{"id":653777,"date":"2024-05-06T11:18:15","date_gmt":"2024-05-06T11:18:15","guid":{"rendered":"https:\/\/www.capgemini.com\/gb-en\/?post_type=research-and-insight&#038;p=653777"},"modified":"2026-01-22T07:53:09","modified_gmt":"2026-01-22T07:53:09","slug":"accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/","title":{"rendered":"Accelerate your journey to zero trust with zero trust orchestration"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:50% 37%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybersecurity<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Accelerate your journey to zero trust with zero trust orchestration<\/h1><\/div><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/05\/Zero-Trust-Orchestration-PoV-2024.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><span>Download PoV <\/span><span class=\"type\">2 MB  pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1011740\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1011740\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\" id=\"h-how-to-orchestrate-secure-friction-free-user-journeys-within-a-zero-trust-framework\">How to orchestrate secure, friction-free user journeys within a Zero Trust framework<\/h3>\n\n\n\n<p>Cloud computing and interconnectivity have changed IT security forever. In the old days, when all your servers lived in your own data centre and everyone connected directly within your corporate network, or via VPN, you could rely on your corporate firewall as a fixed perimeter security control. Today, your employees, partners, and customers\u2014as well as connected devices from the Internet of Things\u2014could be logging in from any location, via any network, to services hosted anywhere.<\/p>\n\n\n\n<p>Keeping your business safe in these complex hybrid, multi-cloud, hyper-connected, and highly collaborative landscapes is far more challenging. Organisations are increasingly recognising that the only way to stay secure in this world while providing a frictionless user experience is through a Zero Trust security approach, which replaces reliance on legacy network security controls with an approach where every access request is assessed on a rich contextual basis. Thus, Zero Trust Architecture becomes the new network perimeter.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-what-you-ll-discover\">What you&#8217;ll discover<\/h4>\n\n\n\n<p>This joint point of view by Capgemini and Ping Identity explores best practices for orchestrating these interoperating elements as part of a comprehensive Zero Trust framework, addressing the following key questions:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What are the market challenges that are driving organisations to implement Zero Trust?&nbsp;<\/li>\n\n\n\n<li>What is a Zero Trust Orchestration layer, and why is it required?&nbsp;&nbsp;<\/li>\n\n\n\n<li>Where does an Orchestration layer deliver the greatest benefits?&nbsp;<\/li>\n\n\n\n<li>How are Capgemini and Ping Identity helping organisations adopt Zero Trust Orchestration?&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/05\/Zero-Trust-Orchestration-PoV-2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download your complimentary copy&nbsp;<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Capgemini and Ping Identity can assist your organisation in adopting Zero Trust Orchestration, ensuring a seamless user experience for your customers and employees without sacrificing security. We can help initiate or expedite your Zero Trust journey, leveraging our comprehensive knowledge of Zero Trust, including Zero Trust Orchestration.&nbsp;<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-even layout-even-all-purple-cards \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Research and insights<\/h2><\/div><div class=\"layout-two-card cards-normal\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/why-its-time-for-a-zero-trust-conversation\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/08\/Zero-trust-conversation.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/why-its-time-for-a-zero-trust-conversation\/\" aria-label=\"Why it\u2019s time for a zero-trust conversation\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">Why it\u2019s time for a zero-trust conversation<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                            <a href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/\" aria-label=\"Why it\u2019s time for AI in Identity and access management\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">Why it\u2019s time for AI in Identity and access management<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                    <\/div><\/div><\/section>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":257,"featured_media":1000001019670,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"1419e1ce-7c37-436e-9ed0-fb87e35dd9e2\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":48,"primary_term":"Cybersecurity","featured_focal_points":""},"tags":[],"research-and-insight-type":[85],"theme":[48],"brand":[],"service":[47],"industry":[],"partners":[],"content-group":[],"class_list":["post-653777","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","research-and-insight-type-point-of-view","theme-cybersecurity","service-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Accelerate your journey to zero trust with zero trust orchestration - Capgemini UK<\/title>\n<meta name=\"description\" content=\"Cloud computing and interconnectivity have changed IT security forever. In the old days, when all your servers lived in your own data centre and everyone connected directly within your corporate network, or via VPN, you could rely on your corporate firewall as a fixed perimeter security control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Accelerate your journey to zero trust with zero trust orchestration\" \/>\n<meta property=\"og:description\" content=\"Cloud computing and interconnectivity have changed IT security forever. In the old days, when all your servers lived in your own data centre and everyone connected directly within your corporate network, or via VPN, you could rely on your corporate firewall as a fixed perimeter security control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini UK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T07:53:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/\",\"name\":\"Accelerate your journey to zero trust with zero trust orchestration - Capgemini UK\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg\",\"datePublished\":\"2024-05-06T11:18:15+00:00\",\"dateModified\":\"2026-01-22T07:53:09+00:00\",\"description\":\"Cloud computing and interconnectivity have changed IT security forever. In the old days, when all your servers lived in your own data centre and everyone connected directly within your corporate network, or via VPN, you could rely on your corporate firewall as a fixed perimeter security control.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/gb-en\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Accelerate your journey to zero trust with zero trust orchestration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/\",\"name\":\"Capgemini UK\",\"description\":\"Get the future you want\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/gb-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Accelerate your journey to zero trust with zero trust orchestration - Capgemini UK","description":"Cloud computing and interconnectivity have changed IT security forever. In the old days, when all your servers lived in your own data centre and everyone connected directly within your corporate network, or via VPN, you could rely on your corporate firewall as a fixed perimeter security control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/","og_locale":"en_GB","og_type":"article","og_title":"Accelerate your journey to zero trust with zero trust orchestration","og_description":"Cloud computing and interconnectivity have changed IT security forever. In the old days, when all your servers lived in your own data centre and everyone connected directly within your corporate network, or via VPN, you could rely on your corporate firewall as a fixed perimeter security control.","og_url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/","og_site_name":"Capgemini UK","article_modified_time":"2026-01-22T07:53:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/","url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/","name":"Accelerate your journey to zero trust with zero trust orchestration - Capgemini UK","isPartOf":{"@id":"https:\/\/www.capgemini.com\/gb-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg","datePublished":"2024-05-06T11:18:15+00:00","dateModified":"2026-01-22T07:53:09+00:00","description":"Cloud computing and interconnectivity have changed IT security forever. In the old days, when all your servers lived in your own data centre and everyone connected directly within your corporate network, or via VPN, you could rely on your corporate firewall as a fixed perimeter security control.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#primaryimage","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg","contentUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/gb-en\/research-and-insight\/"},{"@type":"ListItem","position":2,"name":"Accelerate your journey to zero trust with zero trust orchestration"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/gb-en\/#website","url":"https:\/\/www.capgemini.com\/gb-en\/","name":"Capgemini UK","description":"Get the future you want","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/gb-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"theme_term_info":[{"id":48,"name":"Cybersecurity"}],"industry_term_info":[],"services_term_info":[{"id":47,"name":"Cybersecurity"}],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Accelerate your journey to zero trust with zero trust orchestration","url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini UK","logo":""},"keywords":[],"dateCreated":"2024-05-06T11:18:15Z","datePublished":"2024-05-06T11:18:15Z","dateModified":"2026-01-22T07:53:09Z"},"rendered":"<meta name=\"parsely-title\" content=\"Accelerate your journey to zero trust with zero trust orchestration\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-05-06T11:18:15Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini UK","distributor_original_site_url":"https:\/\/www.capgemini.com\/gb-en","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/04\/Zero-Trust-Orchestration-web-banner-2024.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/653777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/users\/257"}],"version-history":[{"count":4,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/653777\/revisions"}],"predecessor-version":[{"id":682966,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/653777\/revisions\/682966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/media?parent=653777"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/tags?post=653777"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight-type?post=653777"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/theme?post=653777"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/brand?post=653777"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/service?post=653777"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/industry?post=653777"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/partners?post=653777"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/content-group?post=653777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}