colortokens.com Open in urlscan Pro
2606:4700::6812:1927  Public Scan

Submitted URL: https://cffzg04.na1.hubspotlinks.com/Ctc/DL+113/cFFzg04/VWZMfT5Bkg6GW1lsC3-57q1DJW6fpr4J4HPS4MN67vcp33lScmV1-WJV7CgKMDW2DYH6X2p85VHN8...
Effective URL: https://colortokens.com/blog/why-enterprises-need-zero-trust-security/?utm_medium=email&_hsmi=148128520&_hsenc=p2ANqtz-_...
Submission: On April 13 via api from SE — Scanned from DE

Form analysis 3 forms found in the DOM

<form id="ct-hubspot-form-partner-Registration-popup-with-jquery-validation" class="bgfix" novalidate="novalidate">
  <input type="hidden" name="hform_id" id="hform_id" value="8fee3cc2-f26f-4f91-92cc-62ea7d1b97e7">
  <input type="hidden" name="form_name" id="form_name" value="partnerRegistration">
  <input type="hidden" name="srcdetailtxt" id="srcdetailtxt" value="N/A">
  <select id="srcdetailid" class="d-none">
    <option selected="" value="Partnership request"></option>
  </select>
  <div class="forLoaderIcon formLoader subscribeloader">
    <img alt="form loader" data-src="https://colortokens.com/wp-content/uploads/oval.svg" class="lazyload" src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw=="><noscript><img
        src="https://colortokens.com/wp-content/uploads/oval.svg" alt="form loader"></noscript>
  </div>
  <select hidden="" name="record_type" id="record_type">
    <option value="0127F000000NWDmQAO" selected="">Record Type</option>
  </select>
  <div class="row">
    <div class="col-sm-6">
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="fullName"> First Name</label>
          <input type="text" id="firstname" name="firstname" required="" class="input-box mb-0 p-0 ">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="lastname">Last Name</label>
          <input type="text" id="lastname" name="lastname" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="company">Company Name</label>
          <input type="text" id="company" name="company" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="email">Company Email</label>
          <input id="email" name="email" type="text" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="jobtitle">Job Title</label>
          <input type="text" id="jobtitle" name="jobtitle" required="" class="input-box mb-0 p-0">
        </div>
      </div>
    </div>
    <div class="col-sm-6">
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="website">Website URL</label>
          <input type="text" id="website" name="website" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="phone">Phone Number</label>
          <input type="text" id="phone" name="phone" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40 focused">
          <label class="form-label" for="partnersCountry">Country</label>
          <select id="partnersCountry" name="country" required="" class="w-100 input-box form-control p-0">
            <option value="" class="select-country">Select Country</option>
          </select>
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40 focused">
          <label class="form-label d-none" for="partner_type">Partner Type</label>
          <select id="partner_type" name="partner_type" class="form-control w-100 p-0 input-select">
            <option value=""> Partner Type</option>
            <option value="GSI">GSI</option>
            <option value="Reseller">Reseller</option>
            <option value="Distributor">Distributor</option>
            <option value="MSP/MSSP">MSP/MSSP</option>
          </select>
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group">
          <label class="form-label" for="comments">Message</label>
          <input type="text" id="comments" name="comments" class="p-0 input-box">
        </div>
      </div>
    </div>
    <div class="col-sm-12">
      <div class="form-group mt-4 mb-3 text-center">
        <input type="submit" name="submit" id="submit" class="rectangle-small-btn p-0 mb-0 mx-auto text-white text-uppercase" value="SUBMIT">
      </div>
      <p class="terms m-0">By submitting this form, you agree to ColorTokens <br> <a href="/terms-of-service/" target="_blank" class="text-red font-weight-normal">Terms of Service</a> and
        <a href="/privacy-policy/partnerportal/" target="_blank" class="text-red font-weight-normal">Privacy Policy</a> </p>
    </div>
  </div>
</form>

GET https://colortokens.com/

<form class="search" method="get" action="https://colortokens.com/" role="search" autocomplete="off">
  <input type="search" class="form-control d-inline shadow-none p-2" name="s" required="" placeholder="Search..." value="">
  <button type="submit" role="button" class="search-icon bg-transparent border-0 px-1" id="button-search">
    <svg xmlns="http://www.w3.org/2000/svg" width="30.415" height="30.415" viewBox="0 0 30.415 30.415">
      <g fill="none" stroke="#fff" stroke-linejoin="round" stroke-width="2px" transform="translate(-1767.5 -33.5)">
        <circle cx="9.739" cy="9.739" r="9.739" transform="translate(1768.5 34.5)"></circle>
        <path stroke-linecap="round" d="M0 0L11.375 11.375" transform="translate(1785.125 51.125)"></path>
      </g>
    </svg>
  </button>
</form>

POST

<form class="was-validate footer-subscribe-form" id="footer-subscribe-form" method="post" autocomplete="off" novalidate="novalidate">
  <input type="hidden" name="hform_id" id="hform_id" value="89388638-6dbe-477b-911b-8dd3f07177d0">
  <input type="hidden" name="form_name" id="form_name" value="fnewsletter">
  <input type="hidden" name="srcdetailtxt" id="srcdetailtxt" value="N/A">
  <select id="srcdetailid" class="d-none">
    <option selected="" value="Newsletter Subscription"></option>
  </select>
  <div class="position-relative">
    <div class="formLoader text-center">
      <img loading="lazy" alt="form loader" data-src="https://colortokens.com/wp-content/uploads/oval.svg" class="lazyload" src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw=="><noscript><img loading="lazy"
          src="https://colortokens.com/wp-content/uploads/oval.svg" alt="form loader"></noscript>
    </div>
    <input type="email" class="email-field email" required="" name="email" id="email" placeholder="Enter Your Email Address">
  </div>
  <button type="submit" class="ctu-button">Subscribe to Our Updates</button>
</form>

Text Content

 * Search
 * Careers
 * Contact Us
 * Login

 * Products +
 * Solutions +
 * Partners +
 * Resources +
 * Company +

Request Demo Live Micro-Segmentation Demo

Platform


 * XTENDED ZEROTRUST
   PLATFORM

Products


 * XSHIELD
   
   Workload visibility and segmentation


 * XACCESS
   
   Secure remote access

 


 * XPROTECT
   
   Endpoint and host protection


 * XCLOUD
   
   Comprehensive cloud workload security

 

Quick Links

 * Xaccess datasheet
 * Xprotect datasheet
 * Learn about Micro-Segmentation

 

 * Zero Trust survey results
 * Xshield datasheet
 * Xshield solution brief

 * Security
 * Services
 * Industry

Cloud

 * Secure Access to Cloud Workloads
 * Cloud Workload Protection

End Point

 * POS and Fixed-Function Systems Protection
 * Endpoint Lockdown

Applications

 * Secure Remote Access to Applications
 * Crown Jewels Security for Hybrid Environments

Infrastructure

 * Ransomware Prevention
 * Environment Separation

 

Quick Links

 * Learn about Micro-Segmentation
 * Learn about PCI-DSS 4.0

Solution Brief

 * Online Deals Marketplace Combats Ransomware

ZERO TRUST AS A SERVICE


 * XASSURE

 * Breach Protection
 * Advanced Threat Monitoring and Incident Response
 * Managed Micro-Segmentation and Monitoring
 * Zero Trust Adoption

 


 * XQUANTIFY
   
   Assessment Solutions - Cyber Risk Quantification

 

Quick Links

 * Learn about Zero Trust Security
 * Tailored Services for Every Need

Case Study

 * Nishith Desai Associates Implements Proactive Cybersecurity

Industry Solutions

 * Financial Services
 * Healthcare and Life Sciences
 * Legal and Professional Services

 

 * Retail Services
 * Manufacturing Technology
 * Critical Infrastructure

 

Quick Links

 * Xshield datasheet
 * Xassure Platform Overview

Case Study

 * Solutions for Healthcare Organizations
 * Solutions for Government Organizations

Become a Partner Already a partner ? Login

Program


PARTNER PROGRAM OVERVIEW

Designed to deliver unparalleled customer value and accelerated mutual growth by
harnessing partner expertise and ColorTokens cybersecurity technology.

Learn More

Resources


 * CUSTOMER SUCCESS

 


 * WEBINARS

 


 * BLOG

 


 * RESOURCE CENTER

Featured Topic

 * Micro-Segmentation
 * PCI-DSS 4.0

 

 * Zero Trust Architecture
 * Application Whitelisting

Contact Us


 * ABOUT US
   
   Keeping the world safe from cybercrime


 * CERTIFICATIONS AND AWARDS


 * NEWS AND EVENTS
   
   The latest from ColorTokens


 * CAREERS

Request Demo Live Micro-Segmentation Demo
Search...

 * Products
   +
   * Xtended ZeroTrustTM Platform
   * Xshield: Workload Visibility and Segmentation
   * Xaccess: Secure Remote Access
   * Xprotect: Endpoint and Host Protection
   * Xcloud: Comprehensive cloud workload security
   
   * QUICK LINKS
     
     Zero Trust survey results
     
     Xshield datasheet
     
     Xshield Solution Brief
     
     Xaccess datasheet
     
     Xprotect datasheet
     
     Learn about Micro-Segmentation
 * Solutions
   +
   * Security Solutions
     +
     * Secure Remote Access to Applications
     * Secure Access Cloud Workloads
     * Crown Jewels Security for Hybrid Environments
     * Cloud Workload Protection
     * Environment Separation
     * Endpoint Lockdown
     * POS and Fixed-Function Systems Protection
     * Ransomware Prevention
     
     * QUICK LINKS
       
       Learn about Micro-Segmentation
       
       Learn about PCI-DSS 4.0
       
       CASE STUDY
       
       Online Deals Marketplace Combats Ransomware
   * Progressive Zero Trust as a Service
     +
     * Xassure: Service Overview
     * Breach Protection
     * Advanced Threat Monitoring and Incident Response
     * Managed Micro-Segmentation and Monitoring
     * Zero Trust Adoption
     
     * QUICK LINKS
       
       Learn about Zero Trust Security
       
       Explore Xassure Service Packs
       
       CASE STUDY
       
       Nishith Desai Associates Implements Proactive Cybersecurity
   * Assessment Solutions
     +
     * Cyber Risk Quantification: Xquantify
   * Industry Solutions
     +
     * Financial Services
     * Retail
     * Healthcare and Life Sciences
     * Legal and Professional Services
     * Manufacturing Technology
     * Critical Infrastructure
     
     * QUICK LINKS
       
       Xshield datasheet
       
       Xassure Service Overview
       
       SOLUTION BRIEF
       
       Solutions for Healthcare Organizations
       
       Solutions for Government Organizations
 * Partners
   +
   * Partner Portal Login
   * ColorTokens Partner Program Overview
 * Resources
   +
   * Featured Topics
     +
     * Micro-Segmentation
     * PCI-DSS 4.0
     * Zero Trust Architecture
     * Application Whitelisting
   * Customer success
   * Blog
   * Webinars
   * Resource Center
   
   * QUICK LINKS
     
     Case Studies
     
     Solution Briefs
     
     Technical Briefs
 * Company
   +
   * About ColorTokens
   * Certifications and Awards
   * Privacy Policy
   * Careers
   * News and Events
 * Contact Us
 * Platform login
 * Request A Demo

Blog


10 REASONS WHY ENTERPRISES NEED ZERO TRUST SECURITY

Author

Satyam Tyagi

Read Time

8 Minutes

Last Updated

Dec 13, 2021

Security Zero Trust Architecture

As a product manager, I frequently talk about pressing cybersecurity needs with
infosec leaders from around the world. And they all want to hear about why
enterprises need zero trust security. This interest — and demand — is
increasing. I’ve often explained why a zero trust architecture is the right
cybersecurity solution for enterprise security now and in the foreseeable
future.

Here are the top 10 reasons why security leaders must implement zero trust
strategy to improve the security postures of their organizations.


THE TOP 10 REASONS WHY ENTERPRISES NEED ZERO TRUST STRATEGY

 1.  Perimeter-Based Security is Ineffective in the Evolving Enterprise
 2.  Cloud Data Centers Require Shared Security Responsibility
 3.  Third-Party SaaS and PaaS Applications Can’t Be Trusted Blindly
 4.  The Internet Network is an Unsecured Network
 5.  Everyone in the Expanding Workforce Shouldn’t Have All-Access
 6.  You Cannot Verify the Security Status of All WFH Environments
 7.  BYOD is Not as Secure as Work Devices
 8.  Cyberattacks Are Increasing
 9.  Advanced Persistent Threats (APTs) Are Becoming More Sophisticated
 10. The Security Stakes Are Higher


1. PERIMETER-BASED SECURITY IS INEFFECTIVE IN THE EVOLVING ENTERPRISE

The way enterprises conduct business and use digital technologies is evolving
constantly — and at an ever-quickening pace. These digital transformations are
making traditional perimeter-based cybersecurity models ineffective and
irrelevant because perimeters no longer define the scope of security
enforcement.

Only zero trust security takes a micro-level approach to authenticating and
approving access requests at every point within a network. The concept of least
privilege means that nobody gets unrestricted access to the entire system.
Instead, each request needs to be continuously monitored and verified to gain
access to different parts of the network. If a breach does occur,
micro-segmentation will prevent East-West movement and minimize the damage that
could be caused by a threat actor.

 


2. CLOUD DATA CENTERS REQUIRE SHARED SECURITY RESPONSIBILITY

Critical applications and workloads are moving from corporate-owned data centers
to the public or hybrid cloud. Now, security leaders need to reconsider the
legacy assumptions of trust around people and data center security tools,
technologies, processes, and skills.

This new cloud environment requires a shared responsibility model, where certain
security aspects are provided by the cloud vendor and others fall on the
enterprise. The underlying assumption of trust in the infrastructure is no
longer the same. A zero trust model can span this shared cybersecurity
responsibility.

 


3. THIRD-PARTY SAAS AND PAAS APPLICATIONS CAN’T BE TRUSTED BLINDLY

Applications now are more likely to be offered as Software-as-a-Service (SaaS)
or even Platform-as-a-Service (PaaS). Software OEMs develop applications by
consuming readily available services — for authentication, logging, database,
machine learning, etc. They own the core logic and business logic, but have
little ownership of the software components used to build the applications. That
means application developers can no longer blindly trust their “own”
applications.

In the zero trust approach, security controls are deployed with the assumption
that the network is already compromised. No unauthorized processes or
applications are allowed to execute and authentication is required for access to
data.

 


4. THE INTERNET NETWORK IS AN UNSECURED NETWORK

Applications and workloads have moved to the cloud, and users access them
remotely. This means that the network is no longer a secured enterprise network.
Instead, it is unsecured Internet. The network perimeter security and visibility
solutions employed by most businesses to keep attackers out are no longer
practical or robust enough. The concept of implicit trust is no longer
effective.

Zero trust employs least-privilege and “always-verify” principles, offering
complete visibility within the network, whether in data centers or the cloud.

 


5. EVERYONE IN THE EXPANDING WORKFORCE SHOULDN’T HAVE ALL-ACCESS

The way enterprises conduct their critical business and the people they rely on
to perform key functions have changed. Network users are no longer just
employees and customers. Many users who access a business’s applications and
infrastructure could be vendors servicing a system, suppliers, or partners.

None of these non-employees need, or should have, access to all applications,
infrastructure, or business data. Even employees perform specialized functions
and therefore do not need complete network access. A well-executed zero trust
strategy allows authenticated access based on key dimensions of trust. This
enables businesses to more precisely control access, even to those with elevated
privileges.

 

Download The Definitive Guide To Zero Trust Security Read More


6. YOU CANNOT VERIFY THE SECURITY STATUS OF ALL WFH ENVIRONMENTS

In the pre-COVID era, remote work was not uncommon. However, now that WFH has
become the new normal after the pandemic, security technologies and processes
based purely on established geographic locations — such as a company’s
headquarters — are no longer relevant. With a remote workforce, the possibility
of unsecured Wi-Fi networks and devices increases security risks exponentially.

Businesses must assume their employees’ work-from-home setups and environments
are not as secure as the office. Their Wi-Fi router isn’t configured for WPA-2.
Their IoT devices, like the baby monitor or the smart thermostat, are running a
hodge-podge of security protocols, if any at all. Without an overarching system
like a zero trust framework, whether or not employees are working in a secure
environment can no longer be verified — or controlled.

 


7. BYOD IS NOT AS SECURE AS WORK DEVICES

Under the WFH new normal, the devices that workers use are less likely to be
ones assigned by the employer. Employer-owned laptops and phones are
traditionally managed, patched, and kept up to date with security tools and
policies. However, with everyone working remotely, employees may forget the
basic cyber hygiene skills and start to use their own devices to access work
networks or apps. Or, they could be using their work laptops to shop online
between Zoom calls.

Even if zero trust security can’t force employees working at home to use work
devices only for work, it can control the potential for a security breach
because of the fundamental “trust nobody; verify everything” rule that enforces
access controls at every point within the network.

 


8. CYBERATTACKS ARE INCREASING

Cyberattacks continue to proliferate every year, and no sector seems to be
immune. During COVID-19, hackers focused on the healthcare and retail verticals
for pandemic-related reasons. Over-burdened hospitals struggling with an
onslaught of patients and pharmaceutical research labs racing to develop a
vaccine have been ideal targets for cyberattacks. The stakes are so high that
they are willing to pay vast ransoms to ensure business continuity.
Cybercriminals have targeted online retailers benefiting from increased
e-commerce demands during shelter-in-place. They’ve also attacked financial
institutions and even transportation service providers.

With zero trust architecture in place, these businesses could build a better
security posture and become cyber resilient. Then they will be less vulnerable
to security breaches and would be better equipped to contain and mitigate
financial or reputational damage.

 


9. ADVANCED PERSISTENT THREATS (APTS) ARE BECOMING MORE SOPHISTICATED

In the early 2000s, cybercriminals would launch cyberattacks simply to expose
the security vulnerabilities of well-known websites. But today cyberattacks are
big business. The potential financial gains from deploying ransomware or
stealing intellectual property are high. To maximize their earnings, hackers and
the tools and tactics they use are becoming more advanced. Today’s cyberthreats
are no longer simple phishing scams, although those still exist. These
contemporary cyberattacks could have national, societal, physical, and financial
repercussions.

Cybercrime is now highly organized and is perpetrated by nation-states,
international crime rings, and ransomware groups. These bad actors are
sophisticated enough to easily bypass traditional perimeter security. They
deploy APTs and stealthily move about until they accomplish their goal of
stealing information or disrupting systems that have not implemented
micro-segmentation or a zero trust model.

 


10. THE SECURITY STAKES ARE HIGHER

Instead of deploying DDoS attacks to disrupt businesses, cybercriminals are
starting to play an almost elegant long game. Cyberattacks have evolved to
target user data, customer data, financial data, and core business knowledge,
such as IP and proprietary functions — essentially anything that could be
valuable. Core government systems, weapons, nuclear power plants, and even
elections are at risk. Because the stakes are so high, at every level of society
and government, robust and resilient cybersecurity strategies are of paramount
importance.

Whether implemented by a multinational enterprise or a government agency, the
zero trust framework will improve cybersecurity posture and increase cyber
resilience, enabling containment in the unlikely event of a breach.

 


ZERO TRUST: THE SOLUTION TO ENTERPRISE SECURITY CHALLENGES

The future of cybersecurity is here, right now. And it is the zero trust
security model. The perimeter-based, reactive methods that acted as the
foundation of old, traditional security need to become relics of the past.
Businesses and governments must be proactive and adopt zero trust now to
confidently provide a cyber-secure future to their customers, partners,
employees, and citizens.

It’s time to make security a priority to protect, detect, and mitigate
modern-day threats. Only this new-gen zero trust security framework offers
network visibility and constant monitoring that allows trust to be dynamic and
context-based, by verifying every access request and authorizing access only if
certain parameters are met.

The ColorTokens Xtended ZeroTrustTM Platform is a cloud-delivered,
software-defined platform that secures critical assets, including applications,
endpoints, and workloads. The platform both simplifies and accelerates the
enterprise journey to hybrid environments and full cloud adoption. Read more
about it here.

To hear from your peers about their experiences with Zero Trust security,
explore our survey of 1,283 InfoSec leaders.

About the Author: Satyam Tyagi is the Senior Director of Product Management at
ColorTokens. He is an industry thought leader in security and networking, and is
responsible for significant advances in endpoint, mobile, and application
security. He has been awarded four patents in application security and
networking, including products sold by Cisco and Avaya.


SHARE THIS ARTICLE

 * 
 * 
 * 


RELATED POSTS


ZERO TRUST ARCHITECTURE: THE COMPLETE GUIDE

Dec 21, 2021
Read Post


THE COMPLETE GUIDE TO APPLICATION WHITELISTING

Dec 21, 2021
Read Post


LOG4SHELL: HOW TO DETECT, MITIGATE AND OVERCOME ZERO-DAY VULNERABILITIES

Dec 20, 2021
Read Post


BECOME A PARTNER


Record Type
First Name
Last Name
Company Name
Company Email
Job Title
Website URL
Phone Number
Country Select Country
Partner Type Partner Type GSI Reseller Distributor MSP/MSSP
Message

By submitting this form, you agree to ColorTokens
Terms of Service and Privacy Policy


THANK YOU FOR YOUR INTEREST IN THE COLORTOKENS PARTNER PROGRAM!

Our team will be in touch soon with more information.




KEEP IN TOUCH!

Take the first step on your Zero Trust journey and subscribe to our newsletter.
Sign up here to receive the latest in cybersecurity information, news, and notes
in your inbox.


Subscribe to Our Updates

By submitting this form you agree to our Privacy Policy

Thanks for subscribing to our newsletter!

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

ColorTokens Named Winner of the Coveted Global InfoSec Awards during RSA
Conference 2021

Winner in 4 Categories at the 2021 Globee Awards Security Cloud / SaaS Company
of the Year

Xassure: New Product-Service of the Year

Xprotect: Hot Security Technology of the Year

Xshield: Hot Security Technology of the Year

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

ColorTokens Named Winner of the Coveted Global InfoSec Awards during RSA
Conference 2021

Winner in 4 Categories at the 2021 Globee Awards Security Cloud / SaaS Company
of the Year

Xassure: New Product-Service of the Year

Xprotect: Hot Security Technology of the Year

Xshield: Hot Security Technology of the Year

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

 * Copyright © 2022
 * Contact Us
 * Cookies
 * Terms of Service
 * Privacy Policy

 * 
 * 
 * 
 * 



We use cookies on our website to give you the most relevant experience by
remembering your preferences and repeat visits. By clicking “Accept”, you
consent to the use of ALL the cookies.Privacy Policy

PreferencesAccept All

Privacy Policy
Necessary
Functional
Analytics
Performance
Advertisement
Others
Save my preferences
Privacy Policy

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities of the website. We also use third-party cookies that help us
analyze and understand how you use this website. These cookies will be stored in
your browser only with your consent. You also have the option to opt-out of
these cookies. But opting out of some of these cookies may have an effect on
your browsing experience. View full details of our Privacy Policy here.

Necessary


Necessary cookies are crucial for the basic functions of the website and the
website will not work in its intended way without them.

These cookies do not store any personally identifiable data.

CookieTypeDurationDescriptioncky-active-checkhttps1 dayThe cookie is set by
CookieYes to check if the consent banner is active on the
website.cookieyesIDhttps1 yearUnique identifier for visitors used by CookieYes
with respect to the consentcky-consenthttps1 yearThe cookie is set by CookieYes
to remember the user's consent to the use of cookies on the
website.cookieyes-necessaryhttps1 yearThis cookie is set by CookieYes and is
used to remember the consent of the users for the use of cookies in the
'Necessary' category.cookieyes-functionalhttps1 yearThis cookie is set by
CookieYes and is used to remember the consent of the users for the use of
cookies in the 'Functional' category.cookieyes-analyticshttps1 yearThis cookie
is set by CookieYes and is used to remember the consent of the users for the use
of cookies in the 'Analytics' category.cookieyes-performancehttps1 yearThis
cookie is set by CookieYes and is used to remember the consent of the users for
the use of cookies in the 'Performance' category.cookieyes-advertisementhttps1
yearThis cookie is set by CookieYes and is used to remember the consent of the
users for the use of cookies in the 'Advertisement'
category.cookieyes-otherhttps1 yearThis cookie is set by CookieYes and is used
to remember the consent of the users for the use of cookies categorized as
'Other'.__hssrchttpssessionThis cookie is set by Hubspot. According to their
documentation, whenever HubSpot changes the session cookie, this cookie is also
set to determine if the visitor has restarted their browser. If this cookie does
not exist when HubSpot manages cookies, it is considered a new
session.cky-actionhttps1 yearThis cookie is set by CookieYes and is used to
remember the action taken by the user.__hsschttps30 minutesThis cookie is set by
HubSpot. The purpose of the cookie is to keep track of sessions. This is used to
determine if HubSpot should increment the session number and timestamps in the
__hstc cookie. It contains the domain, viewCount (increments each pageView in a
session), and session start timestamp.messagesUtkhttps1 year 24 daysThis cookie
is set by hubspot. This cookie is used to recognize the user who have chatted
using the messages tool. This cookies is stored if the user leaves before they
are added as a contact. If the returning user visits again with this cookie on
the browser, the chat history with the user will be
loaded.JSESSIONIDhttpssessionUsed by sites written in JSP. General purpose
platform session cookies that are used to maintain users' state across page
requests.

Functional


Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.

CookieTypeDurationDescriptionlanghttpssessionThis cookie is used to store the
language preferences of a user to serve up content in that stored language the
next time user visit the website.bcookiehttps2 yearsThis cookie is set by
linkedIn. The purpose of the cookie is to enable LinkedIn functionalities on the
page.lidchttps1 dayThis cookie is set by LinkedIn and used for
routing.__cf_bmhttps30 minutesThis cookie, set by Cloudflare, is used to support
Cloudflare Bot Management.

Analytics


Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.

CookieTypeDurationDescription_gcl_auhttps3 monthsThis cookie is used by Google
Analytics to understand user interaction with the website._gahttps2 yearsThis
cookie is installed by Google Analytics. The cookie is used to calculate
visitor, session, campaign data and keep track of site usage for the site's
analytics report. The cookies store information anonymously and assign a
randomly generated number to identify unique visitors._gidhttps1 dayThis cookie
is installed by Google Analytics. The cookie is used to store information of how
visitors use a website and helps in creating an analytics report of how the
website is doing. The data collected including the number visitors, the source
where they have come from, and the pages visted in an anonymous
form._hjFirstSeenhttps30 minutesThis is set by Hotjar to identify a new user’s
first session. It stores a true/false value, indicating whether this was the
first time Hotjar saw this user. It is used by Recording filters to identify new
user sessions._gat_UA-119330793-1https1 minuteThis is a pattern type cookie set
by Google Analytics, where the pattern element on the name contains the unique
identity number of the account or website it relates to. It appears to be a
variation of the _gat cookie which is used to limit the amount of data recorded
by Google on high traffic volume websites._hjIncludedInPageviewSamplehttps2
minutesNo description available._hjAbsoluteSessionInProgresshttps30 minutesNo
description available.__hstchttps1 year 24 daysThis cookie is set by Hubspot and
is used for tracking visitors. It contains the domain, utk, initial timestamp
(first visit), last timestamp (last visit), current timestamp (this visit), and
session number (increments for each subsequent session).hubspotutkhttps1 year 24
daysThis cookie is used by HubSpot to keep track of the visitors to the website.
This cookie is passed to Hubspot on form submission and used when deduplicating
contacts.CONSENThttps16 years 2 months 26 days 8 hours 27 minutesYouTube sets
this cookie via embedded youtube-videos and registers anonymous statistical
data._hjIncludedInSessionSamplehttps2 minutesHotjar sets this cookie to know
whether a user is included in the data sampling defined by the site's daily
session limit.

Performance


Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.

CookieTypeDurationDescription_gaexphttps2 months 19 days 7 hours 14
minutesGoogle Analytics installs this cookie to determine a user's inclusion in
an experiment and the expiry of experiments a user has been included in.

Advertisement


Advertisement cookies are used to deliver visitors with customized
advertisements based on the pages they visited before and analyze the
effectiveness of the ad campaign.

CookieTypeDurationDescriptiontest_cookiehttps15 minutesThis cookie is set by
doubleclick.net. The purpose of the cookie is to determine if the user's browser
supports cookies.bscookiehttps2 yearsThis cookie is a browser ID cookie set by
Linked share Buttons and ad tags. mchttps1 year 1 monthQuantserve sets the mc
cookie to anonymously track user behaviour on the website.__qcahttps1 year 26
daysThe __qca cookie is associated with Quantcast. This anonymous data helps us
to better understand users' needs and customize the website accordingly.
YSChttpssessionYSC cookie is set by Youtube and is used to track the views of
embedded videos on Youtube pages.VISITOR_INFO1_LIVEhttps5 months 27 daysA cookie
set by YouTube to measure bandwidth that determines whether the user gets the
new or old player interface.IDEhttps1 year 24 daysGoogle DoubleClick IDE cookies
are used to store information about how the user uses the website to present
them with relevant ads and according to the user profile.

Others


Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.

CookieTypeDurationDescriptionTS01fac3f6httpssessionNo description
available.UserMatchHistoryhttps1 monthLinkedin - Used to track visitors on
multiple websites, in order to present relevant advertisement based on the
visitor's preferences.AnalyticsSyncHistoryhttp1 monthNo descriptionli_gchttp2
yearsNo description_dlthttp1 dayNo description_hjSessionUser_2804925http1 yearNo
description_hjSession_2804925http30 minutesNo descriptionloglevelhttpsneverNo
description available.cf_chl_seq_d7ff5d942a7cddahttpssessionNo
descriptioncf_chl_2http1 hourNo descriptioncf_chl_proghttps1 hourNo description
available.cf_chl_seq_3aee89f02468189httpssessionNo
descriptioncf_chl_seq_394906aa066b2a7httpssessionNo
descriptioncf_chl_seq_4b7ab1e44c4140bhttpssessionNo
descriptioncf_chl_seq_486323f96153ff7httpssessionNo
descriptioncf_chl_seq_3e839749a8ad213httpssessionNo
descriptioncf_chl_seq_25c2e9a47a3d092httpssessionNo description

Powered by CookieYes