/solutions\/zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Security for the Edgeless Perimeter - Forescout","og_description":"Achieve Zero Trust Assurance with Forescout's comprehensive visibility platform. Verify all devices, control network access, and enforce compliance.","og_url":"https:\/\/www.forescout.com\/solutions\/zero-trust\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-07-23T14:57:32+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/solutions\/zero-trust\/","url":"https:\/\/www.forescout.com\/solutions\/zero-trust\/","name":"Zero Trust Security for the Edgeless Perimeter - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/solutions\/zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/solutions\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","datePublished":"2023-07-06T15:42:36+00:00","dateModified":"2025-07-23T14:57:32+00:00","description":"Achieve Zero Trust Assurance with Forescout's comprehensive visibility platform. Verify all devices, control network access, and enforce compliance.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/solutions\/zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/solutions\/zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/solutions\/zero-trust\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","width":1200,"height":628,"caption":"Forescout Demo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/solutions\/zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.forescout.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=79367"}],"version-history":[{"count":1,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79367\/revisions"}],"predecessor-version":[{"id":107448,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79367\/revisions\/107448"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80914"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=79367"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=79367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}