\u003c/strong>\u003c/h1>"},"type":"text","actions":["eUdXZ0cPTV3"],"cl":"text pSRg7zWZby"},{"key":"eGCuVD572Gu","content":{"link":{"mode":1,"widget":{"image":{"type":2,"value":{"bucket":"cdn.vev.design","path":"private/dk3UctceTPWKJtA1g8n4EFqTvuo2/sMCfp44b_view_array-24px.svg.svg","name":"view_array-24px.svg","url":"https://cdn.vev.design/private/dk3UctceTPWKJtA1g8n4EFqTvuo2/sMCfp44b_view_array-24px.svg.svg"}},"name":"BIOGRAPHY","page":"petL4jPp6G9","pageName":"Aken Feature","key":"eO3GW0nX6uH"}}},"type":"external-link","cl":"external-link"},{"key":"ev6ovlZGiP4","content":{"cont":{"tablet":{"params":{"trigger":"Load","updated":1649871325052,"LoadAnimation":{"duration":0.9,"delay":0.4,"once":true,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}},"desktop":{"params":{"trigger":"Load","updated":1649871325052,"LoadAnimation":{"duration":0.9,"delay":0.4,"once":true,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}},"mobile":{"params":{"trigger":"Load","updated":1649871325052,"LoadAnimation":{"duration":0.9,"delay":0.4,"once":true,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"etgjhU232h8","content":{"text":"\u003cp >\u003cstrong >Cybersecurity feature — By Scott Aken \u003c/strong>\u003c/p>"},"type":"text","actions":["eGCuVD572Gu","ev6ovlZGiP4"],"cl":"text"},{"key":"ed2fYG9eyuT","content":{"cont":{"tablet":{"params":{"trigger":"Load","updated":1649871332107,"LoadAnimation":{"duration":0.9,"delay":0.8,"once":false,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}},"desktop":{"params":{"trigger":"Load","updated":1649871332107,"LoadAnimation":{"duration":0.9,"delay":0.8,"once":false,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}},"mobile":{"params":{"trigger":"Load","updated":1649871332107,"LoadAnimation":{"duration":0.9,"delay":0.8,"once":false,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"eXB9K2rnbuG","content":{"text":"\u003ch2 >A comprehensive and aggressive approach to zero trust \u003c/h2>"},"type":"text","actions":["ed2fYG9eyuT"],"cl":"text pSRg7zWZby"},{"key":"eiA_TDXHXcO","type":"section","children":["ed2RDofiO-U","etgjhU232h8","eXB9K2rnbuG"],"cl":"section"},{"key":"eXnSgEAIpRj","content":{"cont":{"tablet":{"params":{"trigger":"Load","updated":1608306541094,"LoadAnimation":{"duration":0.7,"delay":0,"loop":true,"scale":1.2,"preset":"pulsate","easing":"easeInOutQuad"}}},"desktop":{"params":{"trigger":"Load","updated":1608306514543,"LoadAnimation":{"duration":0.7,"delay":0,"loop":true,"scale":1.3,"preset":"pulsate","easing":"easeInOutQuad"}}},"mobile":{"params":{"trigger":"Load","updated":1608306514543,"LoadAnimation":{"duration":0.7,"delay":0,"loop":true,"scale":1.3,"preset":"pulsate","easing":"easeInOutQuad"}}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"evR8MNjMAcZ","content":{"shapeId":"SkO2wsEXG"},"type":"shape","actions":["eXnSgEAIpRj"],"cl":"shape"},{"key":"emE7mqsWQ0_","content":{"speed":60},"type":"w1c3kqru4r-1p7v","children":["evR8MNjMAcZ"],"cl":"w1c3kqru4r-1p7v"},{"key":"e48CIiQ2pOs","content":{"text":"\u003cp >The U.S. Department of Defense (DoD) recently released its “zero trust” strategy. This article will summarize the approach the DoD is taking, which serves as a potential guide for other industries as well. \u003c/p>\u003cp >For years, various vendors have offered zero trust solutions. However, this “never trust, always verify” approach is just a concept that fundamentally requires a shift for everything from the IT infrastructure capabilities and the technologies used to processes and how communication services are delivered. This requires a more far-reaching change across the organization than ever before. Therefore, the DoD created an entire department, the Zero Trust Portfolio Management Office (ZT PfMO) to organize and accelerate this multiyear effort. \u003c/p>\u003cp >In order to protect its missions and warfighters from sophisticated attacks and adversaries, the DoD realized zero trust is not just about technology. It also requires a completely new approach to culture and processes to address a daunting list of challenges outlined below. \u003c/p>\u003cul >\u003cli >Complex security threats persist and increase from nation states, cybercriminals, and even malicious insiders. \u003c/li>\u003cli >The traditional perimeter defense, also known as “castle defense”, combined with conventional authentication and authorization models, are insufficient to thwart today’s cyberattacks. \u003c/li>\u003cli >Security models must take into account that today’s operational models do not only need to cover the diverse DoD multi-domain operations (cyber, space, air, ground, and sea), but require a diverse global set of national allied forces, industry partners, and outside service providers. \u003c/li>\u003cli >Infrastructure is not controlled and operated by the DoD directly but includes physical devices and cloud services operated by partners. Furthermore, locking down infrastructure or overly restricting access to data gets in the way of collaboration and swift action. \u003c/li>\u003cli >In order to quickly access the full situation, data can no longer be siloed in incompatible formats, and not fully validated and secured. Instead, it needs to be unified, validated, and secured to allow for timely decisions and swift actions. \u003c/li>\u003cli >All this data needs to be securely accessed from anywhere, from any end-user or device, from warfighters in forwarding operating bases to contractors working at commercial enterprises. \u003c/li>\u003c/ul>\u003cp >\u003cbr />Legacy infrastructure may not fit into this new concept but is still essential. For legacy infrastructures, additional security measures need to be put in place.\u003c/p>\u003ch3 >\u003cstrong >Everybody needs to be on the same page\u003c/strong>\u003c/h3>\u003cp >The DoD recognizes that, in order to address these challenges, alignment of multiple vectors needs to come together, requiring investments and initiatives across not just infrastructure but also leadership, organizations, personnel, and facilities — all the way to policies and education. The goal is to create a scalable, resilient environment that’s also auditable and defendable in as little as five years. The strategy assigns the necessary resources and leadership for immediate execution while recognizing the framework and the approach will have to mature and adapt over time. \u003c/p>\u003cp >To address these cybersecurity challenges, the U.S. Federal Government and DoD have released a number of strategies, architecture frameworks, and guidelines that are the most comprehensive effort in bringing zero trust from a concept to reality. The most notable ones are the DoD Zero Trust Reference Architecture Version 2.0 (July 2022) and the DoD zero trust Strategy (Oct 2022). \u003c/p>\u003cp >The DoD developed the following strategic principles to guide the implementation and ensure the zero trust approach meets its needs. \u003c/p>\u003cp >Be mission oriented — Allow for data access based on least privilege from any location using dynamic credentials. \u003c/p>\u003cp >Organizational — Presume breach and limit the “blast radius” to mitigate potential damage and reduce the possible attack surface by segmenting the network and data access while constantly monitoring any actions. \u003c/p>\u003cp >Governance and Control — Simplify and automate to quickly adjust policies and authorize an ever-evolving mission environment. Never trust, always verify every user, device, application, or data, requiring ongoing authentication and authorization. \u003c/p>\u003cp >Technically — Allow lowest privilege users to only access what is needed for the task while constantly analyzing behavior and monitoring every event in near-real time for every user and device. \u003c/p>\u003ch3 >\u003cstrong >DoD’s zero trust pillars\u003c/strong>\u003c/h3>\u003cp >In Zero trust Reference Architecture Version 2, DISA and NSA identified seven essential pillars (Figure 1) that must be addressed for a successful implementation of zero trust, incorporating users, devices, applications and workloads, data, network and environment, automation and orchestration, and visibility and analytics. \u003c/p>"},"type":"text","cl":"text pSRg7zWZby"},{"key":"eSjed_35F0h","type":"section","children":["e48CIiQ2pOs"],"cl":"section"},{"key":"ejiPIehquHD","content":{"cont":{"tablet":{"params":{"trigger":"Load","updated":1606851883385,"LoadAnimation":{"duration":1,"delay":0.3,"once":true,"translateY":["5%","0"],"preset":"slide","opacity":[0,1],"easing":"easeOutQuart"}}},"desktop":{"params":{"trigger":"Load","updated":1606851883385,"LoadAnimation":{"duration":1,"delay":0.3,"once":true,"translateY":["5%","0"],"preset":"slide","opacity":[0,1],"easing":"easeOutQuart"}}},"mobile":{"params":{"trigger":"Load","updated":1606851883385,"LoadAnimation":{"duration":1,"delay":0.3,"once":true,"translateY":["5%","0"],"preset":"slide","opacity":[0,1],"easing":"easeOutQuart"}}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"ePaNk1-UUdM","content":{"src":{"key":"qO2cKm9gch","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/qO2cKm9gch.png","ratio":2.2422096317280453}},"type":"image","actions":["ejiPIehquHD"],"cl":"image"},{"key":"eluQSPnTucl","content":{"cont":{"tablet":{"params":{"trigger":"Load","updated":1612211271508,"LoadAnimation":{"duration":1,"delay":0.7,"once":true,"translateX":["-30px","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}},"desktop":{"params":{"trigger":"Load","updated":1612211271508,"LoadAnimation":{"duration":1,"delay":0.7,"once":true,"translateX":["-30px","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}},"mobile":{"params":{"trigger":"Load","updated":1612211271508,"LoadAnimation":{"duration":1,"delay":0.7,"once":true,"translateX":["-30px","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"eK1O4AzSxr2","content":{"text":"\u003cp >\u003cstrong >Figure 1 — The DoD’s zero trust pillars.\u003cbr />\u003c/strong>Source: U.S. Department of Defense, Nov. 7, 2022\u003c/p>"},"type":"text","actions":["eluQSPnTucl"],"cl":"text pSRg7zWZby"},{"key":"eJbo5hhGUxa","content":{"cont":{"tablet":{"params":{"trigger":"Load","updated":1637599297817,"LoadAnimation":{"duration":0.6,"delay":0.6,"translateX":["-300","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}},"desktop":{"params":{"trigger":"Load","updated":1637599297817,"LoadAnimation":{"duration":0.6,"delay":0.6,"translateX":["-300","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}},"mobile":{"params":{"trigger":"Load","updated":1637599297817,"LoadAnimation":{"duration":0.6,"delay":0.6,"translateX":["-300","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"eCIG-JssyQx","type":"rectangle","actions":["eJbo5hhGUxa"],"cl":"rectangle"},{"key":"eYjvJGW1Jdy","type":"section","children":["ePaNk1-UUdM","eK1O4AzSxr2","eCIG-JssyQx"],"cl":"section"},{"key":"exoT-NWbYXN","content":{"text":"\u003cp >“Users,” as well as “non-person entities” (i.e., devices, such as HVAC sensors), are required to be authenticated repeatedly. Access is only granted on a per-session basis based on the user, access method and device status, and resources accessed. Access is only provided to the resources required and continues monitoring all user activities. \u003c/p>\u003cp >“Devices” incorporates any device that can be accessed by an end user, network, server, or storage system. Real-time inspection via automated asset and patch management ensures security measures are up-to-date. Endpoint protection requires security and device management, such as endpoint and mobile device management (UEM and MDM), as well as endpoint and extended detection and response applications (EDR and XDR). \u003c/p>\u003cp >Applications and workloads secure applications and the processing environment they operate in, be it physical or virtual. This includes the protection of hypervisors, containers, and virtual machines — local or cloud-based. These requirements extend beyond the operation to secure development and integration approaches and to ensure the safety of the entire delivery chain. \u003c/p>\u003cp >Data is the information any application or user consumes. End-to-end encryption is mandatory for any data transferred across the network in addition to data stored on any device. All data needs to be tagged, indicating content and classification to allow for data access control, monitoring, rights management, and data loss prevention. \u003c/p>\u003cp >Network and environment allows for the segmentation, control, and isolation of all the connectivity between devices, whether it’s managed by the enterprise directly or via service providers at a granular level. Software-defined networking (SDN) provides the underpinning for dynamic and programmatic network configuration to ensure micro-segmentation can be easily achieved. Unlike today’s macro-segmentation via technologies, like virtual privat networks (VPNs), micro-segmentation allows users to logically divide network, compute, and storage resources down to the individual workload level with their own security controls. \u003c/p>\u003cp >Automation and orchestration recognizes the complexity of the above infrastructure approach requires automation for timely access to resources and a fast security response. It ties together the policies in domain controllers with the device and network infrastructure. It automates previously manual security processes, ensuring patch levels are remediated as needed, encryption is applied, and suspicious or nonconforming activities are blocked based on AI/ML derived behavior analysis. This requires close interaction of already deployed IT management infrastructures, such as SIEMs, SOARs, element managers, and domain controllers, via standard APIs. \u003c/p>\u003cp >Visibility and analytics is essential for the IT team to monitor and assess this complex environment and to adjust as needed. It allows network managers to analyze events, activities, and behaviors and apply AI/ML to achieve better visibility and shorten reaction times. This requires capabilities, such as logging all traffic, analyzing user and entity behavior, collecting, and analyzing events and alarms, and incorporating threat intelligence provided by outside sources.\u003c/p>\u003ch3 >\u003cstrong >An aggressive roll-out schedule \u003c/strong>\u003c/h3>\u003cp >The DoD recognizes these pillars require a coordinated approach to ensure the security and protection of infrastructure while managing existing risks. Therefore, the DoD developed a road map for capabilities that are essential to be implemented by 2027, with more advanced capabilities for a more comprehensive approach by 2032. This is a very aggressive plan but reflects the urgency in light of the increasing damage threat actors are doing to critical infrastructure. \u003c/p>\u003cp >In addition to the technology capabilities, the DoD defined the required ecosystem to ensure its success. Starting with cultural adoption across the organization, the need to coordinate and accelerate technology deployments, and driving essential processes and policies. The objectives for adoption call for a solid architecture definition in 2023, which includes outreach to both DoD internal and external federal and industry partners. By the end of fiscal year 2023, the plan is to have specific component policies and frameworks as well as contracts in place. By 2024, interoperability needs to be defined to ensure compatibility and integration between existing and new systems. Implementation for the targeted capabilities is scheduled to be done by end of fiscal year 2027. This is a very aggressive plan. \u003c/p>\u003cp >The DoD recognizes that implementing zero trust is a continuous and adaptive process that goes well beyond technology and needs to address people, processes, resources, governance, and risk management. Overall, this is an ambitious plan that matches the urgency and importance of the situation. It provides an opportunity for industry vendors to accelerate their zero trust product development through tangible contracts and for the rest of the industry to learn and apply the lessons of this massive project. \u003c/p>"},"type":"text","cl":"text pSRg7zWZby"},{"key":"emm4SimUyx1","type":"section","children":["exoT-NWbYXN"],"cl":"section"},{"key":"eJ2zO1Wtwfg","content":{"text":"\u003ch3 >Scott Aken\u003c/h3>\u003cp >Scott Aken is CEO of Axellio. He has more than 20 years of experience in cybersecurity and mobile technologies. Aken built his cyber expertise as a special agent with the FBI, where he conducted numerous cyber counterintelligence computer intrusion investigations and was a member of the elite Cyber Action Team. \u003c/p>"},"type":"text","cl":"text pSRg7zWZby"},{"key":"e3nOsy8E_kL","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/Zdbzn1WJBH.jpg","key":"Zdbzn1WJBH","ratio":0.9817395482940894}},"type":"image","cl":"image"},{"key":"eGZIcACMJMC","content":{"cont":{"tablet":{"params":{"trigger":"Load","updated":1657206618963,"LoadAnimation":{"duration":0.6,"delay":0.7,"once":true,"translateX":["-30px","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}},"desktop":{"params":{"trigger":"Load","updated":1657206618963,"LoadAnimation":{"duration":0.6,"delay":0.7,"once":true,"translateX":["-30px","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}},"mobile":{"params":{"trigger":"Load","updated":1657206618963,"LoadAnimation":{"duration":0.6,"delay":0.7,"once":true,"translateX":["-30px","0"],"preset":"slideInLeft","opacity":[0,1],"easing":"easeOutQuart"}}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"ePTofD-fXwJ","content":{"text":"\u003cp >\u003cem >Image by \u003c/em>\u003ca href=\"https://pixabay.com/users/12019-12019/?utm_source=link-attribution&utm_medium=referral&utm_campaign=image&utm_content=80394\" target=\"_blank\">\u003cem >David Mark\u003c/em>\u003c/a>\u003cem > from \u003c/em>\u003ca href=\"https://pixabay.com//?utm_source=link-attribution&utm_medium=referral&utm_campaign=image&utm_content=80394\" target=\"_blank\">\u003cem >Pixabay\u003c/em>\u003c/a>\u003cem > \u003c/em>\u003c/p>"},"type":"text","actions":["eGZIcACMJMC"],"cl":"text p-_Js1xJSc"},{"key":"eO3GW0nX6uH","type":"section","children":["eJ2zO1Wtwfg","e3nOsy8E_kL","ePTofD-fXwJ"],"cl":"section"},{"key":"emCHHdPe05c","content":{"link":{"mode":0,"page":"pP22QkByqA4"}},"type":"external-link","cl":"external-link"},{"key":"ejQZ51MSvKp","content":{"text":"\u003cdiv>\u003cp >Table Of Contents\u003c/p>\u003c/div>"},"type":"text","actions":["emCHHdPe05c"],"cl":"text"},{"key":"ewO9fMx6j2M","content":{"text":"\u003cp >April 2023\u003c/p>"},"type":"text","cl":"text"},{"key":"e4DU1ty_wXb","content":{"link":{"mode":0,"page":"pFqfcaivZjx"}},"type":"external-link","cl":"external-link"},{"key":"eCXDYylKsA7","content":{"src":{"key":"zwI7tX41J","url":"https://cdn.vev.design/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/images/zwI7tX41J/2100.png","ratio":null}},"type":"image","actions":["e4DU1ty_wXb"],"cl":"image"},{"key":"ez7tZf2WwuC","type":"section","children":["ejQZ51MSvKp","ewO9fMx6j2M","eCXDYylKsA7"],"cl":"section"},{"key":"petL4jPp6G9","content":{"link":{"mode":1,"widget":{"image":{"type":2,"value":{"bucket":"cdn.vev.design","path":"private/dk3UctceTPWKJtA1g8n4EFqTvuo2/sMCfp44b_view_array-24px.svg.svg","name":"view_array-24px.svg","url":"https://cdn.vev.design/private/dk3UctceTPWKJtA1g8n4EFqTvuo2/sMCfp44b_view_array-24px.svg.svg"}},"name":"BIOGRAPHY","page":"petL4jPp6G9","pageName":"EXAMPLE Feature 2","key":"eH66jILD11t"}}},"children":["ebW5iS5Mhgi","eiA_TDXHXcO","emE7mqsWQ0_","eSjed_35F0h","eYjvJGW1Jdy","emm4SimUyx1","eO3GW0nX6uH","ez7tZf2WwuC"]},{"key":"eWAIFI62VK6","content":{"pageMenu":"hEcyRF6cOU"},"type":"w1br1l0lsu-u06","icons":{"menu":[448,512,"M442 114H6a6 6 0 0 1-6-6V84a6 6 0 0 1 6-6h436a6 6 0 0 1 6 6v24a6 6 0 0 1-6 6zm0 160H6a6 6 0 0 1-6-6v-24a6 6 0 0 1 6-6h436a6 6 0 0 1 6 6v24a6 6 0 0 1-6 6zm0 160H6a6 6 0 0 1-6-6v-24a6 6 0 0 1 6-6h436a6 6 0 0 1 6 6v24a6 6 0 0 1-6 6z"]},"cl":"w1br1l0lsu-u06"},{"key":"ej7sku6fBJP","content":{"time":0.5},"type":"wdu2rjhi","cl":"wdu2rjhi"},{"key":"ePuxCL8s7X4","content":{"time":1,"cont":{"tablet":{"params":{"HoverAnimation":{"duration":0.5,"delay":0,"background":{"a":0.17,"r":224,"b":245,"g":239},"preset":"bgColor","event":"bot","easing":"easeOutQuart"},"trigger":"Load","updated":1605886820624,"LoadAnimation":{"duration":0.9,"delay":3,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}},"desktop":{"params":{"HoverAnimation":{"duration":0.5,"delay":0,"background":{"a":0.17,"r":224,"b":245,"g":239},"preset":"bgColor","event":"bot","easing":"easeOutQuart"},"trigger":"Load","updated":1605886820624,"LoadAnimation":{"duration":0.9,"delay":3,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}},"mobile":{"params":{"HoverAnimation":{"duration":0.5,"delay":0,"background":{"a":0.93,"r":255,"b":255,"g":255},"preset":"bgColor","event":"bot","easing":"easeOutQuart"},"trigger":"Hover","updated":1609428092330,"LoadAnimation":{"duration":0.9,"delay":3,"preset":"fadeIn","opacity":[0,1],"easing":"easeOutQuad"}}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"eAJ3SVYqTHf","content":{"shapeId":"sp4g88JfB"},"type":"shape","actions":["ej7sku6fBJP","ePuxCL8s7X4"],"cl":"shape"},{"key":"eS9JoZQzuT4","content":{"menu":"hEcyRF6cOU"},"type":"w7Ty9ifjBD","icons":{"left":[192,512,"M192 127.338v257.324c0 17.818-21.543 26.741-34.142 14.142L29.196 270.142c-7.81-7.81-7.81-20.474 0-28.284l128.662-128.662c12.599-12.6 34.142-3.676 34.142 14.142z"],"right":[192,512,"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"]},"cl":"w7Ty9ifjBD"},{"key":"e6wD2FVkRhx","content":{"debug":false,"path":"","adType":"interstitial-1"},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"eWAIFI62VK6":true,"eS9JoZQzuT4":{"pgpHzC617a9":true,"pAt6NAxGqTZ":true,"p3bTMxxd4cm":true,"petL4jPp6G9":true,"pJo7VewZBL7":true,"pNXJ1oww5U1":true,"p0ntlX8fCdZ":true,"pbJXbRzDzn6":true,"pPCoYI-M7C1":true,"pFqfcaivZjx":true,"pkW6A0Y3lhP":true,"p5OVkv7kuh7":true,"pn6yivemBRx":true,"pPLhF_avKgb":true,"pP22QkByqA4":true,"pfGUt2C8q97":true,"p88d8R8xORJ":true,"ptbwceC_b2O":true,"pbgFHzQndv5":true,"p_1GujW-gFz":true,"p9QHX0P91-J":true,"pxrfHbeWIHf":true,"piqUi9mEitu":true,"pQJTLDEXEt6":true},"e6wD2FVkRhx":{"pgpHzC617a9":true,"petL4jPp6G9":true,"p3bTMxxd4cm":true,"pJo7VewZBL7":true,"pn6yivemBRx":true,"pPLhF_avKgb":true,"pP22QkByqA4":true,"ptbwceC_b2O":true,"pbJXbRzDzn6":true,"pkW6A0Y3lhP":true,"pxrfHbeWIHf":true,"piqUi9mEitu":true}},"children":["eWAIFI62VK6","eAJ3SVYqTHf","eS9JoZQzuT4","e6wD2FVkRhx"]}],"pages":[{"key":"p0L46RsCBm4","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/H1fRofjkp-.jpg","path":"emagazine-navigation-guide"},{"key":"p0ntlX8fCdZ","title":"ad-INNIO","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/ExKtVOmefT.jpg","path":"ad-innio"},{"key":"p3bTMxxd4cm","title":"Writing on the Edge","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/FsfXmNmbVi.jpg","path":"writing-on-the-edge"},{"key":"p5OVkv7kuh7","title":"Masthead","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/kkFktRXO2V.jpg","path":"masthead"},{"key":"p88d8R8xORJ","title":"ad-house-learn and earn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/LvP9FsCOdC.jpg","path":"ad-house-learn-and-earn"},{"key":"pAt6NAxGqTZ","title":"ad-Buyers Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/FF-sVxucCo.jpg","path":"ad-buyers-guide"},{"key":"pFqfcaivZjx","title":"Cover","cover":"undefined/image/social/undefined/pFqfcaivZjx/v/0.jpg","path":"","index":true},{"key":"pJo7VewZBL7","title":"Ad Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/lqcZIaM6OM.jpg","path":"ad-index"},{"key":"pP22QkByqA4","title":"Table of Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/tU5aKn1xk4.jpg","path":"table-of-contents"},{"key":"pPLhF_avKgb","title":"Site Solutions","desc":"Datacenter United sees the value of Tier Certification as undeniable and intends to work with Uptime on future projects as it continues to strengthen its position as a leading provider of high-quality, reliable proximity data center services .","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/FikenPmEui.jpg","path":"site-solutions"},{"key":"pbJXbRzDzn6","title":"Quiz","desc":"The separation between virtual and physical worlds that once existed is now gone. From cyberattacks to criminal investigations, see how digital forensics and the dark web are affected by the digital transformation.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/sD5r6eI3-P.jpg","path":"quiz---author"},{"key":"pbgFHzQndv5","title":"ad-INTERPOWER","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/ooQN_zS81Q.jpg","path":"ad-interpower"},{"key":"petL4jPp6G9","title":"Aken Feature","desc":"The DoD recognizes that implementing zero trust is a continuous and adaptive process that goes well beyond technology and needs to address people, processes, resources, governance, and risk management.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/up4BZpUYXL.jpg","path":"aken-feature"},{"key":"pgpHzC617a9","title":"Guest - Thorogood","desc":"The future is pharma and farma, not either/or.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/7dFaVbMY1K.jpg","path":"guest-column---author"},{"key":"pioorn5gshi","title":"ad-Buyers-Guide-AVTECH Software Inc.","cover":"undefined/image/social/undefined/pioorn5gshi/v/0.jpg","path":"ad-buyers-guide-avtech-software-inc"},{"key":"piqUi9mEitu","title":"Unconventional Wisdom","desc":"The digital divide is often considered to be a matter of connectivity, but education is an equally important variable in the digital access equation that doesn’t get as much attention in the mission critical community. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/qqI-grKxPZ.jpg","path":"unconventional-wisdom"},{"key":"pkW6A0Y3lhP","title":"Schiller Cover Story","desc":"Writing clean code from the start allows developers to simultaneously resolve current code issues by adhering to established quality standards. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/stRb2WQsi9.jpg","path":"schiller-feature"},{"key":"pn6yivemBRx","title":"Editor's Pick","desc":"Duck Pro by Shurtape BR Code Scannable Solutions are powered by the BitRip app. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/Eix3oW2jDt.jpg","path":"editors-pick"},{"key":"ptbwceC_b2O","title":"Davidson Feature","desc":"\nAs we move forward, manufacturing and adjacent industries should consider leveraging new technologies and solutions that can help propel their digital transformation. \n","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/ny_R4kzK9B.jpg","path":"davidson-feature"},{"key":"pxrfHbeWIHf","title":"Spears Feature","desc":"In anticipation of potential severe weather risks, data center operators should assess the effectiveness of their current power management strategies and consider new advances to enhance their approach. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/RHEk3Ovq8g.jpg","path":"spears-feature"}],"shapes":{"SkO2wsEXG":[320,512,"M151.5 427.8L3.5 281c-4.7-4.7-4.7-12.3 0-17l19.8-19.8c4.7-4.7 12.3-4.7 17 0L160 362.7l119.7-118.5c4.7-4.7 12.3-4.7 17 0l19.8 19.8c4.7 4.7 4.7 12.3 0 17l-148 146.8c-4.7 4.7-12.3 4.7-17 0zm17-160l148-146.8c4.7-4.7 4.7-12.3 0-17l-19.8-19.8c-4.7-4.7-12.3-4.7-17 0L160 202.7 40.3 84.2c-4.7-4.7-12.3-4.7-17 0L3.5 104c-4.7 4.7-4.7 12.3 0 17l148 146.8c4.7 4.7 12.3 4.7 17 0z"],"sp4g88JfB":[256,512,"M136.5 249.1l116 117.8c4.7 4.7 4.7 12.3 0 17l-7.1 7.1c-4.7 4.7-12.3 4.7-17 0L128 288.7 27.6 390.9c-4.7 4.7-12.3 4.7-17 0l-7.1-7.1c-4.7-4.7-4.7-12.3 0-17l116-117.8c4.7-4.6 12.3-4.6 17 .1zm-17-128L3.5 238.9c-4.7 4.7-4.7 12.3 0 17l7.1 7.1c4.7 4.7 12.3 4.7 17 0L128 160.7l100.4 102.2c4.7 4.7 12.3 4.7 17 0l7.1-7.1c4.7-4.7 4.7-12.3 0-17L136.5 121c-4.7-4.6-12.3-4.6-17 .1z"]},"images":{"Zdbzn1WJBH":{"meta":{"width":2043,"height":2081,"description":"Dress shirt, Forehead, Chin, Smile, Eyebrow, Tie, Collar, Suit"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/Zdbzn1WJBH.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/Zdbzn1WJBH.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/Zdbzn1WJBH.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/Zdbzn1WJBH.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/Zdbzn1WJBH.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/Zdbzn1WJBH.jpg",2081]]},"qO2cKm9gch":{"meta":{"width":1583,"height":706,"description":"Product, Sleeve, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/qO2cKm9gch.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/qO2cKm9gch.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/qO2cKm9gch.png",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/qO2cKm9gch.png",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/qO2cKm9gch.png",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/qO2cKm9gch.png",1583]]},"up4BZpUYXL":{"meta":{"width":1920,"height":1251,"description":"Urban design, Residential area, Building, Sky, Car, Infrastructure, Tower, Neighbourhood, Cityscape, Landscape"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/up4BZpUYXL.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/up4BZpUYXL.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/up4BZpUYXL.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/up4BZpUYXL.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/up4BZpUYXL.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/up4BZpUYXL.jpg",1920]]},"wall-gallery-studio-exhibition-751342":{"meta":{"description":"Brown, Wood, Amber"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/wall-gallery-studio-exhibition-751342","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/wall-gallery-studio-exhibition-751342",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/wall-gallery-studio-exhibition-751342",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/wall-gallery-studio-exhibition-751342",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/image/wall-gallery-studio-exhibition-751342",1280]]},"zwI7tX41J":{"meta":{"description":"Black-and-white, Font, Line, Text"},"src":"https://cdn.vev.design/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/images/zwI7tX41J/2100.png","srcset":[["https://cdn.vev.design/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/images/zwI7tX41J/2100.png",500],["https://cdn.vev.design/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/images/zwI7tX41J/2100.png",1080],["https://cdn.vev.design/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/images/zwI7tX41J/2100.png",1600],["https://cdn.vev.design/private/KaxzywoIf0Rx41JdO6oEbX8EsUI3/images/zwI7tX41J/2100.png",2100]]}},"pkg":{"w75y8u1c":"basic","text":"basic","section":"basic","w7Ty9ifjBD":"pEIMfUpQ6oy","external-link":"basic","shape":"basic","rectangle":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","image":"basic","w1c3kqru4r-1p7v":"p9y4TTngH8m","wl9gVIiyFe":"p7bqre2y","w1br1l0lsu-u06":"pgxSSDpDPRe","wdu2rjhi":"pWZZK88Bj0M"},"menus":{"1unGQkfvxz":{"title":"Menu","children":[{"children":[{"link":{"mode":0,"page":"p_1GujW-gFz"},"title":"Cover Story","key":"7Mp2HNVR8P"},{"link":{"mode":1,"widget":{"image":{"type":2,"value":{"bucket":"cdn.vev.design","path":"private/dk3UctceTPWKJtA1g8n4EFqTvuo2/sMCfp44b_view_array-24px.svg.svg","name":"view_array-24px.svg","url":"https://cdn.vev.design/private/dk3UctceTPWKJtA1g8n4EFqTvuo2/sMCfp44b_view_array-24px.svg.svg"}},"name":"features","page":"pP22QkByqA4","pageName":"Table of Contents","key":"eOjzV1FJWQ8"}},"title":"Features","key":"tsr0tD20AE"},{"link":{"mode":1,"widget":{"image":{"type":2,"value":{"bucket":"cdn.vev.design","path":"private/dk3UctceTPWKJtA1g8n4EFqTvuo2/sMCfp44b_view_array-24px.svg.svg","name":"view_array-24px.svg","url":"https://cdn.vev.design/private/dk3UctceTPWKJtA1g8n4EFqTvuo2/sMCfp44b_view_array-24px.svg.svg"}},"name":"Departments","page":"pP22QkByqA4","pageName":"Table of Contents","key":"eoxLfKvhSVn"}},"title":"Departments","key":"3TMhTO0BR_"},{"link":{"mode":0,"page":"p5OVkv7kuh7"},"title":"Masthead","key":"sIMVpc6AM-"},{"link":{"mode":2,"href":"https://www.dropbox.com/s/4zowzz5oln206g5/MC-April-2023.pdf?dl=1","target":true},"title":"Download","key":"AgiWH-vdx8"}],"link":{"mode":0,"page":"pP22QkByqA4"},"title":"Table of Contents","key":"GeKgxKWlS1"},{"children":[{"link":{"mode":0,"page":"p0L46RsCBm4"},"title":"Navigation","key":"sjKT9srbf2"},{"link":{"mode":2,"href":"https://www.missioncriticalmagazine.com/emagazine","target":true},"title":"Archived Issues","key":"0qRZG0CgHv"},{"link":{"mode":2,"href":"https://www.missioncriticalmagazine.com/","target":true},"title":"missioncriticalmagazine.com","key":"7aoMc7eYrD"}],"link":{"mode":0,"page":"p0L46RsCBm4"},"title":"Help","key":"JOv1uHmsW3"}],"key":"1unGQkfvxz"},"hEcyRF6cOU":{"title":"pdf","children":[{"link":{"mode":0,"page":"pFqfcaivZjx"},"title":"Cover","key":"gafB3Lc5GX"},{"link":{"mode":0,"page":"p0ntlX8fCdZ"},"title":"ad-INNIO","key":"tqmtbtvQO3"},{"link":{"mode":0,"page":"pP22QkByqA4"},"title":"Table of Contents","key":"zGBN1FmGJB"},{"link":{"mode":0,"page":"pbgFHzQndv5"},"title":"ad-INTERPOWER","key":"4lr_olrDHd"},{"link":{"mode":0,"page":"pJo7VewZBL7"},"title":"Ad Index","key":"xsQ9SMl8ox"},{"link":{"mode":0,"page":"p3bTMxxd4cm"},"title":"Writing on the Edge","key":"sG71JEDYGs"},{"link":{"mode":0,"page":"pkW6A0Y3lhP"},"title":"Schiller Feature","key":"Al4jhGFeCP"},{"link":{"mode":0,"page":"pxrfHbeWIHf"},"title":"Spears Feature","key":"rkcL69O0r_"},{"link":{"mode":0,"page":"piqUi9mEitu"},"title":"Unconventional Wisdom","key":"NgtysFjSNV"},{"link":{"mode":0,"page":"petL4jPp6G9"},"title":"Aken Feature","key":"rdu8IHMhSu"},{"link":{"mode":0,"page":"pgpHzC617a9"},"title":"Guest - Thorogood","key":"qypuW-Nxw6"},{"link":{"mode":0,"page":"ptbwceC_b2O"},"title":"Davidson Feature","key":"sv2k02EHDV"},{"link":{"mode":0,"page":"p88d8R8xORJ"},"title":"ad-house-learn and earn","key":"9LfKyLbp4w"},{"link":{"mode":0,"page":"pbJXbRzDzn6"},"title":"Quiz","key":"9KILGsRl0E"},{"link":{"mode":0,"page":"pn6yivemBRx"},"title":"Editor's Pick","key":"JkXVf6zYkf"},{"link":{"mode":0,"page":"pPLhF_avKgb"},"title":"Site Solutions","key":"2zLXnrGVMa"},{"link":{"mode":0,"page":"pAt6NAxGqTZ"},"title":"ad-Buyers Guide","key":"J2_J4Ccoj-"},{"link":{"mode":0,"page":"p5OVkv7kuh7"},"title":"Masthead","key":"eS5p2iwbkG"}],"key":"hEcyRF6cOU"}},"primaryMenu":"hEcyRF6cOU","settings":{"devices":[{"mode":"desktop","minMax":true,"columnWidth":[1024,1024],"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}