{"id":27250,"date":"2021-08-03T16:55:00","date_gmt":"2021-08-03T14:55:00","guid":{"rendered":"https:\/\/perseus.de\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/"},"modified":"2026-03-30T15:38:37","modified_gmt":"2026-03-30T13:38:37","slug":"the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/","title":{"rendered":"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27250\" class=\"elementor elementor-27250 elementor-3452\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27249\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1-300x200.jpg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Markus Spiske via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e634c65 e-flex e-con-boxed e-con e-parent\" data-id=\"2e634c65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd13593 e-con-full e-flex e-con e-child\" data-id=\"cd13593\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cf068a6 e-con-full e-flex e-con e-child\" data-id=\"cf068a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3951587 elementor-widget elementor-widget-text-editor\" data-id=\"3951587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>03.08.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4159c0 elementor-widget elementor-widget-heading\" data-id=\"f4159c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Zero Trust Model \u2013 What is it and is it also suitable for SMEs?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4628151 elementor-widget elementor-widget-text-editor\" data-id=\"4628151\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity |  IT Security | How Tos | Everyday Clues<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2dba573 e-con-full e-flex e-con e-child\" data-id=\"2dba573\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f11b373 elementor-widget elementor-widget-text-editor\" data-id=\"f11b373\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>The Zero Trust model is on everyone&#8217;s lips as an IT security concept. But what does it mean in concrete terms? And can small and medium-sized enterprises also implement it realistically? We give an initial overview and our assessment.   <\/strong><\/p><p><strong> <\/strong><\/p><h4><strong>What exactly does &#8220;Zero Trust&#8221; stand for?<\/strong><\/h4><p>Literally translated, Zero Trust means &#8220;zero trust&#8221;. This is already a good outline of his basic principle. After all, it is a matter of not trusting any device, application or user identity in a network, but always checking it. The goal is that only legitimate devices, applications and users have access \u2013 but not hackers.   <\/p><p><strong> <\/strong><\/p><h4><strong>Why the Zero Trust Model Is Becoming More Common<\/strong><\/h4><p>For a long time, an IT security model was predominant, which is vividly characterized as a &#8220;moat concept&#8221;. Like a castle, a company is strongly secured against external access. Among other things, through firewalls, virus scanners and the like. Inside, on the other hand, significantly weaker security precautions are taken. Access from here is comparatively easy because it tends to be considered legitimate.   <\/p><p>As a result, hackers can cause great damage once they have overcome the metaphorical moat and move around the corporate network. They often succeed in doing so, for example, through phishing attacks, social engineering or security gaps in programs. Cloud applications and the further spread of the home office pose additional challenges for the moat concept \u2013 because where exactly should the moat be drawn there?  <\/p><p>With the Zero Trust concept, on the other hand, where the person, device or application is located is not so important to assess whether access is legitimate. What is important is authentication \u2013 checking whether the person, device or application is really who it claims to be. In principle, the Zero Trust model is therefore better suited to the current realities of everyday digital business life.  <\/p><p><strong> <\/strong><\/p><h4><strong>Not only for protection, but also for damage limitation<\/strong><\/h4><p>First and foremost in the Zero Trust model is the authentication of all access. But it goes beyond that. This is because it is based on the experience that cyber attacks often occur from inside a company. For example, if hackers have penetrated the company network through a phishing attack. Therefore, the Zero Trust model also includes elements that help to detect such attacks and limit their damage.    <\/p><p><strong> <\/strong><\/p><h4><strong>Key Components of the Zero Trust Model<\/strong><\/h4><ul><li>Authentication of all applications, devices and users<\/li><li>Encrypted transmission and storage of data<\/li><li>Granting access rights according to the principle of least privilege<\/li><li>Analysis and documentation of all data traffic<\/li><li>Segmentation of the corporate network into isolated areas<\/li><\/ul><p><strong> <\/strong><\/p><h4><strong>Is Zero Trust feasible for SMEs?<\/strong><\/h4><p>There is no question that the full implementation of the Zero Trust model requires effort. For example, it must first be recorded which applications, devices and users exist, which are legitimate and how they should authenticate themselves securely in the future. Encryption must be created, processes established and then become routine. Access rights must be checked, carefully assigned and, if necessary, adjusted to enable smooth work. Analysis possibilities must be created and used.    <\/p><p>But: This path can be taken step by step. In many companies, individual components of the Zero Trust model are already part of everyday life. You can build on that. Alternatively, the first step is to consider which measures are the easiest to implement and with the greatest gain in safety. If necessary, cybersecurity companies such as Perseus will be happy to advise you.    <\/p><p><strong> <\/strong><\/p><h4><strong>Attention: Perhaps the biggest stumbling block in Zero Trust<\/strong><\/h4><p>For us humans, the term &#8220;trust&#8221; is very emotionally charged. Trust is a high value. If we are trusted, we often perceive it as an award. If, on the other hand, trust is withdrawn from us or mistrusted, this is highly unpleasant. If employees of a company misunderstand and refer to the term Zero Trust, they can understandably perceive it as an affront. But without their active support, the Zero Trust model is not feasible.     <\/p><p>Therefore, when implementing the Zero Trust model, it is extremely important to make your goal clear to everyone in the company from the beginning: Zero Trust is not about distrust of people. It&#8217;s about making sure that only trusted people have access to a system, application, device, etc. \u2013 not hackers impersonating them. <\/p><p>In times of stolen or hacked credentials, intruders in the corporate network and sophisticated fraud attempts, this is unfortunately a sensible measure. If everyone in your organization understands and supports this, you&#8217;ve eliminated a common stumbling block to the Zero Trust model. <\/p><p>Our tip: The differentiation between authentication, authentication and authorization is not quite clear to you? This article can help you and clear up misunderstandings. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Zero Trust model is on everyone&#8217;s lips as an IT security concept. But what does it mean in concrete terms? And can small and medium-sized enterprises also implement it realistically? We give an initial overview and our assessment.   <\/p>\n","protected":false},"author":3,"featured_media":27249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Zero Trust Model \u2013 What is it and is it also suitable for SMEs? - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs? - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"The Zero Trust model is on everyone&#039;s lips as an IT security concept. But what does it mean in concrete terms? And can small and medium-sized enterprises also implement it realistically? We give an initial overview and our assessment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-03T14:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:38:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs?\",\"datePublished\":\"2021-08-03T14:55:00+00:00\",\"dateModified\":\"2026-03-30T13:38:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/\"},\"wordCount\":813,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/\",\"name\":\"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs? - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg\",\"datePublished\":\"2021-08-03T14:55:00+00:00\",\"dateModified\":\"2026-03-30T13:38:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg\",\"width\":768,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs? - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/","og_locale":"en_US","og_type":"article","og_title":"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs? - Perseus Technologies","og_description":"The Zero Trust model is on everyone's lips as an IT security concept. But what does it mean in concrete terms? And can small and medium-sized enterprises also implement it realistically? We give an initial overview and our assessment.","og_url":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/","og_site_name":"Perseus Technologies","article_published_time":"2021-08-03T14:55:00+00:00","article_modified_time":"2026-03-30T13:38:37+00:00","og_image":[{"width":768,"height":512,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs?","datePublished":"2021-08-03T14:55:00+00:00","dateModified":"2026-03-30T13:38:37+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/"},"wordCount":813,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/","url":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/","name":"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs? - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg","datePublished":"2021-08-03T14:55:00+00:00","dateModified":"2026-03-30T13:38:37+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Authentication-via-Unsplash_Markus-Spiske_bMvuh0YQQ68-768x512-1.jpg","width":768,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/the-zero-trust-model-what-is-it-and-is-it-also-suitable-for-smes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"The Zero Trust Model \u2013 What is it and is it also suitable for SMEs?"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27250"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27250\/revisions"}],"predecessor-version":[{"id":27251,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27250\/revisions\/27251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27249"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}