{"id":551,"date":"2020-09-29T15:56:48","date_gmt":"2020-09-29T22:56:48","guid":{"rendered":"https:\/\/structured.com\/?page_id=551"},"modified":"2025-10-22T11:30:51","modified_gmt":"2025-10-22T18:30:51","slug":"security-architecture","status":"publish","type":"page","link":"https:\/\/structured.com\/security\/security-architecture\/","title":{"rendered":"Security Architecture Services &amp; Solutions"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\" id=\"h-protect-your-business-across-endpoints-networks-and-cloud\">Protect Your Business Across Endpoints, Networks, and Cloud<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-left\"\/>\n\n\n\n<p>Now that security measures must extend to wherever access decisions are made &#8212; home offices, coffee shops, hospital rooms, checkout lines, factory floors, and even inside traditional office spaces &#8212; old perimeter-centric security models are ineffective at stopping modern threats.<\/p>\n\n\n\n<p>Users demand access to an increasing number of applications, operating across a wide range of device types, and often with little forethought about business or security risks. Meanwhile, IT professionals are dealing with multicloud computing, data center modernization, and mobility initiatives that require a rethink of how to enable access to applications and data while protecting network resources from a new, sophisticated class of advanced threats that evade traditional security constructs.&nbsp;<\/p>\n\n\n\n<p>This represents a new era for information security. Are you ready?&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-it-security-architecture-solutions\">IT Security Architecture Solutions<\/h3>\n\n\n\n<p>Today\u2019s security architecture begins with protecting endpoints &#8211; smartphones, laptops, tablets, IoT devices, and even clunky desktop PCs. Any device that connects to applications, data and other corporate assets needs to be authorized, authenticated and secured against malware and other exploits.<\/p>\n\n\n\n<p><a href=\"https:\/\/structured.com\/digital-infrastructure\/enterprise-security\/\">Next-generation security tools and platforms<\/a> reduce incident response times, assist in the discovery of unknown threats, and streamline security deployments across the enterprise. They safely enable applications, users and content by classifying all traffic, verifying privileges, and enforcing policies to protect access to relevant resources. Often aided by artificial intelligence and machine learning, these platforms help secure public and private cloud computing environments with increased visibility and control, enabling organizations to maintain security protection at the speed of machines against vulnerability exploits, viruses, spyware, botnets, ransomware and other malware.<\/p>\n\n\n\n<p>No discussion of security architecture would be complete without addressing the importance of microsegmentation. Granular control over lateral communication (east-west traffic) is essential in light of today\u2019s advanced exploits. Often, however, this is easier said than done. Microsegmentation requires a comprehensive understanding of everything that touches the enterprise and then mapping all connections between workloads, applications, and environments.<\/p>\n\n\n\n<p><strong>Adept at information security since our founding in 1992, turn to the original security architects at Structured to protect your enterprise.&nbsp;<\/strong><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div  class=\"featured-text\">\n\t<div class=\"ft-icon heading-size-4\" style=\"color: #82a6be;\">\n\t\t<i class=\"fas fa-cube\"><\/i>\t<\/div>\n\t<div class=\"ft-copy\">\n\t\t<h4 class=\"ft-title\">Endpoint Protection Platform (EPP) Solutions<\/h4>\t\t<p>EPP evolved as a response to advanced persistent threats and zero-day threats that old signature-based antivirus (AV) software could not stop. These platforms leverage advanced algorithmic capabilities inherent in artificial intelligence and machine learning and very often are delivered as subscription-based, cloud-managed solutions that include lightweight agents for endpoints.<\/p>\n<p>EPPs detect, investigate and prevent known and zero-day file-based, fileless, and script-based threats &#8211; those that detonate immediately and those that dwell for days or months in a network before activating. In addition to being very powerful computing platforms that are constantly supplied with new data from global repositories, they integrate well with other on-premises and cloud-based security hardware and software tools for sandboxing, application control, data loss prevention, endpoint detection and response, and &#8212; very critical &#8212; with next-generation firewalls (NGFW).<\/p>\n<p>In fact, EPPs are steadily growing to comprise all of those processes and technologies in a holistic framework. Here we drill down on two: Data Loss Prevention (DLP) and Endpoint Detection and Response (EDR).<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\n<div  class=\"featured-text\">\n\t<div class=\"ft-icon heading-size-4\" style=\"color: #82a6be;\">\n\t\t<i class=\"fas fa-cube\"><\/i>\t<\/div>\n\t<div class=\"ft-copy\">\n\t\t<h4 class=\"ft-title\">Data Loss Prevention (DLP) Services<\/h4>\t\t<p>DLP encrypts and obfuscates sensitive data and prevents it from leaving the confines of approved corporate network resources. It monitors data at rest, data in use, and data in transit by identifying, classifying, and tagging the information. Built on rules and policies inside of a centralized management framework, DLP automatically triggers actions &#8212; such as alerting, encryption, or even purging data &#8211; to maintain system integrity.<\/p>\n<p>DLP addresses three critical objectives: personal information protection, intellectual property protection, and data visibility.<\/p>\n<p>The first, personal information protection, is a fundamental component of prominent regulatory compliance frameworks, including the European Union\u2019s General Data Protection Regulations (GDPR), the California Consumer Privacy Act (CCPA), the Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley (GLBA), the Payment Card Industry Data Security Standard (PCI-DSS), and many more.<\/p>\n<p>Because protecting personally identifiable information (PII) forms the basis of these government regulations, DLP is helpful on two fronts: It actually protects the PII in question and it provides compliance teams with the visibility and reporting capabilities required by auditors.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\n<div  class=\"featured-text\">\n\t<div class=\"ft-icon heading-size-4\" style=\"color: #82a6be;\">\n\t\t<i class=\"fas fa-cube\"><\/i>\t<\/div>\n\t<div class=\"ft-copy\">\n\t\t<h4 class=\"ft-title\">Endpoint Detection &#038; Response (EDR) Solutions<\/h4>\t\t<p>EDR solutions also deliver on three critical points: endpoint data collection, anomaly detection, and analysis.<\/p>\n<p>EDR systems pick up indicators of compromise (IoCs) on endpoints and are helpful in identifying threat techniques and blocking attacks. Built-in alerting and forensics capabilities keep staff informed in real-time while providing critical context about events. Many systems also help security teams discover potentially compromised endpoints and devices with \u201ctrace back\u201d capabilities.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/MzSH8rYLwUc?si=TYTrv6NBamaSCgoq\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\n<div  class=\"featured-text\">\n\t<div class=\"ft-icon heading-size-4\" style=\"color: #82a6be;\">\n\t\t<i class=\"fas fa-cube\"><\/i>\t<\/div>\n\t<div class=\"ft-copy\">\n\t\t<h4 class=\"ft-title\">Next-Generation Firewalls (NGFW) Services<\/h4>\t\t<p>NGFWs retain the same purpose as their stateful inspection forebears &#8211; to consistently protect users, data and network resources from attack &#8211; but their integrated and powerful inspection, defense and prevention capabilities now dwarf those devices released just a generation ago.<\/p>\n<p>TechTarget, a technology content and marketing company, sums up the features of NGFWs this way: \u201cNGFWs combine many of the capabilities of traditional firewalls &#8212; including packet filtering, network address translation (NAT) and port address translation (PAT), URL blocking, and virtual private networks (VPNs) &#8212; with quality of service (QoS) functionality and other features that are not found in traditional firewalls. These include intrusion prevention, SSL and SSH inspection, deep-packet inspection, and reputation-based malware detection, as well as application awareness.\u201d<\/p>\n<p>Available as either physical or virtual appliances &#8211; or even delivered via the cloud as a SASE solution &#8211; now-ubiquitous NGFWs are core to every security architecture. No longer relegated to simple port and protocol inspection of north-south network traffic to detect malware or miscreants, NGFWs supply critical capabilities for establishing and supporting a comprehensive Zero Trust security strategy.<\/p>\n<p>They allow security administrators to create and automatically enforce granular controls for what users and devices are able to do or access; enable microsegmentation of network and application flows to limit damage in the event of a breach; integrate with and boost the efficacy of 3rd party threat-intelligence solutions and technologies like SD-WAN and <a href=\"https:\/\/structured.com\/sd-branch-fortify-your-network-edge\/\">SD-Branch<\/a>; and &#8212; oh yes &#8212; they detect and prevent advanced threats stemming from malware, phishing, and other vulnerability exploits like buffer overflows, port scans and command-and-control maneuvers.<\/p>\n<p>&nbsp;<\/p>\n\t<\/div>\n<\/div>\n\n\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<aside  class=\"partners\">\n\t<div class=\"partners-header\">\n\t\t<h2 class=\"partners-heading\">Partners<\/h2>\n\t<\/div>\n\t\t<div class=\"partners-body\">\n\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.paloaltonetworks.com\/\" title=\"Palo Alto Networks\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"1356\" height=\"248\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/PANW_Parent_Brand_Primary_Logo_RGB2020.png\" class=\"partner-logo\" alt=\"Palo Alto Networks Logo\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/PANW_Parent_Brand_Primary_Logo_RGB2020.png 1356w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/PANW_Parent_Brand_Primary_Logo_RGB2020-300x55.png 300w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/PANW_Parent_Brand_Primary_Logo_RGB2020-1024x187.png 1024w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/PANW_Parent_Brand_Primary_Logo_RGB2020-768x140.png 768w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/PANW_Parent_Brand_Primary_Logo_RGB2020-1200x219.png 1200w\" sizes=\"(max-width: 1356px) 100vw, 1356px\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.fortinet.com\/\" title=\"Fortinet\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"736\" height=\"432\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2016\/02\/Fortinet-Partner_PLATINUM_Logo-2015-1.jpg\" class=\"partner-logo\" alt=\"Fortinet Logo\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2016\/02\/Fortinet-Partner_PLATINUM_Logo-2015-1.jpg 736w, https:\/\/structured.com\/wp-content\/uploads\/2016\/02\/Fortinet-Partner_PLATINUM_Logo-2015-1-300x176.jpg 300w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.catonetworks.com\/\" title=\"Cato Networks\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1061\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-scaled.png\" class=\"partner-logo\" alt=\"Cato Networks\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-scaled.png 2560w, https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-300x124.png 300w, https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-1024x424.png 1024w, https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-768x318.png 768w, https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-1536x637.png 1536w, https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-2048x849.png 2048w, https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-1200x497.png 1200w, https:\/\/structured.com\/wp-content\/uploads\/2025\/06\/cato-logo@10x-1980x821.png 1980w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.cisco.com\/\" title=\"Cisco\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"651\" height=\"383\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/09\/Cisco-Premier-Certified-Partner-Logo.png\" class=\"partner-logo\" alt=\"Cisco Premier Certified Partner Logo\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/09\/Cisco-Premier-Certified-Partner-Logo.png 651w, https:\/\/structured.com\/wp-content\/uploads\/2020\/09\/Cisco-Premier-Certified-Partner-Logo-300x176.png 300w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.barracuda.com\/\" title=\"Barracuda\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"930\" height=\"300\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2023\/12\/logo_barracuda_primary_strapline.png\" class=\"partner-logo\" alt=\"Barracuda Logo\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2023\/12\/logo_barracuda_primary_strapline.png 930w, https:\/\/structured.com\/wp-content\/uploads\/2023\/12\/logo_barracuda_primary_strapline-300x97.png 300w, https:\/\/structured.com\/wp-content\/uploads\/2023\/12\/logo_barracuda_primary_strapline-768x248.png 768w\" sizes=\"(max-width: 930px) 100vw, 930px\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.cybereason.com\/\" title=\"Cybereason\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"240\" height=\"118\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/cybereason.png\" class=\"partner-logo\" alt=\"Cybereason Logo\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.sentinelone.com\/\" title=\"SentinelOne\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"1920\" height=\"962\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/SentinelOne-logo-color.png\" class=\"partner-logo\" alt=\"SentinelOne Logo\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/SentinelOne-logo-color.png 1920w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/SentinelOne-logo-color-300x150.png 300w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/SentinelOne-logo-color-1024x513.png 1024w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/SentinelOne-logo-color-768x385.png 768w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/SentinelOne-logo-color-1536x770.png 1536w, https:\/\/structured.com\/wp-content\/uploads\/2020\/10\/SentinelOne-logo-color-1200x601.png 1200w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.crowdstrike.com\/\" title=\"Crowdstrike\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"296\" height=\"174\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/09\/crowdstrike_logo.png\" class=\"partner-logo\" alt=\"Crowdstrike Logo\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"partner-box\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.code42.com\/\" title=\"Code 42\" target=\"_blank\">\n\t\t\t\t<img decoding=\"async\" width=\"370\" height=\"72\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2021\/08\/Code42_Primary_Horizontal_FullColor_Logo_RGB.png\" class=\"partner-logo\" alt=\"Code 42 Logo\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2021\/08\/Code42_Primary_Horizontal_FullColor_Logo_RGB.png 370w, https:\/\/structured.com\/wp-content\/uploads\/2021\/08\/Code42_Primary_Horizontal_FullColor_Logo_RGB-300x58.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t<div class=\"partner-buttons\">\n\t\t<a href=\"https:\/\/structured.com\/partners\" class=\"button\">View All Of Our Partners<\/a>\n\t<\/div>\n<\/aside>\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-center\"\/>\n\n\n<script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_unknown gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_1' >\n                        <div class='gform_heading'>\n                            <h3 class=\"gform_title\">Get In Touch<\/h3>\n                            <p class='gform_description'><\/p>\n                        <\/div><form method='post' enctype='multipart\/form-data'  id='gform_1'  action='\/wp-json\/wp\/v2\/pages\/551' data-formid='1' novalidate>\n                        <div class='gform-body gform_body'><ul id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id=\"field_1_9\" class=\"gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_9'>Comments<\/label><div class='ginput_container'><input name='input_9' id='input_1_9' type='text' value='' autocomplete='new-password'\/><\/div><div class='gfield_description' id='gfield_description_1_9'>This field is for validation purposes and should be left unchanged.<\/div><\/li><li id=\"field_1_1\" class=\"gfield gfield--type-name gfield--input-type-name gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_1_1'>\n                            \n                            <span id='input_1_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.3' id='input_1_1_3' value=''   aria-required='true'   placeholder='First Name *'  \/>\n                                                    <label for='input_1_1_3' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>First<\/label>\n                                                <\/span>\n                            \n                            <span id='input_1_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.6' id='input_1_1_6' value=''   aria-required='true'   placeholder='Last Name *'  \/>\n                                                    <label for='input_1_1_6' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>Last<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/li><li id=\"field_1_6\" class=\"gfield gfield--type-text gfield--input-type-text field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_6'>Title<\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='large'    placeholder='Title'  aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_1_4\" class=\"gfield gfield--type-text gfield--input-type-text gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_4'>Company<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_4' id='input_1_4' type='text' value='' class='large'    placeholder='Company*' aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_1_2\" class=\"gfield gfield--type-phone gfield--input-type-phone field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_2'>Phone<\/label><div class='ginput_container ginput_container_phone'><input name='input_2' id='input_1_2' type='tel' value='' class='large'  placeholder='Phone'  aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_1_3\" class=\"gfield gfield--type-email gfield--input-type-email gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_3'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_3' id='input_1_3' type='email' value='' class='large'   placeholder='Email *' aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/li><li id=\"field_1_5\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_5'>Message<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_5' id='input_1_5' class='textarea medium'    placeholder='Message *' aria-required=\"true\" aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/li><li id=\"field_1_7\" class=\"gfield gfield--type-text gfield--input-type-text field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_hidden\"  ><div class=\"admin-hidden-markup\"><i class=\"gform-icon gform-icon--hidden\" aria-hidden=\"true\" title=\"This field is hidden when viewing the form\"><\/i><span>This field is hidden when viewing the form<\/span><\/div><label class='gfield_label gform-field-label' for='input_1_7'>Referring Page<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_1_7' type='text' value='' class='medium'      aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_1_8\" class=\"gfield gfield--type-captcha gfield--input-type-captcha gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_8'>CAPTCHA<\/label><div id='input_1_8' class='ginput_container ginput_recaptcha' data-sitekey='6LdAXvIqAAAAAEA0utEZQrqvECfI8KWiLhRQ5nyC'  data-theme='light' data-tabindex='0'  data-badge=''><\/div><\/li><\/ul><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='legacy' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='{&quot;inputPrimaryColor&quot;:&quot;#204ce5&quot;}' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='HCq9hXC8MAFIV4eyE7UWgwCfCGAGWH3wJQ+ZnGISKLdQCCIv6ip1yfyllN\/j6m75RS+Ez9Cei+7\/2ZSGo0jN24VJzS8k2btf2oonNuAdhEMIJ3g=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsIjA1OGZlYTc1YmJlZTAzYzIzYzYwOGNkNGVjYTNmNjNjIl0=' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"ak_\"><label>&#916;<textarea name=\"ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"ak_js\" value=\"84\"\/><script>document.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );<\/script><\/p><\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https:\/\/structured.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https:\/\/structured.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"1\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_1\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_1\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_1\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-center\"\/>\n\n\n\n<aside  class=\"downloads\">\n\t<div class=\"downloads-header\">\n\t\t<h2 class=\"downloads-heading\">Downloads<\/h2>\n\t<\/div>\n\t\t<div class=\"downloads-body\">\n\t\t\t\t<div class=\"download\">\n\t\t\t\t<div class=\"download-meta\">\n\t\t\t\t\t<div class=\"download-category\">Datasheet<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<h3 class=\"download-title\"><a href=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/FortiOS.pdf\" target=\"_blank\" title=\"Fortinet FortiOS Datasheet\">Fortinet FortiOS Datasheet<\/a><\/h3>\n\t\t\t\t<hr class=\"download-rule\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/FortiOS.pdf\" target=\"_blank\" title=\"Fortinet FortiOS Datasheet\"><img decoding=\"async\" width=\"116\" height=\"150\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/FortiOS-pdf-116x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/><\/a>\n\t\t\t\t\t\t\t\t<p>Discover seamless experience under a single console.<\/p>\n\t\t\t\t<a href=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/FortiOS.pdf\" target=\"_blank\" title=\"Fortinet FortiOS Datasheet\" class=\"button\">Download<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"download\">\n\t\t\t\t<div class=\"download-meta\">\n\t\t\t\t\t<div class=\"download-category\">Solution Brief<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<h3 class=\"download-title\"><a href=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/PANW-DLP-Solution-Brief.pdf\" target=\"_blank\" title=\"PANW Enterprise DLP\">PANW Enterprise DLP<\/a><\/h3>\n\t\t\t\t<hr class=\"download-rule\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/PANW-DLP-Solution-Brief.pdf\" target=\"_blank\" title=\"PANW Enterprise DLP\"><img decoding=\"async\" width=\"116\" height=\"150\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/PANW-DLP-Solution-Brief-pdf-116x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/><\/a>\n\t\t\t\t\t\t\t\t<p>Prevent the risks of data loss and noncompliance.<\/p>\n\t\t\t\t<a href=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/PANW-DLP-Solution-Brief.pdf\" target=\"_blank\" title=\"PANW Enterprise DLP\" class=\"button\">Download<\/a>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t<\/aside>\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n\n<section  class=\"st-video\">\n\t\n\t<div class=\"st-video-wrapper\" data-id=\"gf2vv6ox5m\" data-source=\"Wistia, Inc.\">\n\t\n\t\t<script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script><div class=\"wistia_responsive_padding\" style=\"padding:56.25% 0 0 0;position:relative;\"><div class=\"wistia_responsive_wrapper\" style=\"height:100%;left:0;position:absolute;top:0;width:100%;\"><div class=\"wistia_embed wistia_async_gf2vv6ox5m dnt=1 videoFoam=true\" style=\"height:100%;position:relative;width:100%\"><div class=\"wistia_swatch\" style=\"height:100%;left:0;opacity:0;overflow:hidden;position:absolute;top:0;transition:opacity 200ms;width:100%;\"><img decoding=\"async\" src=\"https:\/\/fast.wistia.com\/embed\/medias\/gf2vv6ox5m\/swatch\" style=\"filter:blur(5px);height:100%;object-fit:contain;width:100%;\" alt=\"\" aria-hidden=\"true\" onload=\"this.parentNode.style.opacity=1;\" \/><\/div><\/div><\/div><\/div>\t\t<div class=\"st-video-overlay\" style=\"background-image: linear-gradient(180deg, rgba(0,0,0,0) 40%, rgba(35,64,81,1) 80%), url('https:\/\/embed-ssl.wistia.com\/deliveries\/4928a341fe91330ac9de88b471c76be0.jpg')\">\n\t\t<div class=\"st-video-icon heading-size-1\">\n\t\t\t<i class=\"fas fa-play\"><\/i>\n\t\t<\/div>\n\t\t\t\t\t<h3>A Structured Conversation About Security<\/h3>\n\t\t\t<hr>\n\t\t\t\t\t<p>Brad Pierce, Structured&#8217;s Vice President of Security Solutions, discusses a modern, comprehensive approach to protecting users, devices, corporate assets and infrastructure.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t<script>\n\t\tdocument.querySelector('[data-id=\"gf2vv6ox5m\"] .st-video-overlay').addEventListener('click', function(){\n\t\t\tdocument.querySelector('[data-id=\"gf2vv6ox5m\"] .st-video-overlay').classList.toggle('video-hideoverlay');\n\t\t\t_wq.push({\n\t\t\t\tid: \"gf2vv6ox5m\", onReady: function (video) {\n\t\t\t\t\tvideo.play();\n\t\t\t\t}\n\t\t\t});\n\t\t});\n\t<\/script>\n<\/section>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"2560\" height=\"768\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-scaled.png\" alt=\"\" class=\"wp-image-19030\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-scaled.png 2560w, https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-300x90.png 300w, https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-1024x307.png 1024w, https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-768x230.png 768w, https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-1536x461.png 1536w, https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-2048x614.png 2048w, https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-1200x360.png 1200w, https:\/\/structured.com\/wp-content\/uploads\/2026\/02\/structured-2026-award-icons-1980x594.png 1980w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\"><\/div>\n\n\n\n<section  class=\"featured-posts\">\n    <div class=\"posts-header\">\n    \t<div class=\"flag\">\n        \t<hr class=\"flag-rule\">\n        \t<div class=\"flag-title\">Security<\/div>\n      \t<\/div>\n      \t<h2 class=\"posts-heading\">Partner with Structured to Strengthen Your Security Architecture<\/h2>\n\t<\/div>\n\t\t\t<div class=\"posts-row\">\n\t\t\t\t\t<div class=\"post\">\n\t\t\t\t<article class=\"post-article\">\n\t\t\t\t\t<div class=\"post-meta\">\n\t\t\t\t\t\t<div class=\"post-date\">September 17, 2020<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h3 class=\"post-title\"><a href=\"https:\/\/structured.com\/blog\/inventory-documentation\/\">Back to Basics &#8211; Inventory Documentation and Network Visibility<\/a><\/h3>\n\t\t\t\t\t<hr class=\"post-rule\">\n\t\t\t\t\t<a href=\"https:\/\/structured.com\/blog\/inventory-documentation\/\"><img decoding=\"async\" width=\"407\" height=\"200\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2019\/09\/Calm-Worker-In-Clouds.png\" class=\"post-featured wp-post-image\" alt=\"Calm Worker in Clouds\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2019\/09\/Calm-Worker-In-Clouds.png 927w, https:\/\/structured.com\/wp-content\/uploads\/2019\/09\/Calm-Worker-In-Clouds-300x147.png 300w, https:\/\/structured.com\/wp-content\/uploads\/2019\/09\/Calm-Worker-In-Clouds-768x377.png 768w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/><\/a>\n\t\t\t\t\t<p>By Brad Pierce, Structured Managing Director of Security, CISSP\/CISA\/PCIP &#8212; One of the first things you must do as a network or systems administrator is document. Oh, Documentation! The bane&#8230;<\/p>\n\t\t\t\t\t<div class=\"post-buttons\">\n\t\t\t\t\t\t<a href=\"https:\/\/structured.com\/blog\/inventory-documentation\/\" class=\"button post-button post-more\">Read More<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"post\">\n\t\t\t\t<article class=\"post-article\">\n\t\t\t\t\t<div class=\"post-meta\">\n\t\t\t\t\t\t<div class=\"post-date\">January 11, 2021<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h3 class=\"post-title\"><a href=\"https:\/\/structured.com\/blog\/trust-is-dead-long-live-trust\/\">Trust is Dead, Long Live Trust!<\/a><\/h3>\n\t\t\t\t\t<hr class=\"post-rule\">\n\t\t\t\t\t<a href=\"https:\/\/structured.com\/blog\/trust-is-dead-long-live-trust\/\"><img decoding=\"async\" width=\"407\" height=\"200\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/Casual-Business-MFA-Zero-Trust.png\" class=\"post-featured wp-post-image\" alt=\"MFA &amp; Zero Trust Business\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/Casual-Business-MFA-Zero-Trust.png 927w, https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/Casual-Business-MFA-Zero-Trust-300x147.png 300w, https:\/\/structured.com\/wp-content\/uploads\/2020\/11\/Casual-Business-MFA-Zero-Trust-768x377.png 768w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/><\/a>\n\t\t\t\t\t<p>By Brad Pierce, Structured Managing Director of Security, CISSP\/CISA\/PCIP &#8212; Zero Trust is a philosophy, a journey. No one manufacturer or security product will get you where you\u2019re going. It&#8230;<\/p>\n\t\t\t\t\t<div class=\"post-buttons\">\n\t\t\t\t\t\t<a href=\"https:\/\/structured.com\/blog\/trust-is-dead-long-live-trust\/\" class=\"button post-button post-more\">Read More<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"post\">\n\t\t\t\t<article class=\"post-article\">\n\t\t\t\t\t<div class=\"post-meta\">\n\t\t\t\t\t\t<div class=\"post-date\">November 10, 2020<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h3 class=\"post-title\"><a href=\"https:\/\/structured.com\/blog\/secure-critical-infrastructure-demands-proactive-measures\/\">Secure Critical Infrastructure Demands Proactive Measures<\/a><\/h3>\n\t\t\t\t\t<hr class=\"post-rule\">\n\t\t\t\t\t<a href=\"https:\/\/structured.com\/blog\/secure-critical-infrastructure-demands-proactive-measures\/\"><img decoding=\"async\" width=\"407\" height=\"200\" src=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/03\/Electricity-Infrastructure-with-Cityscape.png\" class=\"post-featured wp-post-image\" alt=\"Electricity Infrastructure with Cityscape\" srcset=\"https:\/\/structured.com\/wp-content\/uploads\/2020\/03\/Electricity-Infrastructure-with-Cityscape.png 927w, https:\/\/structured.com\/wp-content\/uploads\/2020\/03\/Electricity-Infrastructure-with-Cityscape-300x147.png 300w, https:\/\/structured.com\/wp-content\/uploads\/2020\/03\/Electricity-Infrastructure-with-Cityscape-768x377.png 768w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/><\/a>\n\t\t\t\t\t<p>By Collin Miller, Director of Cloud Security &#8212; Given the emergency brought on by rapid spread of COVID-19, many businesses have been shut down or are transitioning to telework to&#8230;<\/p>\n\t\t\t\t\t<div class=\"post-buttons\">\n\t\t\t\t\t\t<a href=\"https:\/\/structured.com\/blog\/secure-critical-infrastructure-demands-proactive-measures\/\" class=\"button post-button post-more\">Read More<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/section>","protected":false},"excerpt":{"rendered":"<p>Protect Your Business Across Endpoints, Networks, and Cloud Now that security measures must extend to wherever access decisions are made &#8212; home offices, coffee shops, hospital rooms, checkout lines, factory&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":17,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-551","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Design a security architecture from the ground to the cloud<\/title>\n<meta name=\"description\" content=\"Today\u2019s security architecture begins with protecting endpoints - smartphones, laptops, tablets, IoT devices, and even clunky desktop PCs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/structured.com\/security\/security-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Architecture Services &amp; Solutions\" \/>\n<meta property=\"og:description\" content=\"Today\u2019s security architecture begins with protecting endpoints - smartphones, laptops, tablets, IoT devices, and even clunky desktop PCs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/structured.com\/security\/security-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"Structured\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T18:30:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@structuredinc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/structured.com\\\/security\\\/security-architecture\\\/\",\"url\":\"https:\\\/\\\/structured.com\\\/security\\\/security-architecture\\\/\",\"name\":\"Design a security architecture from the ground to the cloud\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/structured.com\\\/#website\"},\"datePublished\":\"2020-09-29T22:56:48+00:00\",\"dateModified\":\"2025-10-22T18:30:51+00:00\",\"description\":\"Today\u2019s security architecture begins with protecting endpoints - smartphones, laptops, tablets, IoT devices, and even clunky desktop PCs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/structured.com\\\/security\\\/security-architecture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/structured.com\\\/security\\\/security-architecture\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/structured.com\\\/security\\\/security-architecture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/structured.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Services &amp; Solutions for Businesses\",\"item\":\"https:\\\/\\\/structured.com\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Architecture Services &amp; Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/structured.com\\\/#website\",\"url\":\"https:\\\/\\\/structured.com\\\/\",\"name\":\"Structured\",\"description\":\"Security, Cloud, Digital Infrastructure and Managed Services for performant IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/structured.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/structured.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/structured.com\\\/#organization\",\"name\":\"Structured\",\"url\":\"https:\\\/\\\/structured.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/structured.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/structured.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Structured_Logo.png\",\"contentUrl\":\"https:\\\/\\\/structured.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Structured_Logo.png\",\"width\":688,\"height\":317,\"caption\":\"Structured\"},\"image\":{\"@id\":\"https:\\\/\\\/structured.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/structuredinc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/structured-communication-systems\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCUe6H123HjJrTmpGvJN_zpg\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Design a security architecture from the ground to the cloud","description":"Today\u2019s security architecture begins with protecting endpoints - smartphones, laptops, tablets, IoT devices, and even clunky desktop PCs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/structured.com\/security\/security-architecture\/","og_locale":"en_US","og_type":"article","og_title":"Security Architecture Services &amp; Solutions","og_description":"Today\u2019s security architecture begins with protecting endpoints - smartphones, laptops, tablets, IoT devices, and even clunky desktop PCs.","og_url":"https:\/\/structured.com\/security\/security-architecture\/","og_site_name":"Structured","article_modified_time":"2025-10-22T18:30:51+00:00","twitter_card":"summary_large_image","twitter_site":"@structuredinc","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/structured.com\/security\/security-architecture\/","url":"https:\/\/structured.com\/security\/security-architecture\/","name":"Design a security architecture from the ground to the cloud","isPartOf":{"@id":"https:\/\/structured.com\/#website"},"datePublished":"2020-09-29T22:56:48+00:00","dateModified":"2025-10-22T18:30:51+00:00","description":"Today\u2019s security architecture begins with protecting endpoints - smartphones, laptops, tablets, IoT devices, and even clunky desktop PCs.","breadcrumb":{"@id":"https:\/\/structured.com\/security\/security-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/structured.com\/security\/security-architecture\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/structured.com\/security\/security-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/structured.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Services &amp; Solutions for Businesses","item":"https:\/\/structured.com\/security\/"},{"@type":"ListItem","position":3,"name":"Security Architecture Services &amp; Solutions"}]},{"@type":"WebSite","@id":"https:\/\/structured.com\/#website","url":"https:\/\/structured.com\/","name":"Structured","description":"Security, Cloud, Digital Infrastructure and Managed Services for performant IT","publisher":{"@id":"https:\/\/structured.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/structured.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/structured.com\/#organization","name":"Structured","url":"https:\/\/structured.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/structured.com\/#\/schema\/logo\/image\/","url":"https:\/\/structured.com\/wp-content\/uploads\/2020\/09\/Structured_Logo.png","contentUrl":"https:\/\/structured.com\/wp-content\/uploads\/2020\/09\/Structured_Logo.png","width":688,"height":317,"caption":"Structured"},"image":{"@id":"https:\/\/structured.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/structuredinc","https:\/\/www.linkedin.com\/company\/structured-communication-systems\/","https:\/\/www.youtube.com\/channel\/UCUe6H123HjJrTmpGvJN_zpg"]}]}},"_links":{"self":[{"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages\/551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/comments?post=551"}],"version-history":[{"count":85,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages\/551\/revisions"}],"predecessor-version":[{"id":18451,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages\/551\/revisions\/18451"}],"up":[{"embeddable":true,"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/pages\/17"}],"wp:attachment":[{"href":"https:\/\/structured.com\/wp-json\/wp\/v2\/media?parent=551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}