{"id":23241,"date":"2021-11-02T11:58:05","date_gmt":"2021-11-02T15:58:05","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=23241"},"modified":"2025-04-17T14:43:57","modified_gmt":"2025-04-17T18:43:57","slug":"implementing-zero-trust-framework-secure-collaboration","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/","title":{"rendered":"Implementing a Zero Trust framework: Secure collaboration"},"content":{"rendered":"<p>Not surprisingly, many work landscapes have dramatically shifted to <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/remote-work-questions-answered\/\">fully remote or hybrid working<\/a>. We know how stressful and confusing it can be collaborating with numerous internal and external business stakeholders while ensuring your important business data are securely\u00a0protected.\u00a0Since <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/trending-remote-work-and-ucaas\/\">collaboration<\/a> is at the heart\u00a0of <a href=\"https:\/\/www.sherweb.com\/productivity\/\">productivity<\/a> in\u00a0the\u00a0modern\u00a0economy,\u00a0security controls must not hinder communications or make <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/digital-transformation-powered-by-itsm\/\">digital processes<\/a> less efficient.\u00a0Historically this has been a\u00a0challenge, but\u00a0recent\u00a0advances\u00a0in cloud technologies are\u00a0changing the\u00a0game.<\/p>\n<p>The digital world has enabled the breaking down of economic and financial barriers internationally, which has exponentially increased the rate of outsourcing. Companies are increasingly looking to outsource various resources to cut costs and increase their cultural diversity. While this might be commercially viable, it also increases potential cyber risk, particularly when work teams are collaborating across geographical borders. Sharing documents, working on projects and sending emails are among the many day-to-day tasks different teams complete. Doing this in a productive, streamlined, secure way is vital for <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/business-continuity\/\">business continuity<\/a>. Many organizations are looking to optimize this by implementing a diverse tool set.<\/p>\n<div style=\"text-align: center;\">\n<p><iframe loading=\"lazy\" title=\"Cybersecurity _ What is zero trust and how does it work?\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/a0FXu7_Jpbo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p style=\"text-align: center;\"><em>Watch this quick explainer from Roddy Bergeron, Sherweb&#8217;s Cybersecurity Technical Fellow, on what Zero Trust really means and why it matters for securing collaboration without compromising usability.<\/em><\/p>\n<h2>How to facilitate secure collaboration without sacrificing productivity<\/h2>\n<p><a href=\"https:\/\/www.aegisinnovators.com\/\">Aegis Innovators<\/a> can relieve your stress and assist in securing your organization\u2019s collaborative workspace through a host of <a href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\">Microsoft 365\u00a0cloud\u00a0services<\/a>. Using Microsoft solutions, including advanced\u00a0tools, enables you to respond intelligently and plan for collaboration governance.<\/p>\n<p>Microsoft provides a suite of productivity services that work together to provide collaboration experiences with data governance, security and compliance capabilities. The diagram below is a great depiction of the interrelatedness between internal and external teams and the different tasks they respectively handle.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-23242\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Secure-Collaboration-Microsoft-communication-methods.png\" alt=\"Secure collaboration with Microsoft\" width=\"902\" height=\"456\" srcset=\"\/blog\/wp-content\/uploads\/Secure-Collaboration-Microsoft-communication-methods.png 902w, \/blog\/wp-content\/uploads\/Secure-Collaboration-Microsoft-communication-methods-300x152.png 300w, \/blog\/wp-content\/uploads\/Secure-Collaboration-Microsoft-communication-methods-768x388.png 768w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><\/p>\n<p>Microsoft 365 supports three main communication methods:<\/p>\n<ol>\n<li><strong>Outlook\u00a0(<a href=\"https:\/\/www.sherweb.com\/hosted-exchange\/\">Exchange Online<\/a>): <\/strong>collaboration through email with a shared group inbox and\u00a0calendar<\/li>\n<li><strong><a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/microsoft-teams\/\">Microsoft Teams<\/a>: <\/strong>a persistent-chat-based workspace where you can have informal, real-time, conversations around a variety of topics, organized by specific sub-groups<\/li>\n<li><strong><a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/yammer-vs-slack-enterprise-collaboration-software\/\">Yammer<\/a>: <\/strong>enterprise social experience for collaboration.<\/li>\n<\/ol>\n<p>It\u2019s important to plan for cyberattacks to ensure organizational data is protected. Collaboration governance is how you manage users&#8217; access to resources, compliance with your business standards and the security of your data. Services such as Microsoft 365 groups, Teams and Yammer empower users and reduce the risk of <a href=\"https:\/\/www.sherweb.com\/blog\/security\/dangers-of-shadow-it\/\">shadow IT<\/a> by providing the tools needed to collaborate. Microsoft 365 has a rich set of tools to implement any governance capabilities your organization might require.<\/p>\n<h2>Secure collaboration governance in Microsoft 365<\/h2>\n<p>To increase the ability to uniformly manage user access, ensure security and service compliance needs, <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/7-things-to-know-about-microsoft-365\/\">implementing Microsoft 365 tools<\/a> is a necessity. Working with the <a href=\"https:\/\/www.sherweb.com\/partners\/\">right partner<\/a> can make a huge difference! Aegis Innovators can help you understand all you need to know about productive, secure collaboration, including how to implement a Zero Trust framework. You can also explore <a href=\"https:\/\/www.sherweb.com\/security\/\">Sherweb\u2019s marketplace of cybersecurity products and solutions<\/a> for additional ways to expand your cloud offering and streamline your operations.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-23243\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Secure-collaboration-governance-in-Microsoft-365.png\" alt=\"Secure collaboration governance in Microsoft 365\" width=\"902\" height=\"550\" srcset=\"\/blog\/wp-content\/uploads\/Secure-collaboration-governance-in-Microsoft-365.png 902w, \/blog\/wp-content\/uploads\/Secure-collaboration-governance-in-Microsoft-365-300x183.png 300w, \/blog\/wp-content\/uploads\/Secure-collaboration-governance-in-Microsoft-365-768x468.png 768w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><\/p>\n<h3><strong>Keeping reading about Zero Trust:<\/strong><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/\">Identity and access management<\/a><\/li>\n<li><a href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-intelligent-endpoint-protection\/\">Intelligent endpoint protection<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Not surprisingly, many work landscapes have dramatically shifted to fully remote or hybrid workin","protected":false},"author":181,"featured_media":23245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[393,399,887,919],"class_list":["post-23241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-collaboration","tag-productivity","tag-zero-trust","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Implementing a Zero Trust framework: Secure collaboration | Sherweb<\/title>\n<meta name=\"description\" content=\"Working together in a productive, streamlined, secure way is vital for business continuity. But secure collaboration is easier said than done.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing a Zero Trust framework: Secure collaboration | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Working together in a productive, streamlined, secure way is vital for business continuity. But secure collaboration is easier said than done.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-02T15:58:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-17T18:43:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aegis Innovators\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aegis Innovators\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/\"},\"author\":{\"name\":\"Aegis Innovators\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/43cc530df9eadbdff975cdd572299b0c\"},\"headline\":\"Implementing a Zero Trust framework: Secure collaboration\",\"datePublished\":\"2021-11-02T15:58:05+00:00\",\"dateModified\":\"2025-04-17T18:43:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/\"},\"wordCount\":532,\"commentCount\":5,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg\",\"keywords\":[\"Collaboration\",\"Productivity\",\"Zero Trust\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/\",\"name\":\"Implementing a Zero Trust framework: Secure collaboration | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg\",\"datePublished\":\"2021-11-02T15:58:05+00:00\",\"dateModified\":\"2025-04-17T18:43:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/43cc530df9eadbdff975cdd572299b0c\"},\"description\":\"Working together in a productive, streamlined, secure way is vital for business continuity. But secure collaboration is easier said than done.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg\",\"width\":1200,\"height\":460,\"caption\":\"Secure Collaboration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/implementing-zero-trust-framework-secure-collaboration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Implementing a Zero Trust framework: Secure collaboration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/43cc530df9eadbdff975cdd572299b0c\",\"name\":\"Aegis Innovators\",\"description\":\"AEGIS INNOVATORS is a Microsoft partner located in Southern California that helps business leaders throughout the United States solve IT issues and make critical technology decisions. Our Zero Trust approach to cybersecurity and expertise with the Microsoft 365 framework for secure cloud collaboration and Azure platform has empowered our team to deliver extraordinary business results for our clients.\",\"sameAs\":[\"https:\\\/\\\/www.aegisinnovators.com\\\/\"],\"url\":\"https:\\\/\\\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\\\/blog\\\/author\\\/aegis-innovators\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implementing a Zero Trust framework: Secure collaboration | Sherweb","description":"Working together in a productive, streamlined, secure way is vital for business continuity. But secure collaboration is easier said than done.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/","og_locale":"en_US","og_type":"article","og_title":"Implementing a Zero Trust framework: Secure collaboration | Sherweb","og_description":"Working together in a productive, streamlined, secure way is vital for business continuity. But secure collaboration is easier said than done.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2021-11-02T15:58:05+00:00","article_modified_time":"2025-04-17T18:43:57+00:00","og_image":[{"width":1200,"height":460,"url":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg","type":"image\/jpeg"}],"author":"Aegis Innovators","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Aegis Innovators","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/"},"author":{"name":"Aegis Innovators","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/43cc530df9eadbdff975cdd572299b0c"},"headline":"Implementing a Zero Trust framework: Secure collaboration","datePublished":"2021-11-02T15:58:05+00:00","dateModified":"2025-04-17T18:43:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/"},"wordCount":532,"commentCount":5,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg","keywords":["Collaboration","Productivity","Zero Trust","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/","url":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/","name":"Implementing a Zero Trust framework: Secure collaboration | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg","datePublished":"2021-11-02T15:58:05+00:00","dateModified":"2025-04-17T18:43:57+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/43cc530df9eadbdff975cdd572299b0c"},"description":"Working together in a productive, streamlined, secure way is vital for business continuity. But secure collaboration is easier said than done.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Blog-Aegis-Guest-Blog-\u2013-Secure-Collaboration-1200x480-1.jpg","width":1200,"height":460,"caption":"Secure Collaboration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/implementing-zero-trust-framework-secure-collaboration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Implementing a Zero Trust framework: Secure collaboration"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/43cc530df9eadbdff975cdd572299b0c","name":"Aegis Innovators","description":"AEGIS INNOVATORS is a Microsoft partner located in Southern California that helps business leaders throughout the United States solve IT issues and make critical technology decisions. Our Zero Trust approach to cybersecurity and expertise with the Microsoft 365 framework for secure cloud collaboration and Azure platform has empowered our team to deliver extraordinary business results for our clients.","sameAs":["https:\/\/www.aegisinnovators.com\/"],"url":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/author\/aegis-innovators\/"}]}},"tag_names":["Collaboration","Productivity","Zero Trust","Cybersecurity"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/23241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/181"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=23241"}],"version-history":[{"count":7,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/23241\/revisions"}],"predecessor-version":[{"id":25431,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/23241\/revisions\/25431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/23245"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=23241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=23241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=23241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}