{"id":35,"date":"2019-01-19T08:08:22","date_gmt":"2019-01-19T08:08:22","guid":{"rendered":"https:\/\/ztacloud.com\/?page_id=35"},"modified":"2024-08-19T18:07:31","modified_gmt":"2024-08-19T18:07:31","slug":"home-v2","status":"publish","type":"page","link":"https:\/\/ztacloud.com\/","title":{"rendered":"Home"},"content":{"rendered":"<div id=\"cs-content\" class=\"cs-content\"><div class=\"x-section e35-e1 mz-0 mz-1\"><div class=\"x-row x-container max width e35-e2 mz-4 mz-5 mz-6 mz-7 mz-d mz-e\"><div class=\"x-row-inner\"><div class=\"x-col e35-e3 mz-k mz-l mz-m\"><div class=\"x-text x-text-headline e35-e4 mz-o mz-p mz-q\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h2 class=\"x-text-content-text-primary\">We are ZTA Cloud<br>\n  Modernize your business with <br>\n  <\/br>Zero Trust Architecture<\/h2><\/div><\/div><\/div><div class=\"x-text x-content e35-e5 mz-u\"><span>At\u00a0<\/span><strong>ZTA Cloud<\/strong><span>, we understand that in today\u2019s digital landscape, security is paramount. That\u2019s why we\u2019ve adopted a Zero Trust Architecture (ZTA) approach to our IT consulting services. Unlike traditional security models which assume everything inside an organization\u2019s network can be trusted, our ZTA approach operates on the principle of \u201cnever trust, always verify.\u201d This means we verify every request as though it originates from an open network, regardless of where it comes from or what it accesses. This approach, combined with our commitment to modern security practices, provides robust protection against both external and internal threats. By minimizing the attack surface and reducing the chances of lateral movement of threats, we ensure your business operations are secure and resilient. With ZTA Cloud, you gain peace of mind knowing your IT infrastructure is protected by the most advanced and effective security practices available today.<\/span><\/div><a class=\"x-anchor x-anchor-button e35-e6 mz-v mz-w\" tabindex=\"0\" href=\"\/\/demo.theme.co\/agency-v2\/about\/\"><div class=\"x-anchor-content\"><div class=\"x-anchor-text\"><span class=\"x-anchor-text-primary\">More About Us<\/span><\/div><\/div><\/a><\/div><\/div><\/div><\/div><div class=\"x-section e35-e7 mz-0 mz-1 mz-2\"><div class=\"x-bg\" aria-hidden=\"true\"><div class=\"x-bg-layer-lower-image\" data-x-element-bg-layer=\"{&quot;parallaxSize&quot;:&quot;290%&quot;,&quot;parallaxDir&quot;:&quot;v&quot;,&quot;parallaxRev&quot;:false}\" style=\" background-image: url(https:\/\/ztacloud.com\/wp-content\/uploads\/2024\/08\/bg-services-01.jpg); background-repeat: no-repeat; background-position: center left; background-size: cover;\"><\/div><\/div><div class=\"x-row x-container max width e35-e8 mz-4 mz-5 mz-7 mz-8 mz-9 mz-a mz-d mz-f\"><div class=\"x-row-inner\"><div class=\"x-col e35-e9 mz-l mz-m\"><div class=\"x-text x-text-headline e35-e10 mz-o mz-p mz-r mz-s\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h2 class=\"x-text-content-text-primary\">Our services.<\/h2><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"x-row x-container max width e35-e11 mz-4 mz-8 mz-b mz-c mz-g mz-h\"><div class=\"x-row-inner\"><div class=\"x-col e35-e12 mz-l mz-n\"><div class=\"x-text x-text-headline has-graphic e35-e13 mz-p mz-s mz-t\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-s=\"&#xe35c;\"><\/i><\/span><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\">Design<\/h4><p class=\"x-text-content-text-subheadline\">Ensuring robust protection and resilience for your business in the ever-evolving digital landscape<\/p><\/div><\/div><\/div><\/div><div class=\"x-col e35-e14 mz-l mz-n\"><div class=\"x-text x-text-headline has-graphic e35-e15 mz-p mz-s mz-t\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-s=\"&#xf201;\"><\/i><\/span><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\">Strategy<\/h4><p class=\"x-text-content-text-subheadline\">Plans with an advanced level of protection to prepare for the worst<\/p><\/div><\/div><\/div><\/div><div class=\"x-col e35-e16 mz-l mz-n\"><div class=\"x-text x-text-headline has-graphic e35-e17 mz-p mz-s mz-t\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-s=\"&#xf109;\"><\/i><\/span><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\">Endpoints<\/h4><p class=\"x-text-content-text-subheadline\">Protect your endpoints, safeguarding your business from potential threats and enhancing the security of your digital assets<\/p><\/div><\/div><\/div><\/div><div class=\"x-col e35-e18 mz-l mz-n\"><div class=\"x-text x-text-headline has-graphic e35-e19 mz-p mz-s mz-t\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-s=\"&#xf086;\"><\/i><\/span><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\">Collaboration<\/h4><p class=\"x-text-content-text-subheadline\">Secure collaboration tools ensure your team can communicate and collaborate effectively without compromising on security<\/p><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"x-row x-container max width e35-e20 mz-4 mz-5 mz-7 mz-8 mz-9 mz-a mz-d mz-i\"><div class=\"x-row-inner\"><div class=\"x-col e35-e21 mz-l mz-m\"><a class=\"x-anchor x-anchor-button e35-e22 mz-v mz-x\" tabindex=\"0\" href=\"\/\/demo.theme.co\/agency-v2\/get-in-touch\/\"><div class=\"x-anchor-content\"><div class=\"x-anchor-text\"><span class=\"x-anchor-text-primary\">Get In Touch<\/span><\/div><\/div><\/a><\/div><\/div><\/div><\/div><div class=\"x-section e35-e23 mz-0 mz-3\"><div class=\"x-bg\" aria-hidden=\"true\"><div class=\"x-bg-layer-lower-image\" style=\" background-image: url(https:\/\/ztacloud.com\/wp-content\/uploads\/2024\/08\/bg-pattern.png); background-repeat: repeat; background-position: center; background-size: auto;\"><\/div><\/div><div class=\"x-row e35-e24 mz-4 mz-5 mz-8 mz-a mz-c mz-g mz-j\"><div class=\"x-row-inner\"><div class=\"x-col e35-e25 mz-l mz-m\"><hr class=\"x-line x-hide-lg x-hide-md x-hide-xl e35-e26 mz-y\"><\/hr><\/div><div class=\"x-col e35-e27 mz-l mz-m\"><hr class=\"x-line x-hide-lg x-hide-md x-hide-xl e35-e28 mz-y\"><\/hr><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>We are ZTA Cloud Modernize your business with Zero Trust ArchitectureAt\u00a0ZTA Cloud, we understand that in today\u2019s digital landscape, security is paramount. That\u2019s why we\u2019ve adopted a Zero Trust Architecture (ZTA) approach to our IT consulting services. Unlike traditional security models which assume everything inside an organization\u2019s network can be trusted, our ZTA approach operates on the principle of \u201cnever &#8230; <\/p>\n<div><a href=\"https:\/\/ztacloud.com\/\" class=\"more-link\">Read More<\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-blank-4.php","meta":{"footnotes":""},"class_list":["post-35","page","type-page","status-publish","hentry","no-post-thumbnail"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ztacloud.com\/index.php?rest_route=\/wp\/v2\/pages\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ztacloud.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ztacloud.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ztacloud.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ztacloud.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35"}],"version-history":[{"count":3,"href":"https:\/\/ztacloud.com\/index.php?rest_route=\/wp\/v2\/pages\/35\/revisions"}],"predecessor-version":[{"id":73,"href":"https:\/\/ztacloud.com\/index.php?rest_route=\/wp\/v2\/pages\/35\/revisions\/73"}],"wp:attachment":[{"href":"https:\/\/ztacloud.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}