{"id":105643,"date":"2025-03-07T10:03:18","date_gmt":"2025-03-07T02:03:18","guid":{"rendered":"https:\/\/version-2.com.sg\/?p=105311"},"modified":"2025-03-07T10:03:18","modified_gmt":"2025-03-07T02:03:18","slug":"building-a-true-zero-trust-architecture-with-thinfinity-workspace","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/03\/building-a-true-zero-trust-architecture-with-thinfinity-workspace\/","title":{"rendered":"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"105643\" class=\"elementor elementor-105643\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-widget-container\"><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-03-1.png\" alt=\"building-zero-trust-architecture-thinfinity-workspace\" width=\"512\" height=\"302\" \/><\/p><p>\u00a0<\/p><div class=\"elementor-element elementor-element-e4986a7 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"e4986a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h2>Introduction<\/h2><h3>Why is Zero Trust the Future of Enterprise Security<\/h3><p>As cyber threats evolve, traditional security models like VPNs and firewalls\u00a0<b>fail to protect<\/b>\u00a0<b>distributed workforces and hybrid IT environments. Zero Trust Architecture (ZTA)<\/b>\u00a0is the new security paradigm, ensuring that\u00a0<b>no user or device is trusted by default<\/b>, requiring continuous verification.<\/p><p>However,\u00a0<b>many organizations struggle with Zero Trust implementation,\u00a0<\/b>mistakenly assuming it\u2019s just a\u00a0<b>product purchase<\/b>\u00a0rather than a\u00a0<b>strategic security transformation.<\/b><\/p><p>Thinfinity Workspace provides a\u00a0<b>comprehensive Zero Trust Network Access (ZTNA)<\/b>\u00a0<b>solution<\/b>, enabling\u00a0<b>secure remote access<\/b>,\u00a0<b>granular policy enforcement, and seamless identity management<\/b>\u2014without the complexity of legacy VPNs.\u00a0<\/p><\/div><\/div><\/div><div class=\"elementor-element elementor-element-d733e0c flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"d733e0c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h4>In this guide, you\u2019ll learn:<\/h4><p><b>\u2713<\/b>\u00a0The\u00a0<b>biggest challenges<\/b>\u00a0in\u00a0<b>Zero Trust adoption<\/b>\u00a0(and how to fix them)<\/p><p><b>\u2713<\/b>\u00a0How\u00a0<b>Thinfinity Workspace enforces Zero Trust principles<\/b><\/p><p><b>\u2713<\/b>\u00a0The\u00a0<b>cost benefits of ZTNA vs. legacy VPN solutions<\/b><\/p><p><b>\u2713<\/b>\u00a0A step-by-step\u00a0<b>Zero Trust implementation roadmap<\/b><\/p><div>\u00a0<\/div><\/div><\/div><\/div><div class=\"elementor-element elementor-element-2d379b7 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"2d379b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h2>Key Challenges in Zero Trust Implementation (and How to Solve Them with ZTNA)<\/h2><\/div><\/div><\/div><div class=\"elementor-element elementor-element-3c7c96e elementor-widget__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-image\" data-id=\"3c7c96e\" data-element_type=\"widget\" data-widget_type=\"image.default\"><div class=\"elementor-widget-container\"><img decoding=\"async\" class=\"attachment-large size-large wp-image-9003241321014550\" src=\"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-04-2-nueva.jpg\" sizes=\"(max-width: 1200px) 100vw, 1200px\" srcset=\"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-04-2-nueva.jpg 1200w, https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-04-2-nueva-768x438.jpg 768w, https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-04-2-nueva-600x342.jpg 600w\" alt=\"Zero Trust challenges: lack of strategy, legacy complexity, and misconceptions. Thinfinity ZTNA ensures security &amp; seamless access.\" width=\"1200\" height=\"684\" \/><\/div><\/div><div class=\"elementor-element elementor-element-f2f7e5f flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"f2f7e5f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h3>1. Lack of a Defined Zero Trust Strategy<\/h3><ul><li><b>Problem:<\/b>\u00a0Organizations deploy security products without aligning them to business needs.<\/li><\/ul><p><b>\u2713<\/b>\u00a0<b>ZTNA Solution:\u00a0<\/b>Thinfinity Workspace enables a\u00a0<b>policy-driven security framework,<\/b>\u00a0integrating\u00a0<b>Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Role-Based Access Control (RBAC)\u00a0<\/b>to enforce identity-first security.<\/p><h3>2. Complexity in Retrofitting Zero Trust into Legacy Environments<\/h3><ul><li><b>Problem:<\/b>\u00a0Many enterprises struggle with applying Zero Trust in\u00a0<b>existing hybrid or multi-cloud environments.<\/b><\/li><\/ul><p><b>\u2713<\/b>\u00a0<b>ZTNA Solution:\u00a0<\/b>Thinfinity\u2019s\u00a0<b>clientless access<\/b>\u00a0and\u00a0<b>agentless security model<\/b>\u00a0ensure\u00a0<b>seamless integration across Windows, Linux, and cloud-hosted applications<\/b>\u2014reducing complexity.<\/p><h3>3. Misconception That Zero Trust is a One-Time Purchase<\/h3><ul><li><b>Problem<\/b>: Many believe Zero Trust is a product, not a strategy.<\/li><\/ul><p><b>\u2713<\/b>\u00a0<b>ZTNA Solution:<\/b>\u00a0Thinfinity Workspace supports\u00a0<b>continuous adaptive authentication,<\/b>\u00a0<b>real-time session monitoring,\u00a0<\/b>and\u00a0<b>dynamic risk-based access,<\/b>\u00a0reinforcing that\u00a0<b>Zero Trust is an ongoing security process.<\/b><\/p><\/div><\/div><\/div><div class=\"elementor-element elementor-element-4b624d6 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"4b624d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h2>How Thinfinity Workspace Enforces Zero Trust Security<br \/><br \/>Identity-First Security: Continuous User &amp; Device Verification<\/h2><ul><li><b>Granular RBAC Policies:<\/b>\u00a0Users access only the\u00a0<b>apps &amp; data they need.<\/b><\/li><li><b>Adaptive Authentication:\u00a0<\/b>Enforces\u00a0<b>MFA, biometric authentication, and conditional access<\/b>\u00a0based on location, device, and behavior.<\/li><li><b>User Analytics &amp; Logging: Real-time monitoring\u00a0<\/b>ensures<b>\u00a0proactive threat detection.<\/b><\/li><\/ul><\/div><\/div><\/div><div class=\"elementor-element elementor-element-bb6f9eb flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"bb6f9eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h3>Application-Centric Security: Eliminating Overprivileged Access<\/h3><ul><li><b>Microsegmentation<\/b>: Limits user access to\u00a0<b>specific apps, preventing lateral movement.<\/b><\/li><li><b>Catalog-Based Access Control:<\/b>\u00a0Ensures users can only interact with\u00a0<b>approved applications.<\/b><\/li><li><b>End-to-End Encryption (AES-256):<\/b>\u00a0Ensures secure communication.<\/li><\/ul><\/div><\/div><\/div><div class=\"elementor-element elementor-element-a1f22a5 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"a1f22a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h3>Policy-Driven Enforcement: Adaptive Security for Hybrid Workforces<\/h3><ul><li><b>Network Segmentation:<\/b>\u00a0Users never gain\u00a0<b>broad network access<\/b>, unlike VPNs.<\/li><li><b>Zero Trust Session Management:<\/b>\u00a0Prevents\u00a0<b>session hijacking &amp; credential theft.<\/b><\/li><li><b>Cloud-Native Deployment:\u00a0<\/b>Works across\u00a0<b>Oracle Cloud, Ionos Cloud, AWS, Azure, Google Cloud, and on-prem.<\/b><\/li><\/ul><\/div><\/div><\/div><div class=\"elementor-element elementor-element-2774f3b flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"2774f3b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h2>Zero Trust vs. VPN: Why Thinfinity Workspace is the Superior Choice<\/h2><\/div><\/div><\/div><div class=\"elementor-element elementor-element-78512c9 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"78512c9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><table class=\"custom-table\"><thead><tr><th>Feature<\/th><th>Thinfinity<\/th><th>Traditional VPN<\/th><th>Legacy RDP<\/th><\/tr><\/thead><tbody><tr><td><strong>Granular App Access<\/strong><\/td><td>Yes<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td><strong>MFA &amp; Identity Control<\/strong><\/td><td>Yes<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td><strong>Microsegmentation<\/strong><\/td><td>Yes<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td><strong>Zero Trust Policy Engine<\/strong><\/td><td>Yes<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td><strong>Cloud &amp; Hybrid Support<\/strong><\/td><td>Yes<\/td><td>No<\/td><td>No<\/td><\/tr><tr><td><strong>End-to-End Encryption<\/strong><\/td><td>Yes<\/td><td>Yes<\/td><td>No<\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div><div class=\"elementor-element elementor-element-e80ae3c flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"e80ae3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><p><strong>Key Takeaway:<\/strong>\u00a0VPNs expose the entire network to a single compromised device, while\u00a0<strong>Thinfinity ZTNA grants access ONLY to verified apps &amp; users.<\/strong><\/p><div>\u00a0<\/div><\/div><\/div><\/div><div class=\"elementor-element elementor-element-6044087 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"6044087\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h2>Cost Analysis: Zero Trust Network Access (ZTNA) vs. VPN<\/h2><\/div><\/div><\/div><div class=\"elementor-element elementor-element-0b2caa6 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"0b2caa6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><table class=\"custom-table\"><thead><tr><th>Cost Factor<\/th><th>ZTNA (Thinfinity)<\/th><th>Legacy VPN<\/th><\/tr><\/thead><tbody><tr><td><strong>Infrastructure Costs<\/strong><\/td><td>Lower (Cloud-Native)<\/td><td>High (Hardware Dependent)<\/td><\/tr><tr><td><strong>IT Maintenance<\/strong><\/td><td>Minimal<\/td><td>High (Manual Configurations)<\/td><\/tr><tr><td><strong>Security Risk Exposure<\/strong><\/td><td>Low (Granular Access)<\/td><td>High (Broad Network Access)<\/td><\/tr><tr><td><strong>Compliance &amp; Auditing<\/strong><\/td><td>Built-In Controls<\/td><td>Limited<\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div><div class=\"elementor-element elementor-element-f0378fb flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"f0378fb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><p><strong>Why This Matters:<\/strong>\u00a0Thinfinity\u2019s ZTNA reduces\u00a0<strong>infrastructure costs<\/strong>, eliminates\u00a0<strong>VPN maintenance overhead,<\/strong>\u00a0and improves\u00a0<strong>security compliance.<\/strong><\/p><div>\u00a0<\/div><\/div><\/div><\/div><div class=\"elementor-element elementor-element-63ba7f8 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"63ba7f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><h2>Implementation Roadmap: Deploying Thinfinity ZTNA in Your Organization<\/h2><h3>Step 1: Define Your Zero Trust Security Policies<\/h3><p><b>\u2713<\/b>\u00a0Identify\u00a0<b>high-risk applications &amp; users<\/b><br \/><b>\u2713<\/b>\u00a0Establish\u00a0<b>granular access policies<\/b><br \/><b>\u2713<\/b>\u00a0Implement\u00a0<b>adaptive authentication<\/b><\/p><h3>Step 2: Deploy Thinfinity Workspace<\/h3><p><b>\u2713<\/b>\u00a0Set up\u00a0<b>identity-based authentication (MFA, SSO, RBAC)<\/b><br \/><b>\u2713<\/b>\u00a0Configure\u00a0<b>application microsegmentatio<\/b>n<br \/><b>\u2713<\/b>\u00a0Enable\u00a0<b>session recording &amp; auditing<\/b><\/p><h3>Step 3: Continuous Monitoring &amp; Optimization<\/h3><p><b>\u2713<\/b>\u00a0Use\u00a0<b>real-time analytics for threat detection<\/b><br \/><b>\u2713<\/b>\u00a0Adjust\u00a0<b>Zero Trust policies dynamically<\/b><br \/><b>\u2713<\/b>\u00a0Automate\u00a0<b>security updates &amp; compliance reports<\/b><\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241e357 elementor-widget elementor-widget-shortcode\" data-id=\"241e357\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"91826\" class=\"elementor elementor-91826\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4dcebe91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"4dcebe91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;58112d0&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-126baa3\" data-id=\"126baa3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2bcedeed elementor-widget elementor-widget-text-editor\" data-id=\"2bcedeed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Cybele Software Inc.<br \/><\/strong>We help organizations extend the life and value of their software. Whether they are looking to improve and empower remote work or turn their business-critical legacy apps into modern SaaS, our software enables customers to focus on what\u2019s most important: expanding and evolving their business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00a0 Introduction Why is Zero Trust the Future of Enterpri [&hellip;]<\/p>","protected":false},"author":149011791,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1297,1305,61],"tags":[1301,1077],"class_list":["post-105643","post","type-post","status-publish","format-standard","hentry","category-cybele","category-1305","category-press-release","tag-cybele","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Introduction Why is Zero Trust the Future of Enterpri [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-07T02:03:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-03-1.png\" \/>\n<meta name=\"author\" content=\"ericav2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ericav2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/building-a-true-zero-trust-architecture-with-thinfinity-workspace\\\/\"},\"author\":{\"name\":\"ericav2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/47b5538f057952e0f25c791e955659e7\"},\"headline\":\"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace\",\"datePublished\":\"2025-03-07T02:03:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/building-a-true-zero-trust-architecture-with-thinfinity-workspace\\\/\"},\"wordCount\":626,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cybelesoft.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/blog-03-1.png\",\"keywords\":[\"Cybele\",\"2025\"],\"articleSection\":[\"Cybele\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/building-a-true-zero-trust-architecture-with-thinfinity-workspace\\\/\",\"url\":\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/\",\"name\":\"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cybelesoft.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/blog-03-1.png\",\"datePublished\":\"2025-03-07T02:03:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.cybelesoft.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/blog-03-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.cybelesoft.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/blog-03-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.cybelesoft.com\\\/building-zero-trust-architecture-thinfinity-workspace\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/47b5538f057952e0f25c791e955659e7\",\"name\":\"ericav2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/270ad369d68b5b4c46455393234c703648ceb9dd2bb6ad776e37d75bd0c5eb0c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/270ad369d68b5b4c46455393234c703648ceb9dd2bb6ad776e37d75bd0c5eb0c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/270ad369d68b5b4c46455393234c703648ceb9dd2bb6ad776e37d75bd0c5eb0c?s=96&d=identicon&r=g\",\"caption\":\"ericav2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/v2erica\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/","og_locale":"en_US","og_type":"article","og_title":"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace - Version 2","og_description":"\u00a0 Introduction Why is Zero Trust the Future of Enterpri [&hellip;]","og_url":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/","og_site_name":"Version 2","article_published_time":"2025-03-07T02:03:18+00:00","og_image":[{"url":"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-03-1.png","type":"","width":"","height":""}],"author":"ericav2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ericav2","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/03\/building-a-true-zero-trust-architecture-with-thinfinity-workspace\/"},"author":{"name":"ericav2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/47b5538f057952e0f25c791e955659e7"},"headline":"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace","datePublished":"2025-03-07T02:03:18+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/03\/building-a-true-zero-trust-architecture-with-thinfinity-workspace\/"},"wordCount":626,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-03-1.png","keywords":["Cybele","2025"],"articleSection":["Cybele","2025","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/03\/building-a-true-zero-trust-architecture-with-thinfinity-workspace\/","url":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/","name":"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/#primaryimage"},"image":{"@id":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-03-1.png","datePublished":"2025-03-07T02:03:18+00:00","breadcrumb":{"@id":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/#primaryimage","url":"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-03-1.png","contentUrl":"https:\/\/blog.cybelesoft.com\/wp-content\/uploads\/2025\/02\/blog-03-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cybelesoft.com\/building-zero-trust-architecture-thinfinity-workspace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Building a True Zero Trust Architecture with Thinfinity\u00ae Workspace"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/47b5538f057952e0f25c791e955659e7","name":"ericav2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/270ad369d68b5b4c46455393234c703648ceb9dd2bb6ad776e37d75bd0c5eb0c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/270ad369d68b5b4c46455393234c703648ceb9dd2bb6ad776e37d75bd0c5eb0c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/270ad369d68b5b4c46455393234c703648ceb9dd2bb6ad776e37d75bd0c5eb0c?s=96&d=identicon&r=g","caption":"ericav2"},"url":"https:\/\/version-2.com\/en\/author\/v2erica\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-rtV","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/105643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011791"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=105643"}],"version-history":[{"count":0,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/105643\/revisions"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=105643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=105643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=105643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}