colortokens.com
Open in
urlscan Pro
2606:4700::6812:1927
Public Scan
Submitted URL: https://cffzg04.na1.hubspotlinks.com/Ctc/DL+113/cFFzg04/VWZMfT5Bkg6GW1lsC3-57q1DJW6fpr4J4HPS4MN67vcp33lScmV1-WJV7CgKMDW2DYH6X2p85VHN8...
Effective URL: https://colortokens.com/blog/why-enterprises-need-zero-trust-security/?utm_medium=email&_hsmi=148128520&_hsenc=p2ANqtz-_...
Submission: On April 13 via api from SE — Scanned from DE
Effective URL: https://colortokens.com/blog/why-enterprises-need-zero-trust-security/?utm_medium=email&_hsmi=148128520&_hsenc=p2ANqtz-_...
Submission: On April 13 via api from SE — Scanned from DE
Form analysis
3 forms found in the DOM<form id="ct-hubspot-form-partner-Registration-popup-with-jquery-validation" class="bgfix" novalidate="novalidate">
<input type="hidden" name="hform_id" id="hform_id" value="8fee3cc2-f26f-4f91-92cc-62ea7d1b97e7">
<input type="hidden" name="form_name" id="form_name" value="partnerRegistration">
<input type="hidden" name="srcdetailtxt" id="srcdetailtxt" value="N/A">
<select id="srcdetailid" class="d-none">
<option selected="" value="Partnership request"></option>
</select>
<div class="forLoaderIcon formLoader subscribeloader">
<img alt="form loader" data-src="https://colortokens.com/wp-content/uploads/oval.svg" class="lazyload" src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw=="><noscript><img
src="https://colortokens.com/wp-content/uploads/oval.svg" alt="form loader"></noscript>
</div>
<select hidden="" name="record_type" id="record_type">
<option value="0127F000000NWDmQAO" selected="">Record Type</option>
</select>
<div class="row">
<div class="col-sm-6">
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="fullName"> First Name</label>
<input type="text" id="firstname" name="firstname" required="" class="input-box mb-0 p-0 ">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="lastname">Last Name</label>
<input type="text" id="lastname" name="lastname" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="company">Company Name</label>
<input type="text" id="company" name="company" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="email">Company Email</label>
<input id="email" name="email" type="text" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="jobtitle">Job Title</label>
<input type="text" id="jobtitle" name="jobtitle" required="" class="input-box mb-0 p-0">
</div>
</div>
</div>
<div class="col-sm-6">
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="website">Website URL</label>
<input type="text" id="website" name="website" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40">
<label class="form-label" for="phone">Phone Number</label>
<input type="text" id="phone" name="phone" required="" class="input-box mb-0 p-0">
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40 focused">
<label class="form-label" for="partnersCountry">Country</label>
<select id="partnersCountry" name="country" required="" class="w-100 input-box form-control p-0">
<option value="" class="select-country">Select Country</option>
</select>
</div>
</div>
<div class="col-sm-12">
<div class="form-group mb-40 focused">
<label class="form-label d-none" for="partner_type">Partner Type</label>
<select id="partner_type" name="partner_type" class="form-control w-100 p-0 input-select">
<option value=""> Partner Type</option>
<option value="GSI">GSI</option>
<option value="Reseller">Reseller</option>
<option value="Distributor">Distributor</option>
<option value="MSP/MSSP">MSP/MSSP</option>
</select>
</div>
</div>
<div class="col-sm-12">
<div class="form-group">
<label class="form-label" for="comments">Message</label>
<input type="text" id="comments" name="comments" class="p-0 input-box">
</div>
</div>
</div>
<div class="col-sm-12">
<div class="form-group mt-4 mb-3 text-center">
<input type="submit" name="submit" id="submit" class="rectangle-small-btn p-0 mb-0 mx-auto text-white text-uppercase" value="SUBMIT">
</div>
<p class="terms m-0">By submitting this form, you agree to ColorTokens <br> <a href="/terms-of-service/" target="_blank" class="text-red font-weight-normal">Terms of Service</a> and
<a href="/privacy-policy/partnerportal/" target="_blank" class="text-red font-weight-normal">Privacy Policy</a> </p>
</div>
</div>
</form>
GET https://colortokens.com/
<form class="search" method="get" action="https://colortokens.com/" role="search" autocomplete="off">
<input type="search" class="form-control d-inline shadow-none p-2" name="s" required="" placeholder="Search..." value="">
<button type="submit" role="button" class="search-icon bg-transparent border-0 px-1" id="button-search">
<svg xmlns="http://www.w3.org/2000/svg" width="30.415" height="30.415" viewBox="0 0 30.415 30.415">
<g fill="none" stroke="#fff" stroke-linejoin="round" stroke-width="2px" transform="translate(-1767.5 -33.5)">
<circle cx="9.739" cy="9.739" r="9.739" transform="translate(1768.5 34.5)"></circle>
<path stroke-linecap="round" d="M0 0L11.375 11.375" transform="translate(1785.125 51.125)"></path>
</g>
</svg>
</button>
</form>
POST
<form class="was-validate footer-subscribe-form" id="footer-subscribe-form" method="post" autocomplete="off" novalidate="novalidate">
<input type="hidden" name="hform_id" id="hform_id" value="89388638-6dbe-477b-911b-8dd3f07177d0">
<input type="hidden" name="form_name" id="form_name" value="fnewsletter">
<input type="hidden" name="srcdetailtxt" id="srcdetailtxt" value="N/A">
<select id="srcdetailid" class="d-none">
<option selected="" value="Newsletter Subscription"></option>
</select>
<div class="position-relative">
<div class="formLoader text-center">
<img loading="lazy" alt="form loader" data-src="https://colortokens.com/wp-content/uploads/oval.svg" class="lazyload" src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw=="><noscript><img loading="lazy"
src="https://colortokens.com/wp-content/uploads/oval.svg" alt="form loader"></noscript>
</div>
<input type="email" class="email-field email" required="" name="email" id="email" placeholder="Enter Your Email Address">
</div>
<button type="submit" class="ctu-button">Subscribe to Our Updates</button>
</form>
Text Content
* Search * Careers * Contact Us * Login * Products + * Solutions + * Partners + * Resources + * Company + Request Demo Live Micro-Segmentation Demo Platform * XTENDED ZEROTRUST PLATFORM Products * XSHIELD Workload visibility and segmentation * XACCESS Secure remote access * XPROTECT Endpoint and host protection * XCLOUD Comprehensive cloud workload security Quick Links * Xaccess datasheet * Xprotect datasheet * Learn about Micro-Segmentation * Zero Trust survey results * Xshield datasheet * Xshield solution brief * Security * Services * Industry Cloud * Secure Access to Cloud Workloads * Cloud Workload Protection End Point * POS and Fixed-Function Systems Protection * Endpoint Lockdown Applications * Secure Remote Access to Applications * Crown Jewels Security for Hybrid Environments Infrastructure * Ransomware Prevention * Environment Separation Quick Links * Learn about Micro-Segmentation * Learn about PCI-DSS 4.0 Solution Brief * Online Deals Marketplace Combats Ransomware ZERO TRUST AS A SERVICE * XASSURE * Breach Protection * Advanced Threat Monitoring and Incident Response * Managed Micro-Segmentation and Monitoring * Zero Trust Adoption * XQUANTIFY Assessment Solutions - Cyber Risk Quantification Quick Links * Learn about Zero Trust Security * Tailored Services for Every Need Case Study * Nishith Desai Associates Implements Proactive Cybersecurity Industry Solutions * Financial Services * Healthcare and Life Sciences * Legal and Professional Services * Retail Services * Manufacturing Technology * Critical Infrastructure Quick Links * Xshield datasheet * Xassure Platform Overview Case Study * Solutions for Healthcare Organizations * Solutions for Government Organizations Become a Partner Already a partner ? Login Program PARTNER PROGRAM OVERVIEW Designed to deliver unparalleled customer value and accelerated mutual growth by harnessing partner expertise and ColorTokens cybersecurity technology. Learn More Resources * CUSTOMER SUCCESS * WEBINARS * BLOG * RESOURCE CENTER Featured Topic * Micro-Segmentation * PCI-DSS 4.0 * Zero Trust Architecture * Application Whitelisting Contact Us * ABOUT US Keeping the world safe from cybercrime * CERTIFICATIONS AND AWARDS * NEWS AND EVENTS The latest from ColorTokens * CAREERS Request Demo Live Micro-Segmentation Demo Search... * Products + * Xtended ZeroTrustTM Platform * Xshield: Workload Visibility and Segmentation * Xaccess: Secure Remote Access * Xprotect: Endpoint and Host Protection * Xcloud: Comprehensive cloud workload security * QUICK LINKS Zero Trust survey results Xshield datasheet Xshield Solution Brief Xaccess datasheet Xprotect datasheet Learn about Micro-Segmentation * Solutions + * Security Solutions + * Secure Remote Access to Applications * Secure Access Cloud Workloads * Crown Jewels Security for Hybrid Environments * Cloud Workload Protection * Environment Separation * Endpoint Lockdown * POS and Fixed-Function Systems Protection * Ransomware Prevention * QUICK LINKS Learn about Micro-Segmentation Learn about PCI-DSS 4.0 CASE STUDY Online Deals Marketplace Combats Ransomware * Progressive Zero Trust as a Service + * Xassure: Service Overview * Breach Protection * Advanced Threat Monitoring and Incident Response * Managed Micro-Segmentation and Monitoring * Zero Trust Adoption * QUICK LINKS Learn about Zero Trust Security Explore Xassure Service Packs CASE STUDY Nishith Desai Associates Implements Proactive Cybersecurity * Assessment Solutions + * Cyber Risk Quantification: Xquantify * Industry Solutions + * Financial Services * Retail * Healthcare and Life Sciences * Legal and Professional Services * Manufacturing Technology * Critical Infrastructure * QUICK LINKS Xshield datasheet Xassure Service Overview SOLUTION BRIEF Solutions for Healthcare Organizations Solutions for Government Organizations * Partners + * Partner Portal Login * ColorTokens Partner Program Overview * Resources + * Featured Topics + * Micro-Segmentation * PCI-DSS 4.0 * Zero Trust Architecture * Application Whitelisting * Customer success * Blog * Webinars * Resource Center * QUICK LINKS Case Studies Solution Briefs Technical Briefs * Company + * About ColorTokens * Certifications and Awards * Privacy Policy * Careers * News and Events * Contact Us * Platform login * Request A Demo Blog 10 REASONS WHY ENTERPRISES NEED ZERO TRUST SECURITY Author Satyam Tyagi Read Time 8 Minutes Last Updated Dec 13, 2021 Security Zero Trust Architecture As a product manager, I frequently talk about pressing cybersecurity needs with infosec leaders from around the world. And they all want to hear about why enterprises need zero trust security. This interest — and demand — is increasing. I’ve often explained why a zero trust architecture is the right cybersecurity solution for enterprise security now and in the foreseeable future. Here are the top 10 reasons why security leaders must implement zero trust strategy to improve the security postures of their organizations. THE TOP 10 REASONS WHY ENTERPRISES NEED ZERO TRUST STRATEGY 1. Perimeter-Based Security is Ineffective in the Evolving Enterprise 2. Cloud Data Centers Require Shared Security Responsibility 3. Third-Party SaaS and PaaS Applications Can’t Be Trusted Blindly 4. The Internet Network is an Unsecured Network 5. Everyone in the Expanding Workforce Shouldn’t Have All-Access 6. You Cannot Verify the Security Status of All WFH Environments 7. BYOD is Not as Secure as Work Devices 8. Cyberattacks Are Increasing 9. Advanced Persistent Threats (APTs) Are Becoming More Sophisticated 10. The Security Stakes Are Higher 1. PERIMETER-BASED SECURITY IS INEFFECTIVE IN THE EVOLVING ENTERPRISE The way enterprises conduct business and use digital technologies is evolving constantly — and at an ever-quickening pace. These digital transformations are making traditional perimeter-based cybersecurity models ineffective and irrelevant because perimeters no longer define the scope of security enforcement. Only zero trust security takes a micro-level approach to authenticating and approving access requests at every point within a network. The concept of least privilege means that nobody gets unrestricted access to the entire system. Instead, each request needs to be continuously monitored and verified to gain access to different parts of the network. If a breach does occur, micro-segmentation will prevent East-West movement and minimize the damage that could be caused by a threat actor. 2. CLOUD DATA CENTERS REQUIRE SHARED SECURITY RESPONSIBILITY Critical applications and workloads are moving from corporate-owned data centers to the public or hybrid cloud. Now, security leaders need to reconsider the legacy assumptions of trust around people and data center security tools, technologies, processes, and skills. This new cloud environment requires a shared responsibility model, where certain security aspects are provided by the cloud vendor and others fall on the enterprise. The underlying assumption of trust in the infrastructure is no longer the same. A zero trust model can span this shared cybersecurity responsibility. 3. THIRD-PARTY SAAS AND PAAS APPLICATIONS CAN’T BE TRUSTED BLINDLY Applications now are more likely to be offered as Software-as-a-Service (SaaS) or even Platform-as-a-Service (PaaS). Software OEMs develop applications by consuming readily available services — for authentication, logging, database, machine learning, etc. They own the core logic and business logic, but have little ownership of the software components used to build the applications. That means application developers can no longer blindly trust their “own” applications. In the zero trust approach, security controls are deployed with the assumption that the network is already compromised. No unauthorized processes or applications are allowed to execute and authentication is required for access to data. 4. THE INTERNET NETWORK IS AN UNSECURED NETWORK Applications and workloads have moved to the cloud, and users access them remotely. This means that the network is no longer a secured enterprise network. Instead, it is unsecured Internet. The network perimeter security and visibility solutions employed by most businesses to keep attackers out are no longer practical or robust enough. The concept of implicit trust is no longer effective. Zero trust employs least-privilege and “always-verify” principles, offering complete visibility within the network, whether in data centers or the cloud. 5. EVERYONE IN THE EXPANDING WORKFORCE SHOULDN’T HAVE ALL-ACCESS The way enterprises conduct their critical business and the people they rely on to perform key functions have changed. Network users are no longer just employees and customers. Many users who access a business’s applications and infrastructure could be vendors servicing a system, suppliers, or partners. None of these non-employees need, or should have, access to all applications, infrastructure, or business data. Even employees perform specialized functions and therefore do not need complete network access. A well-executed zero trust strategy allows authenticated access based on key dimensions of trust. This enables businesses to more precisely control access, even to those with elevated privileges. Download The Definitive Guide To Zero Trust Security Read More 6. YOU CANNOT VERIFY THE SECURITY STATUS OF ALL WFH ENVIRONMENTS In the pre-COVID era, remote work was not uncommon. However, now that WFH has become the new normal after the pandemic, security technologies and processes based purely on established geographic locations — such as a company’s headquarters — are no longer relevant. With a remote workforce, the possibility of unsecured Wi-Fi networks and devices increases security risks exponentially. Businesses must assume their employees’ work-from-home setups and environments are not as secure as the office. Their Wi-Fi router isn’t configured for WPA-2. Their IoT devices, like the baby monitor or the smart thermostat, are running a hodge-podge of security protocols, if any at all. Without an overarching system like a zero trust framework, whether or not employees are working in a secure environment can no longer be verified — or controlled. 7. BYOD IS NOT AS SECURE AS WORK DEVICES Under the WFH new normal, the devices that workers use are less likely to be ones assigned by the employer. Employer-owned laptops and phones are traditionally managed, patched, and kept up to date with security tools and policies. However, with everyone working remotely, employees may forget the basic cyber hygiene skills and start to use their own devices to access work networks or apps. Or, they could be using their work laptops to shop online between Zoom calls. Even if zero trust security can’t force employees working at home to use work devices only for work, it can control the potential for a security breach because of the fundamental “trust nobody; verify everything” rule that enforces access controls at every point within the network. 8. CYBERATTACKS ARE INCREASING Cyberattacks continue to proliferate every year, and no sector seems to be immune. During COVID-19, hackers focused on the healthcare and retail verticals for pandemic-related reasons. Over-burdened hospitals struggling with an onslaught of patients and pharmaceutical research labs racing to develop a vaccine have been ideal targets for cyberattacks. The stakes are so high that they are willing to pay vast ransoms to ensure business continuity. Cybercriminals have targeted online retailers benefiting from increased e-commerce demands during shelter-in-place. They’ve also attacked financial institutions and even transportation service providers. With zero trust architecture in place, these businesses could build a better security posture and become cyber resilient. Then they will be less vulnerable to security breaches and would be better equipped to contain and mitigate financial or reputational damage. 9. ADVANCED PERSISTENT THREATS (APTS) ARE BECOMING MORE SOPHISTICATED In the early 2000s, cybercriminals would launch cyberattacks simply to expose the security vulnerabilities of well-known websites. But today cyberattacks are big business. The potential financial gains from deploying ransomware or stealing intellectual property are high. To maximize their earnings, hackers and the tools and tactics they use are becoming more advanced. Today’s cyberthreats are no longer simple phishing scams, although those still exist. These contemporary cyberattacks could have national, societal, physical, and financial repercussions. Cybercrime is now highly organized and is perpetrated by nation-states, international crime rings, and ransomware groups. These bad actors are sophisticated enough to easily bypass traditional perimeter security. They deploy APTs and stealthily move about until they accomplish their goal of stealing information or disrupting systems that have not implemented micro-segmentation or a zero trust model. 10. THE SECURITY STAKES ARE HIGHER Instead of deploying DDoS attacks to disrupt businesses, cybercriminals are starting to play an almost elegant long game. Cyberattacks have evolved to target user data, customer data, financial data, and core business knowledge, such as IP and proprietary functions — essentially anything that could be valuable. Core government systems, weapons, nuclear power plants, and even elections are at risk. Because the stakes are so high, at every level of society and government, robust and resilient cybersecurity strategies are of paramount importance. Whether implemented by a multinational enterprise or a government agency, the zero trust framework will improve cybersecurity posture and increase cyber resilience, enabling containment in the unlikely event of a breach. ZERO TRUST: THE SOLUTION TO ENTERPRISE SECURITY CHALLENGES The future of cybersecurity is here, right now. And it is the zero trust security model. The perimeter-based, reactive methods that acted as the foundation of old, traditional security need to become relics of the past. Businesses and governments must be proactive and adopt zero trust now to confidently provide a cyber-secure future to their customers, partners, employees, and citizens. It’s time to make security a priority to protect, detect, and mitigate modern-day threats. Only this new-gen zero trust security framework offers network visibility and constant monitoring that allows trust to be dynamic and context-based, by verifying every access request and authorizing access only if certain parameters are met. The ColorTokens Xtended ZeroTrustTM Platform is a cloud-delivered, software-defined platform that secures critical assets, including applications, endpoints, and workloads. The platform both simplifies and accelerates the enterprise journey to hybrid environments and full cloud adoption. Read more about it here. To hear from your peers about their experiences with Zero Trust security, explore our survey of 1,283 InfoSec leaders. About the Author: Satyam Tyagi is the Senior Director of Product Management at ColorTokens. He is an industry thought leader in security and networking, and is responsible for significant advances in endpoint, mobile, and application security. He has been awarded four patents in application security and networking, including products sold by Cisco and Avaya. SHARE THIS ARTICLE * * * RELATED POSTS ZERO TRUST ARCHITECTURE: THE COMPLETE GUIDE Dec 21, 2021 Read Post THE COMPLETE GUIDE TO APPLICATION WHITELISTING Dec 21, 2021 Read Post LOG4SHELL: HOW TO DETECT, MITIGATE AND OVERCOME ZERO-DAY VULNERABILITIES Dec 20, 2021 Read Post BECOME A PARTNER Record Type First Name Last Name Company Name Company Email Job Title Website URL Phone Number Country Select Country Partner Type Partner Type GSI Reseller Distributor MSP/MSSP Message By submitting this form, you agree to ColorTokens Terms of Service and Privacy Policy THANK YOU FOR YOUR INTEREST IN THE COLORTOKENS PARTNER PROGRAM! Our team will be in touch soon with more information. KEEP IN TOUCH! Take the first step on your Zero Trust journey and subscribe to our newsletter. Sign up here to receive the latest in cybersecurity information, news, and notes in your inbox. Subscribe to Our Updates By submitting this form you agree to our Privacy Policy Thanks for subscribing to our newsletter! Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award ColorTokens Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021 Winner in 4 Categories at the 2021 Globee Awards Security Cloud / SaaS Company of the Year Xassure: New Product-Service of the Year Xprotect: Hot Security Technology of the Year Xshield: Hot Security Technology of the Year Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award ColorTokens Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021 Winner in 4 Categories at the 2021 Globee Awards Security Cloud / SaaS Company of the Year Xassure: New Product-Service of the Year Xprotect: Hot Security Technology of the Year Xshield: Hot Security Technology of the Year Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award Winner in 5 Categories at the 2020 Cyber Excellence Awards Micro-Segmentation Award Zero Trust Security Award Cloud Security Award Endpoint Security Award Application Security Award * Copyright © 2022 * Contact Us * Cookies * Terms of Service * Privacy Policy * * * * We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.Privacy Policy PreferencesAccept All Privacy Policy Necessary Functional Analytics Performance Advertisement Others Save my preferences Privacy Policy This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience. View full details of our Privacy Policy here. Necessary Necessary cookies are crucial for the basic functions of the website and the website will not work in its intended way without them. These cookies do not store any personally identifiable data. CookieTypeDurationDescriptioncky-active-checkhttps1 dayThe cookie is set by CookieYes to check if the consent banner is active on the website.cookieyesIDhttps1 yearUnique identifier for visitors used by CookieYes with respect to the consentcky-consenthttps1 yearThe cookie is set by CookieYes to remember the user's consent to the use of cookies on the website.cookieyes-necessaryhttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Necessary' category.cookieyes-functionalhttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Functional' category.cookieyes-analyticshttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Analytics' category.cookieyes-performancehttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Performance' category.cookieyes-advertisementhttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies in the 'Advertisement' category.cookieyes-otherhttps1 yearThis cookie is set by CookieYes and is used to remember the consent of the users for the use of cookies categorized as 'Other'.__hssrchttpssessionThis cookie is set by Hubspot. According to their documentation, whenever HubSpot changes the session cookie, this cookie is also set to determine if the visitor has restarted their browser. If this cookie does not exist when HubSpot manages cookies, it is considered a new session.cky-actionhttps1 yearThis cookie is set by CookieYes and is used to remember the action taken by the user.__hsschttps30 minutesThis cookie is set by HubSpot. The purpose of the cookie is to keep track of sessions. This is used to determine if HubSpot should increment the session number and timestamps in the __hstc cookie. It contains the domain, viewCount (increments each pageView in a session), and session start timestamp.messagesUtkhttps1 year 24 daysThis cookie is set by hubspot. This cookie is used to recognize the user who have chatted using the messages tool. This cookies is stored if the user leaves before they are added as a contact. If the returning user visits again with this cookie on the browser, the chat history with the user will be loaded.JSESSIONIDhttpssessionUsed by sites written in JSP. General purpose platform session cookies that are used to maintain users' state across page requests. Functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. CookieTypeDurationDescriptionlanghttpssessionThis cookie is used to store the language preferences of a user to serve up content in that stored language the next time user visit the website.bcookiehttps2 yearsThis cookie is set by linkedIn. The purpose of the cookie is to enable LinkedIn functionalities on the page.lidchttps1 dayThis cookie is set by LinkedIn and used for routing.__cf_bmhttps30 minutesThis cookie, set by Cloudflare, is used to support Cloudflare Bot Management. Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. CookieTypeDurationDescription_gcl_auhttps3 monthsThis cookie is used by Google Analytics to understand user interaction with the website._gahttps2 yearsThis cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors._gidhttps1 dayThis cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visted in an anonymous form._hjFirstSeenhttps30 minutesThis is set by Hotjar to identify a new user’s first session. It stores a true/false value, indicating whether this was the first time Hotjar saw this user. It is used by Recording filters to identify new user sessions._gat_UA-119330793-1https1 minuteThis is a pattern type cookie set by Google Analytics, where the pattern element on the name contains the unique identity number of the account or website it relates to. It appears to be a variation of the _gat cookie which is used to limit the amount of data recorded by Google on high traffic volume websites._hjIncludedInPageviewSamplehttps2 minutesNo description available._hjAbsoluteSessionInProgresshttps30 minutesNo description available.__hstchttps1 year 24 daysThis cookie is set by Hubspot and is used for tracking visitors. It contains the domain, utk, initial timestamp (first visit), last timestamp (last visit), current timestamp (this visit), and session number (increments for each subsequent session).hubspotutkhttps1 year 24 daysThis cookie is used by HubSpot to keep track of the visitors to the website. This cookie is passed to Hubspot on form submission and used when deduplicating contacts.CONSENThttps16 years 2 months 26 days 8 hours 27 minutesYouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data._hjIncludedInSessionSamplehttps2 minutesHotjar sets this cookie to know whether a user is included in the data sampling defined by the site's daily session limit. Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. CookieTypeDurationDescription_gaexphttps2 months 19 days 7 hours 14 minutesGoogle Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. Advertisement Advertisement cookies are used to deliver visitors with customized advertisements based on the pages they visited before and analyze the effectiveness of the ad campaign. CookieTypeDurationDescriptiontest_cookiehttps15 minutesThis cookie is set by doubleclick.net. The purpose of the cookie is to determine if the user's browser supports cookies.bscookiehttps2 yearsThis cookie is a browser ID cookie set by Linked share Buttons and ad tags. mchttps1 year 1 monthQuantserve sets the mc cookie to anonymously track user behaviour on the website.__qcahttps1 year 26 daysThe __qca cookie is associated with Quantcast. This anonymous data helps us to better understand users' needs and customize the website accordingly. YSChttpssessionYSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.VISITOR_INFO1_LIVEhttps5 months 27 daysA cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.IDEhttps1 year 24 daysGoogle DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. CookieTypeDurationDescriptionTS01fac3f6httpssessionNo description available.UserMatchHistoryhttps1 monthLinkedin - Used to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences.AnalyticsSyncHistoryhttp1 monthNo descriptionli_gchttp2 yearsNo description_dlthttp1 dayNo description_hjSessionUser_2804925http1 yearNo description_hjSession_2804925http30 minutesNo descriptionloglevelhttpsneverNo description available.cf_chl_seq_d7ff5d942a7cddahttpssessionNo descriptioncf_chl_2http1 hourNo descriptioncf_chl_proghttps1 hourNo description available.cf_chl_seq_3aee89f02468189httpssessionNo descriptioncf_chl_seq_394906aa066b2a7httpssessionNo descriptioncf_chl_seq_4b7ab1e44c4140bhttpssessionNo descriptioncf_chl_seq_486323f96153ff7httpssessionNo descriptioncf_chl_seq_3e839749a8ad213httpssessionNo descriptioncf_chl_seq_25c2e9a47a3d092httpssessionNo description Powered by CookieYes