colortokens.com
Open in
urlscan Pro
2606:4700::6812:1927
Public Scan
Submitted URL: https://cffzg04.na1.hubspotlinks.com/Ctc/DL+113/cFFzg04/VWZMfT5Bkg6GW1lsC3-57q1DJW6fpr4J4HPS4MN67vcp33l0g5V1-WJV7CgL2KW7f0xQw8vJcFFW3...
Effective URL: https://colortokens.com/blog/key-tenets-zero-trust-architecture/?utm_medium=email&_hsmi=148128520&_hsenc=p2ANqtz-_v5zmcy...
Submission: On April 13 via api from SE — Scanned from DE
Effective URL: https://colortokens.com/blog/key-tenets-zero-trust-architecture/?utm_medium=email&_hsmi=148128520&_hsenc=p2ANqtz-_v5zmcy...
Submission: On April 13 via api from SE — Scanned from DE
Form analysis
3 forms found in the DOM<form id="ct-hubspot-form-partner-Registration-popup-with-jquery-validation" class="bgfix" novalidate="novalidate">
<input type="hidden" name="hform_id" id="hform_id" value="8fee3cc2-f26f-4f91-92cc-62ea7d1b97e7">
<input type="hidden" name="form_name" id="form_name" value="partnerRegistration">
<input type="hidden" name="srcdetailtxt" id="srcdetailtxt" value="N/A">
<select id="srcdetailid" class="d-none">
<option selected="" value="Partnership request"></option>
</select>
<div class="forLoaderIcon formLoader subscribeloader">
<img alt="form loader" data-src="https://colortokens.com/wp-content/uploads/oval.svg" class="lazyload" src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw=="><noscript><img
src="https://colortokens.com/wp-content/uploads/oval.svg" alt="form loader"></noscript>
</div>
<select hidden="" name="record_type" id="record_type">
<option value="0127F000000NWDmQAO" selected="">Record Type</option>
</select>
<div class="row">
<div class="col-sm-6">
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="fullName"> First Name</label>
<input type="text" id="firstname" name="firstname" required="" class="input-box mb-0 p-0 ">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="lastname">Last Name</label>
<input type="text" id="lastname" name="lastname" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="company">Company Name</label>
<input type="text" id="company" name="company" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="email">Company Email</label>
<input id="email" name="email" type="text" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="jobtitle">Job Title</label>
<input type="text" id="jobtitle" name="jobtitle" required="" class="input-box mb-0 p-0">
</div>
</div>
</div>
<div class="col-sm-6">
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="website">Website URL</label>
<input type="text" id="website" name="website" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="phone">Phone Number</label>
<input type="text" id="phone" name="phone" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40 focused">
<label class="form-label" for="partnersCountry">Country</label>
<select id="partnersCountry" name="country" required="" class="w-100 input-box form-control p-0">
<option value="" class="select-country">Select Country</option>
</select>
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40 focused">
<label class="form-label d-none" for="partner_type">Partner Type</label>
<select id="partner_type" name="partner_type" class="form-control w-100 p-0 input-select">
<option value=""> Partner Type</option>
<option value="GSI">GSI</option>
<option value="Reseller">Reseller</option>
<option value="Distributor">Distributor</option>
<option value="MSP/MSSP">MSP/MSSP</option>
</select>
</div>
</div>
<div class="col-sm-12">
<div class="form-group">
<label class="form-label" for="comments">Message</label>
<input type="text" id="comments" name="comments" class="p-0 input-box">
</div>
</div>
</div>
<div class="col-sm-12">
<div class="form-group mt-4 mb-3 text-center">
<input type="submit" name="submit" id="submit" class="rectangle-small-btn p-0 mb-0 mx-auto text-white text-uppercase" value="SUBMIT">
</div>
<p class="terms m-0">By submitting this form, you agree to ColorTokens <br> <a href="/terms-of-service/" target="_blank" class="text-red font-weight-normal">Terms of Service</a> and
<a href="/privacy-policy/partnerportal/" target="_blank" class="text-red font-weight-normal">Privacy Policy</a> </p>
</div>
</div>
</form>
GET https://colortokens.com/
<form class="search" method="get" action="https://colortokens.com/" role="search" autocomplete="off">
<input type="search" class="form-control d-inline shadow-none p-2" name="s" required="" placeholder="Search..." value="">
<button type="submit" role="button" class="search-icon bg-transparent border-0 px-1" id="button-search">
<svg xmlns="http://www.w3.org/2000/svg" width="30.415" height="30.415" viewBox="0 0 30.415 30.415">
<g fill="none" stroke="#fff" stroke-linejoin="round" stroke-width="2px" transform="translate(-1767.5 -33.5)">
<circle cx="9.739" cy="9.739" r="9.739" transform="translate(1768.5 34.5)"></circle>
<path stroke-linecap="round" d="M0 0L11.375 11.375" transform="translate(1785.125 51.125)"></path>
</g>
</svg>
</button>
</form>
POST
<form class="was-validate footer-subscribe-form" id="footer-subscribe-form" method="post" autocomplete="off" novalidate="novalidate">
<input type="hidden" name="hform_id" id="hform_id" value="89388638-6dbe-477b-911b-8dd3f07177d0">
<input type="hidden" name="form_name" id="form_name" value="fnewsletter">
<input type="hidden" name="srcdetailtxt" id="srcdetailtxt" value="N/A">
<select id="srcdetailid" class="d-none">
<option selected="" value="Newsletter Subscription"></option>
</select>
<div class="position-relative">
<div class="formLoader text-center">
<img loading="lazy" alt="form loader" data-src="https://colortokens.com/wp-content/uploads/oval.svg" class="lazyload" src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw=="><noscript><img loading="lazy"
src="https://colortokens.com/wp-content/uploads/oval.svg" alt="form loader"></noscript>
</div>
<input type="email" class="email-field email" required="" name="email" id="email" placeholder="Enter Your Email Address">
</div>
<button type="submit" class="ctu-button">Subscribe to Our Updates</button>
</form>
Text Content
* Search * Careers * Contact Us * Login * Products + * Solutions + * Partners + * Resources + * Company + Request Demo Live Micro-Segmentation Demo Platform * XTENDED ZEROTRUST PLATFORM Products * XSHIELD Workload visibility and segmentation * XACCESS Secure remote access * XPROTECT Endpoint and host protection * XCLOUD Comprehensive cloud workload security Quick Links * Xaccess datasheet * Xprotect datasheet * Learn about Micro-Segmentation * Zero Trust survey results * Xshield datasheet * Xshield solution brief * Security * Services * Industry Cloud * Secure Access to Cloud Workloads * Cloud Workload Protection End Point * POS and Fixed-Function Systems Protection * Endpoint Lockdown Applications * Secure Remote Access to Applications * Crown Jewels Security for Hybrid Environments Infrastructure * Ransomware Prevention * Environment Separation Quick Links * Learn about Micro-Segmentation * Learn about PCI-DSS 4.0 Solution Brief * Online Deals Marketplace Combats Ransomware ZERO TRUST AS A SERVICE * XASSURE * Breach Protection * Advanced Threat Monitoring and Incident Response * Managed Micro-Segmentation and Monitoring * Zero Trust Adoption * XQUANTIFY Assessment Solutions - Cyber Risk Quantification Quick Links * Learn about Zero Trust Security * Tailored Services for Every Need Case Study * Nishith Desai Associates Implements Proactive Cybersecurity Industry Solutions * Financial Services * Healthcare and Life Sciences * Legal and Professional Services * Retail Services * Manufacturing Technology * Critical Infrastructure Quick Links * Xshield datasheet * Xassure Platform Overview Case Study * Solutions for Healthcare Organizations * Solutions for Government Organizations Become a Partner Already a partner ? Login Program PARTNER PROGRAM OVERVIEW Designed to deliver unparalleled customer value and accelerated mutual growth by harnessing partner expertise and ColorTokens cybersecurity technology. Learn More Resources * CUSTOMER SUCCESS * WEBINARS * BLOG * RESOURCE CENTER Featured Topic * Micro-Segmentation * PCI-DSS 4.0 * Zero Trust Architecture * Application Whitelisting Contact Us * ABOUT US Keeping the world safe from cybercrime * CERTIFICATIONS AND AWARDS * NEWS AND EVENTS The latest from ColorTokens * CAREERS Request Demo Live Micro-Segmentation Demo Search... * Products + * Xtended ZeroTrustTM Platform * Xshield: Workload Visibility and Segmentation * Xaccess: Secure Remote Access * Xprotect: Endpoint and Host Protection * Xcloud: Comprehensive cloud workload security * QUICK LINKS Zero Trust survey results Xshield datasheet Xshield Solution Brief Xaccess datasheet Xprotect datasheet Learn about Micro-Segmentation * Solutions + * Security Solutions + * Secure Remote Access to Applications * Secure Access Cloud Workloads * Crown Jewels Security for Hybrid Environments * Cloud Workload Protection * Environment Separation * Endpoint Lockdown * POS and Fixed-Function Systems Protection * Ransomware Prevention * QUICK LINKS Learn about Micro-Segmentation Learn about PCI-DSS 4.0 CASE STUDY Online Deals Marketplace Combats Ransomware * Progressive Zero Trust as a Service + * Xassure: Service Overview * Breach Protection * Advanced Threat Monitoring and Incident Response * Managed Micro-Segmentation and Monitoring * Zero Trust Adoption * QUICK LINKS Learn about Zero Trust Security Explore Xassure Service Packs CASE STUDY Nishith Desai Associates Implements Proactive Cybersecurity * Assessment Solutions + * Cyber Risk Quantification: Xquantify * Industry Solutions + * Financial Services * Retail * Healthcare and Life Sciences * Legal and Professional Services * Manufacturing Technology * Critical Infrastructure * QUICK LINKS Xshield datasheet Xassure Service Overview SOLUTION BRIEF Solutions for Healthcare Organizations Solutions for Government Organizations * Partners + * Partner Portal Login * ColorTokens Partner Program Overview * Resources + * Featured Topics + * Micro-Segmentation * PCI-DSS 4.0 * Zero Trust Architecture * Application Whitelisting * Customer success * Blog * Webinars * Resource Center * QUICK LINKS Case Studies Solution Briefs Technical Briefs * Company + * About ColorTokens * Certifications and Awards * Privacy Policy * Careers * News and Events * Contact Us * Platform login * Request A Demo Blog 7 KEY TENETS OF ZERO TRUST ARCHITECTURE Author Satyam Tyagi Read Time 6 Minutes Last Updated Dec 13, 2021 Zero Trust Architecture Zero Trust Architecture (ZTA) is a security blueprint designed with the realities of today’s cyber threat landscape in mind. It’s based on the premise that attackers are already present, and at any point anything can be compromised – and in turn suggests organizations adhere to these key tenets of Zero Trust Architecture to maximize cyber resilience. Broadly speaking, we can classify these ZTA tenets under three security domains. Using the NIST SP 800-207 document as a reference point, we’ll examine how these seven tenets of zero trust architecture fit into these domains, as well as why each tenet plays a vital role in ensuring robust Zero Trust security. ZTA DOMAIN 1: GRANTING ACCESS On what basis do we grant access? How do we determine and verify the identity of an accessor, the integrity of an accessor, and the state of an accessor? The three tenets in this category seek to address these critical questions; if these tenets are not properly implemented, unauthorized or compromised users or devices may get access when they should not. TENET 1: AUTHENTICATION AND AUTHORIZATION NIST – “All resource authentication and authorization are dynamic and strictly enforced before access is allowed.” Broadly, this implies nothing is inherently trusted and everything trying to obtain access is properly authenticated with strong authentication (MFA, X.509, etc.), and even re-authenticated as needed. TENET 2: INTEGRITY NIST – “The enterprise monitors and measures the integrity and security posture of all owned and associated assets.” Since we assume at any point anything can be compromised, integrity is continuously evaluated for vulnerabilities, patch level, and other possible corruptions which may compromise asset integrity. TENET 3: OBSERVABLE STATE NIST – “Access to resources is determined by dynamic policy—including the observable state of client identity, application/service, and the requesting asset—and may include other behavioral and environmental attributes.” This tenet appears somewhat similar to the previous “Integrity” tenet, but the difference is that “Observable State” deals more with the characteristics and behavioral attributes an organization should evaluate before granting access. This may include location, device type, measured deviations, and unusual usage patterns. ZTA DOMAIN 2: CONTROLLING ACCESS How much access do we grant, and for how long in terms of both time and activity? This aspect of Zero Trust Architecture relates the principle of least privilege. If it’s not properly implemented and we grant too much access, a small compromise can result in a massive breach. TENET 4: MINIMAL ACCESS IN SIZE NIST – “All data sources and computing services are considered resources.” Even extremely small footprint compute and data constructs such as containers, processes, functions, IOT actuators, files, DB tables, or data records are considered to be resources. It needs to be possible to control access to the minimal resource at the maximum granularity based on the need. TENET 5: MINIMAL ACCESS IN TIME NIST – “Access to individual enterprise resources is granted on a per-session basis.” Access should be granted only to the individual resource, for the duration needed, and for the particular transaction. Access should be re-evaluated for every new transaction or after the shortest period of time necessary. ZTA DOMAIN 3: MONITORING AND SECURING ACCESS Once a Zero Trust access decision is established, access must be monitored and secured. If this aspect is not properly implemented – and we are not able to secure access for confidentiality or integrity, or respond to changes in the threat environment – we may not be able to protect our Zero Trust Architecture from network, infrastructure, and environment attacks. TENET 6: MONITOR ALL ACCESS NIST – “The enterprise collects as much information as possible about the current state of assets, network infrastructure, and communications and uses it to improve its security posture.” Enterprises should collect a lot of data about the overall security posture and threats in their environment. As these evolve, this context and insights should feed into policy creation and improvement. TENET 7: ENCRYPT ALL ACCESS NIST – “All communication is secured regardless of network location.” The confidentiality and integrity of communications for the access request and the actual access are equally important to Zero Trust. If the communication and/or access request are compromised, manipulated, or breached, the whole Zero Trust premise stands invalid. Download the Definitive Guide to Zero Trust Security Read More THE IMPORTANCE OF ZERO TRUST TENETS It’s vital that organizations properly address each of these tenets as part of their Zero Trust Architecture plan. If enterprises don’t have sufficient measures in place for even one tenet or domain, they may not be able to enjoy the benefits of a true Zero Trust Architecture. About the Author: Satyam Tyagi is the Senior Director of Product Management at ColorTokens. He is an industry thought leader in security and networking, responsible for significant advances in endpoint, mobile, and application security. He has been awarded four patents in application security and networking, including products sold by Cisco and Avaya. SHARE THIS ARTICLE * * * RELATED POSTS ZERO TRUST ARCHITECTURE: THE COMPLETE GUIDE Dec 21, 2021 Read Post THE COMPLETE GUIDE TO APPLICATION WHITELISTING Dec 21, 2021 Read Post 3 THINGS WE LEARNED FROM 1,283 INFOSEC LEADERS’ ZERO TRUST SECURITY PLANS Sep 29, 2021 Read Post BECOME A PARTNER Record Type First Name Last Name Company Name Company Email Job Title Website URL Phone Number Country Select Country Partner Type Partner Type GSI Reseller Distributor MSP/MSSP Message By submitting this form, you agree to ColorTokens Terms of Service and Privacy Policy THANK YOU FOR YOUR INTEREST IN THE COLORTOKENS PARTNER PROGRAM! Our team will be in touch soon with more information. KEEP IN TOUCH! Take the first step on your Zero Trust journey and subscribe to our newsletter. Sign up here to receive the latest in cybersecurity information, news, and notes in your inbox. Subscribe to Our Updates By submitting this form you agree to our Privacy Policy Thanks for subscribing to our newsletter! Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award ColorTokens Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021 Winner in 4 Categories at the 2021 Globee Awards Security Cloud / SaaS Company of the Year Xassure: New Product-Service of the Year Xprotect: Hot Security Technology of the Year Xshield: Hot Security Technology of the Year Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award ColorTokens Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021 Winner in 4 Categories at the 2021 Globee Awards Security Cloud / SaaS Company of the Year Xassure: New Product-Service of the Year Xprotect: Hot Security Technology of the Year Xshield: Hot Security Technology of the Year Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award * Copyright © 2022 * Contact Us * Cookies * Terms of Service * Privacy Policy * * * * We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.Privacy Policy PreferencesAccept All Privacy Policy Necessary Functional Analytics Performance Advertisement Others Save my preferences Privacy Policy This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience. View full details of our Privacy Policy here. Necessary Necessary cookies are crucial for the basic functions of the website and the website will not work in its intended way without them. These cookies do not store any personally identifiable data. CookieTypeDurationDescriptioncky-active-checkhttps1 dayThe cookie is set by CookieYes to check if the consent banner is active on the website.cookieyesIDhttps1 yearUnique identifier for visitors used by CookieYes with respect to the consentcky-consenthttps1 yearThe cookie is set by CookieYes to remember the user's consent to the use of cookies on the website.cookieyes-necessaryhttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Necessary' category.cookieyes-functionalhttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Functional' category.cookieyes-analyticshttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Analytics' category.cookieyes-performancehttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Performance' category.cookieyes-advertisementhttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Advertisement' category.cookieyes-otherhttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies categorized as 'Other'.__hssrchttpssessionThis cookie is set by Hubspot. According to their documentation, whenever HubSpot changes the session cookie, this cookie is also set to determine if the visitor has restarted their browser. If this cookie does not exist when HubSpot manages cookies, it is considered a new session.cky-actionhttps1 yearThis cookie is set by CookieYes and is used to remember the action taken by the user.__hsschttps30 minutesThis cookie is set by HubSpot. The purpose of the cookie is to keep track of sessions. This is used to determine if HubSpot should increment the session number and timestamps in the __hstc cookie. It contains the domain, viewCount (increments each pageView in a session), and session start timestamp.messagesUtkhttps1 year 24 daysThis cookie is set by hubspot. This cookie is used to recognize the user who have chatted using the messages tool. This cookies is stored if the user leaves before they are added as a contact. If the returning user visits again with this cookie on the browser, the chat history with the user will be loaded.JSESSIONIDhttpssessionUsed by sites written in JSP. General purpose platform session cookies that are used to maintain users' state across page requests. Functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. CookieTypeDurationDescriptionlanghttpssessionThis cookie is used to store the language preferences of a user to serve up content in that stored language the next time user visit the website.bcookiehttps2 yearsThis cookie is set by linkedIn. The purpose of the cookie is to enable LinkedIn functionalities on the page.lidchttps1 dayThis cookie is set by LinkedIn and used for routing.__cf_bmhttps30 minutesThis cookie, set by Cloudflare, is used to support Cloudflare Bot Management. Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. CookieTypeDurationDescription_gcl_auhttps3 monthsThis cookie is used by Google Analytics to understand user interaction with the website._gahttps2 yearsThis cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors._gidhttps1 dayThis cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visted in an anonymous form._hjFirstSeenhttps30 minutesThis is set by Hotjar to identify a new user’s first session. It stores a true/false value, indicating whether this was the first time Hotjar saw this user. It is used by Recording filters to identify new user sessions._gat_UA-119330793-1https1 minuteThis is a pattern type cookie set by Google Analytics, where the pattern element on the name contains the unique identity number of the account or website it relates to. It appears to be a variation of the _gat cookie which is used to limit the amount of data recorded by Google on high traffic volume websites._hjIncludedInPageviewSamplehttps2 minutesNo description available._hjAbsoluteSessionInProgresshttps30 minutesNo description available.__hstchttps1 year 24 daysThis cookie is set by Hubspot and is used for tracking visitors. It contains the domain, utk, initial timestamp (first visit), last timestamp (last visit), current timestamp (this visit), and session number (increments for each subsequent session).hubspotutkhttps1 year 24 daysThis cookie is used by HubSpot to keep track of the visitors to the website. This cookie is passed to Hubspot on form submission and used when deduplicating contacts.CONSENThttps16 years 2 months 26 days 8 hours 27 minutesYouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data._hjIncludedInSessionSamplehttps2 minutesHotjar sets this cookie to know whether a user is included in the data sampling defined by the site's daily session limit. Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. CookieTypeDurationDescription_gaexphttps2 months 19 days 7 hours 14 minutesGoogle Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. Advertisement Advertisement cookies are used to deliver visitors with customized advertisements based on the pages they visited before and analyze the effectiveness of the ad campaign. CookieTypeDurationDescriptiontest_cookiehttps15 minutesThis cookie is set by doubleclick.net. The purpose of the cookie is to determine if the user's browser supports cookies.bscookiehttps2 yearsThis cookie is a browser ID cookie set by Linked share Buttons and ad tags. mchttps1 year 1 monthQuantserve sets the mc cookie to anonymously track user behaviour on the website.__qcahttps1 year 26 daysThe __qca cookie is associated with Quantcast. This anonymous data helps us to better understand users' needs and customize the website accordingly. YSChttpssessionYSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.VISITOR_INFO1_LIVEhttps5 months 27 daysA cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.IDEhttps1 year 24 daysGoogle DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. CookieTypeDurationDescriptionTS01fac3f6httpssessionNo description available.UserMatchHistoryhttps1 monthLinkedin - Used to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences.AnalyticsSyncHistoryhttp1 monthNo descriptionli_gchttp2 yearsNo description_dlthttp1 dayNo description_hjSessionUser_2804925http1 yearNo description_hjSession_2804925http30 minutesNo descriptionloglevelhttpsneverNo description available.cf_chl_seq_d7ff5d942a7cddahttpssessionNo descriptioncf_chl_2http1 hourNo descriptioncf_chl_proghttps1 hourNo description available.cf_chl_seq_3aee89f02468189httpssessionNo descriptioncf_chl_seq_394906aa066b2a7httpssessionNo descriptioncf_chl_seq_4b7ab1e44c4140bhttpssessionNo descriptioncf_chl_seq_486323f96153ff7httpssessionNo descriptioncf_chl_seq_3e839749a8ad213httpssessionNo descriptioncf_chl_seq_25c2e9a47a3d092httpssessionNo description Powered by CookieYes