colortokens.com Open in urlscan Pro
2606:4700::6812:1927  Public Scan

Submitted URL: https://cffzg04.na1.hubspotlinks.com/Ctc/DL+113/cFFzg04/VW_3pn5H6dCDW4VxDM-19lDh-W6fpr4J4Gs2tSN2ZRHBG3lSc3V1-WJV7CgQj2W4kQwn35kJk9FW5...
Effective URL: https://colortokens.com/blog/key-tenets-zero-trust-architecture/?utm_medium=email&_hsmi=148110481&_hsenc=p2ANqtz-9rwpA7f...
Submission: On March 09 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

<form id="ct-hubspot-form-partner-Registration-popup-with-jquery-validation" class="bgfix" novalidate="novalidate">
  <input type="hidden" name="hform_id" id="hform_id" value="8fee3cc2-f26f-4f91-92cc-62ea7d1b97e7">
  <input type="hidden" name="form_name" id="form_name" value="partnerRegistration">
  <input type="hidden" name="srcdetailtxt" id="srcdetailtxt" value="N/A">
  <select id="srcdetailid" class="d-none">
    <option selected="" value="Partnership request"></option>
  </select>
  <div class="forLoaderIcon formLoader subscribeloader">
    <img alt="form loader" data-src="https://colortokens.com/wp-content/uploads/oval.svg" class="lazyload" src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw=="><noscript><img
        src="https://colortokens.com/wp-content/uploads/oval.svg" alt="form loader"></noscript>
  </div>
  <select hidden="" name="record_type" id="record_type">
    <option value="0127F000000NWDmQAO" selected="">Record Type</option>
  </select>
  <div class="row">
    <div class="col-sm-6">
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="fullName"> First Name</label>
          <input type="text" id="firstname" name="firstname" required="" class="input-box mb-0 p-0 ">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="lastname">Last Name</label>
          <input type="text" id="lastname" name="lastname" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="company">Company Name</label>
          <input type="text" id="company" name="company" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="email">Company Email</label>
          <input id="email" name="email" type="text" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="jobtitle">Job Title</label>
          <input type="text" id="jobtitle" name="jobtitle" required="" class="input-box mb-0 p-0">
        </div>
      </div>
    </div>
    <div class="col-sm-6">
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="website">Website URL</label>
          <input type="text" id="website" name="website" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40">
          <label class="form-label" for="phone">Phone Number</label>
          <input type="text" id="phone" name="phone" required="" class="input-box mb-0 p-0">
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40 focused">
          <label class="form-label" for="partnersCountry">Country</label>
          <select id="partnersCountry" name="country" required="" class="w-100 input-box form-control p-0">
            <option value="" class="select-country">Select Country</option>
          </select>
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group mb-40 focused">
          <label class="form-label d-none" for="partner_type">Partner Type</label>
          <select id="partner_type" name="partner_type" class="form-control w-100 p-0 input-select">
            <option value=""> Partner Type</option>
            <option value="GSI">GSI</option>
            <option value="Reseller">Reseller</option>
            <option value="Distributor">Distributor</option>
            <option value="MSP/MSSP">MSP/MSSP</option>
          </select>
          <!-- <span class="msg error partner-type-err">Please select partner type</span> -->
        </div>
      </div>
      <div class="col-sm-12">
        <div class="form-group">
          <label class="form-label" for="comments">Message</label>
          <input type="text" id="comments" name="comments" class="p-0 input-box">
        </div>
      </div>
    </div>
    <div class="col-sm-12">
      <div class="form-group mt-4 mb-3 text-center">
        <input type="submit" name="submit" id="submit" class="rectangle-small-btn p-0 mb-0 mx-auto text-white text-uppercase" value="SUBMIT">
      </div>
      <p class="terms m-0">By submitting this form, you agree to ColorTokens <br> <a href="/terms-of-service/" target="_blank" class="text-red font-weight-normal">Terms of Service</a> and
        <a href="/privacy-policy/partnerportal/" target="_blank" class="text-red font-weight-normal">Privacy Policy</a> </p>
    </div>
  </div>
</form>

GET https://colortokens.com/

<form class="search" method="get" action="https://colortokens.com/" role="search" autocomplete="off">
  <!-- <input type="hidden" value="post page" name="post_type" id="post_type" /> -->
  <input type="search" class="form-control d-inline shadow-none p-2" name="s" required="" placeholder="Search..." value="">
  <button type="submit" role="button" class="search-icon bg-transparent border-0 px-1" id="button-search">
    <svg xmlns="http://www.w3.org/2000/svg" width="30.415" height="30.415" viewBox="0 0 30.415 30.415">
      <g fill="none" stroke="#fff" stroke-linejoin="round" stroke-width="2px" transform="translate(-1767.5 -33.5)">
        <circle cx="9.739" cy="9.739" r="9.739" transform="translate(1768.5 34.5)"></circle>
        <path stroke-linecap="round" d="M0 0L11.375 11.375" transform="translate(1785.125 51.125)"></path>
      </g>
    </svg>
  </button>
</form>

POST

<form class="was-validate footer-subscribe-form" id="footer-subscribe-form" method="post" autocomplete="off" novalidate="novalidate">
  <input type="hidden" name="hform_id" id="hform_id" value="89388638-6dbe-477b-911b-8dd3f07177d0">
  <input type="hidden" name="form_name" id="form_name" value="fnewsletter">
  <input type="hidden" name="srcdetailtxt" id="srcdetailtxt" value="N/A">
  <select id="srcdetailid" class="d-none">
    <option selected="" value="Newsletter Subscription"></option>
  </select>
  <div class="position-relative">
    <div class="formLoader text-center">
      <img loading="lazy" alt="form loader" data-src="https://colortokens.com/wp-content/uploads/oval.svg" class="lazyload" src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw=="><noscript><img loading="lazy"
          src="https://colortokens.com/wp-content/uploads/oval.svg" alt="form loader"></noscript>
    </div>
    <input type="email" class="email-field email" required="" name="email" id="email" placeholder="Enter Your Email Address">
  </div>
  <button type="submit" class="ctu-button">Subscribe to Our Updates</button>
</form>

Text Content

 * Search
 * Careers
 * Contact Us
 * Login

 * Products +
 * Solutions +
 * Partners +
 * Resources +
 * Company +

Request Demo Live Micro-Segmentation Demo

Platform


 * XTENDED ZEROTRUST
   PLATFORM

Products


 * XSHIELD
   
   Workload visibility and segmentation


 * XACCESS
   
   Secure remote access

 


 * XPROTECT
   
   Endpoint and host protection
   

 

Quick Links

 * Xaccess datasheet
 * Xprotect datasheet
 * Learn about Micro-Segmentation

 

 * Zero Trust survey results
 * Xshield datasheet
 * Xshield solution brief

 * Security
 * Services
 * Industry

Cloud

 * Secure Access to Cloud Workloads
 * Cloud Workload Protection

End Point

 * POS and Fixed-Function Systems Protection
 * Endpoint Lockdown

Applications

 * Secure Remote Access to Applications
 * Crown Jewels Security for Hybrid Environments

Infrastructure

 * Ransomware Prevention
 * Environment Separation

 

Quick Links

 * Learn about Micro-Segmentation
 * Learn about PCI-DSS 4.0

Solution Brief

 * Online Deals Marketplace Combats Ransomware

ZERO TRUST AS A SERVICE


 * XASSURE

 * Breach Protection
 * Advanced Threat Monitoring and Incident Response
 * Managed Micro-Segmentation and Monitoring
 * Zero Trust Adoption

 


 * XQUANTIFY
   
   Assessment Solutions - Cyber Risk Quantification

 

Quick Links

 * Learn about Zero Trust Security
 * Tailored Services for Every Need

Case Study

 * Nishith Desai Associates Implements Proactive Cybersecurity

Industry Solutions

 * Financial Services
 * Healthcare and Life Sciences
 * Legal and Professional Services

 

 * Retail Services
 * Manufacturing Technology
 * Critical Infrastructure

 

Quick Links

 * Xshield datasheet
 * Xassure Platform Overview

Case Study

 * Solutions for Healthcare Organizations
 * Solutions for Government Organizations

Become a Partner Already a partner ? Login

Program


PARTNER PROGRAM OVERVIEW

Designed to deliver unparalleled customer value and accelerated mutual growth by
harnessing partner expertise and ColorTokens cybersecurity technology.

Learn More

Resources


 * CUSTOMER SUCCESS

 


 * WEBINARS

 


 * BLOG

 


 * RESOURCE CENTER

Featured Topic

 * Micro-Segmentation
 * PCI-DSS 4.0

 

 * Zero Trust Architecture
 * Application Whitelisting

Contact Us


 * ABOUT US
   
   Keeping the world safe from cybercrime


 * CERTIFICATIONS AND AWARDS


 * NEWS AND EVENTS
   
   The latest from ColorTokens


 * CAREERS

Search...

   
 * Products
   +
   * Xtended ZeroTrustTM Platform
   * Xshield: Workload Visibility and Segmentation
   * Xaccess: Secure Remote Access
   * Xprotect: Endpoint and Host Protection
     
   
   * QUICK LINKS
     
     Zero Trust survey results
     
     Xshield datasheet
     
     Xshield Solution Brief
     
     Xaccess datasheet
     
     Xprotect datasheet
     
     Learn about Micro-Segmentation
   
 * Solutions
   +
   * Security Solutions
     +
     * Secure Remote Access to Applications
     * Secure Access Cloud Workloads
     * Crown Jewels Security for Hybrid Environments
     * Cloud Workload Protection
     * Environment Separation
     * Endpoint Lockdown
     * POS and Fixed-Function Systems Protection
     * Ransomware Prevention
     
     * QUICK LINKS
       
       Learn about Micro-Segmentation
       
       Learn about PCI-DSS 4.0
       
       CASE STUDY
       
       Online Deals Marketplace Combats Ransomware
   * Progressive Zero Trust as a Service
     +
     * Xassure: Service Overview
     * Breach Protection
     * Advanced Threat Monitoring and Incident Response
     * Managed Micro-Segmentation and Monitoring
     * Zero Trust Adoption
     
     * QUICK LINKS
       
       Learn about Zero Trust Security
       
       Explore Xassure Service Packs
       
       CASE STUDY
       
       Nishith Desai Associates Implements Proactive Cybersecurity
   * Assessment Solutions
     +
     * Cyber Risk Quantification: Xquantify
   * Industry Solutions
     +
     * Financial Services
     * Retail
     * Healthcare and Life Sciences
     * Legal and Professional Services
     * Manufacturing Technology
     * Critical Infrastructure
     
     * QUICK LINKS
       
       Xshield datasheet
       
       Xassure Service Overview
       
       SOLUTION BRIEF
       
       Solutions for Healthcare Organizations
       
       Solutions for Government Organizations
   
 * Partners
   +
   * Partner Portal Login
   * ColorTokens Partner Program Overview
   
 * Resources
   +
   * Featured Topics
     +
     * Micro-Segmentation
     * PCI-DSS 4.0
     * Zero Trust Architecture
     * Application Whitelisting
   * Customer success
   * Blog
   * Webinars
   * Resource Center
   
   * QUICK LINKS
     
     Case Studies
     
     Solution Briefs
     
     Technical Briefs
   
 * Company
   +
   * About ColorTokens
   * Certifications and Awards
   * Privacy Policy
   * Careers
   * News and Events
 * Contact Us
 * Platform login
   
 * Request A Demo

Blog


7 KEY TENETS OF ZERO TRUST ARCHITECTURE

Author

Satyam Tyagi

Read Time

6 Minutes

Last Updated

Dec 13, 2021

Zero Trust Architecture

Zero Trust Architecture (ZTA) is a security blueprint designed with the
realities of today’s cyber threat landscape in mind. It’s based on the premise
that attackers are already present, and at any point anything can be compromised
– and in turn suggests organizations adhere to these key tenets of Zero Trust
Architecture to maximize cyber resilience.  

Broadly speaking, we can classify these ZTA tenets under three security domains.
Using the NIST SP 800-207 document as a reference point, we’ll examine how these
seven tenets of zero trust architecture fit into these domains, as well as why
each tenet plays a vital role in ensuring robust Zero Trust security.




ZTA DOMAIN 1: GRANTING ACCESS  

On what basis do we grant access? How do we determine and verify the identity of
an accessor, the integrity of an accessor, and the state of an accessor? The
three tenets in this category seek to address these critical questions; if these
tenets are not properly implemented, unauthorized or compromised users or
devices may get access when they should not. 

TENET 1: AUTHENTICATION AND AUTHORIZATION 

NIST – “All resource authentication and authorization are dynamic and strictly
enforced before access is allowed.” 

Broadly, this implies nothing is inherently trusted and everything trying to
obtain access is properly authenticated with strong authentication (MFA, X.509,
etc.), and even re-authenticated as needed.  

TENET 2: INTEGRITY  

NIST – “The enterprise monitors and measures the integrity and security posture
of all owned and associated assets.” 

Since we assume at any point anything can be compromised, integrity is
continuously evaluated for vulnerabilities, patch level, and other possible
corruptions which may compromise asset integrity.  

TENET 3: OBSERVABLE STATE 

NIST – “Access to resources is determined by dynamic policy—including the
observable state of client identity, application/service, and the requesting
asset—and may include other behavioral and environmental attributes.” 

This tenet appears somewhat similar to the previous “Integrity” tenet, but the
difference is that “Observable State” deals more with the characteristics and
behavioral attributes an organization should evaluate before granting access.
This may include location, device type, measured deviations, and unusual usage
patterns.  


ZTA DOMAIN 2: CONTROLLING ACCESS 

How much access do we grant, and for how long in terms of both time and
activity? This aspect of Zero Trust Architecture relates the principle of least
privilege. If it’s not properly implemented and we grant too much access, a
small compromise can result in a massive breach. 

TENET 4: MINIMAL ACCESS IN SIZE 

NIST – “All data sources and computing services are considered resources.” 

Even extremely small footprint compute and data constructs such as containers,
processes, functions, IOT actuators, files, DB tables, or data records are
considered to be resources. It needs to be possible to control access to the
minimal resource at the maximum granularity based on the need.  

TENET 5: MINIMAL ACCESS IN TIME 

NIST – “Access to individual enterprise resources is granted on a per-session
basis.” 

Access should be granted only to the individual resource, for the duration
needed, and for the particular transaction. Access should be re-evaluated for
every new transaction or after the shortest period of time necessary.  


ZTA DOMAIN 3: MONITORING AND SECURING ACCESS 

Once a Zero Trust access decision is established, access must be monitored and
secured. If this aspect is not properly implemented – and we are not able to
secure access for confidentiality or integrity, or respond to changes in the
threat environment – we may not be able to protect our Zero Trust Architecture
from network, infrastructure, and environment attacks. 

TENET 6: MONITOR ALL ACCESS 

NIST – “The enterprise collects as much information as possible about the
current state of assets, network infrastructure, and communications and uses it
to improve its security posture.” 

Enterprises should collect a lot of data about the overall security posture and
threats in their environment. As these evolve, this context and insights should
feed into policy creation and improvement.  

TENET 7: ENCRYPT ALL ACCESS 

NIST – “All communication is secured regardless of network location.” 

The confidentiality and integrity of communications for the access request and
the actual access are equally important to Zero Trust. If the communication
and/or access request are compromised, manipulated, or breached, the whole Zero
Trust premise stands invalid.

 

Download the Definitive Guide to Zero Trust Security Read More


THE IMPORTANCE OF ZERO TRUST TENETS 

It’s vital that organizations properly address each of these tenets as part of
their Zero Trust Architecture plan. If enterprises don’t have sufficient
measures in place for even one tenet or domain, they may not be able to enjoy
the benefits of a true Zero Trust Architecture.

About the Author: Satyam Tyagi is the Senior Director of Product Management at
ColorTokens. He is an industry thought leader in security and networking,
responsible for significant advances in endpoint, mobile, and application
security. He has been awarded four patents in application security and
networking, including products sold by Cisco and Avaya.  


SHARE THIS ARTICLE

 * 
 * 
 * 


RELATED POSTS


ZERO TRUST ARCHITECTURE: THE COMPLETE GUIDE

Dec 21, 2021
Read Post


THE COMPLETE GUIDE TO APPLICATION WHITELISTING

Dec 21, 2021
Read Post


3 THINGS WE LEARNED FROM 1,283 INFOSEC LEADERS’ ZERO TRUST SECURITY PLANS

Sep 29, 2021
Read Post


BECOME A PARTNER


Record Type
First Name
Last Name
Company Name
Company Email
Job Title
Website URL
Phone Number
Country Select Country
Partner Type Partner Type GSI Reseller Distributor MSP/MSSP
Message

By submitting this form, you agree to ColorTokens
Terms of Service and Privacy Policy


THANK YOU FOR YOUR INTEREST IN THE COLORTOKENS PARTNER PROGRAM!

Our team will be in touch soon with more information.




KEEP IN TOUCH!

Take the first step on your Zero Trust journey and subscribe to our newsletter.
Sign up here to receive the latest in cybersecurity information, news, and notes
in your inbox.


Subscribe to Our Updates

By submitting this form you agree to our Privacy Policy

Thanks for subscribing to our newsletter!

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

ColorTokens Named Winner of the Coveted Global InfoSec Awards during RSA
Conference 2021

Winner in 4 Categories at the 2021 Globee Awards Security Cloud / SaaS Company
of the Year

Xassure: New Product-Service of the Year

Xprotect: Hot Security Technology of the Year

Xshield: Hot Security Technology of the Year

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

ColorTokens Named Winner of the Coveted Global InfoSec Awards during RSA
Conference 2021

Winner in 4 Categories at the 2021 Globee Awards Security Cloud / SaaS Company
of the Year

Xassure: New Product-Service of the Year

Xprotect: Hot Security Technology of the Year

Xshield: Hot Security Technology of the Year

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

Winner in 5 Categories at the 2020 Cyber Excellence Awards

Micro-Segmentation Award

Zero Trust Security Award

Cloud Security Award

Endpoint Security Award

Application Security Award

 * Copyright © 2022
 * Contact Us
 * Cookies
 * Terms of Service
 * Privacy Policy

 * 
 * 
 * 
 * 



We use cookies on our website to give you the most relevant experience by
remembering your preferences and repeat visits. By clicking “Accept”, you
consent to the use of ALL the cookies.Privacy Policy

PreferencesAccept All

Privacy Policy
Necessary
Functional
Analytics
Performance
Advertisement
Others
Save my preferences
Privacy Policy

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities of the website. We also use third-party cookies that help us
analyze and understand how you use this website. These cookies will be stored in
your browser only with your consent. You also have the option to opt-out of
these cookies. But opting out of some of these cookies may have an effect on
your browsing experience. View full details of our Privacy Policy here.

Necessary


Necessary cookies are crucial for the basic functions of the website and the
website will not work in its intended way without them.

These cookies do not store any personally identifiable data.

CookieTypeDurationDescriptioncky-active-checkhttps1 dayThe cookie is set by
CookieYes to check if the consent banner is active on the
website.cookieyesIDhttps1 yearUnique identifier for visitors used by CookieYes
with respect to the consentcky-consenthttps1 yearThe cookie is set by CookieYes
to remember the user's consent to the use of cookies on the
website.cookieyes-necessaryhttps1 yearThis cookie is set by CookieYes and is
used to remember the consent of the users for the use of cookies in the
'Necessary' category.cookieyes-functionalhttps1 yearThis cookie is set by
CookieYes and is used to remember the consent of the users for the use of
cookies in the 'Functional' category.cookieyes-analyticshttps1 yearThis cookie
is set by CookieYes and is used to remember the consent of the users for the use
of cookies in the 'Analytics' category.cookieyes-performancehttps1 yearThis
cookie is set by CookieYes and is used to remember the consent of the users for
the use of cookies in the 'Performance' category.cookieyes-advertisementhttps1
yearThis cookie is set by CookieYes and is used to remember the consent of the
users for the use of cookies in the 'Advertisement'
category.cookieyes-otherhttps1 yearThis cookie is set by CookieYes and is used
to remember the consent of the users for the use of cookies categorized as
'Other'.__hssrchttpssessionThis cookie is set by Hubspot. According to their
documentation, whenever HubSpot changes the session cookie, this cookie is also
set to determine if the visitor has restarted their browser. If this cookie does
not exist when HubSpot manages cookies, it is considered a new
session.cky-actionhttps1 yearThis cookie is set by CookieYes and is used to
remember the action taken by the user.__hsschttps30 minutesThis cookie is set by
HubSpot. The purpose of the cookie is to keep track of sessions. This is used to
determine if HubSpot should increment the session number and timestamps in the
__hstc cookie. It contains the domain, viewCount (increments each pageView in a
session), and session start timestamp.messagesUtkhttps1 year 24 daysThis cookie
is set by hubspot. This cookie is used to recognize the user who have chatted
using the messages tool. This cookies is stored if the user leaves before they
are added as a contact. If the returning user visits again with this cookie on
the browser, the chat history with the user will be
loaded.JSESSIONIDhttpssessionUsed by sites written in JSP. General purpose
platform session cookies that are used to maintain users' state across page
requests.

Functional


Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.

CookieTypeDurationDescriptionlanghttpssessionThis cookie is used to store the
language preferences of a user to serve up content in that stored language the
next time user visit the website.bcookiehttps2 yearsThis cookie is set by
linkedIn. The purpose of the cookie is to enable LinkedIn functionalities on the
page.lidchttps1 dayThis cookie is set by LinkedIn and used for
routing.__cf_bmhttps30 minutesThis cookie, set by Cloudflare, is used to support
Cloudflare Bot Management.

Analytics


Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.

CookieTypeDurationDescription_gcl_auhttps3 monthsThis cookie is used by Google
Analytics to understand user interaction with the website._gahttps2 yearsThis
cookie is installed by Google Analytics. The cookie is used to calculate
visitor, session, campaign data and keep track of site usage for the site's
analytics report. The cookies store information anonymously and assign a
randomly generated number to identify unique visitors._gidhttps1 dayThis cookie
is installed by Google Analytics. The cookie is used to store information of how
visitors use a website and helps in creating an analytics report of how the
website is doing. The data collected including the number visitors, the source
where they have come from, and the pages visted in an anonymous
form._hjFirstSeenhttps30 minutesThis is set by Hotjar to identify a new user’s
first session. It stores a true/false value, indicating whether this was the
first time Hotjar saw this user. It is used by Recording filters to identify new
user sessions._gat_UA-119330793-1https1 minuteThis is a pattern type cookie set
by Google Analytics, where the pattern element on the name contains the unique
identity number of the account or website it relates to. It appears to be a
variation of the _gat cookie which is used to limit the amount of data recorded
by Google on high traffic volume websites._hjIncludedInPageviewSamplehttps2
minutesNo description available._hjAbsoluteSessionInProgresshttps30 minutesNo
description available.__hstchttps1 year 24 daysThis cookie is set by Hubspot and
is used for tracking visitors. It contains the domain, utk, initial timestamp
(first visit), last timestamp (last visit), current timestamp (this visit), and
session number (increments for each subsequent session).hubspotutkhttps1 year 24
daysThis cookie is used by HubSpot to keep track of the visitors to the website.
This cookie is passed to Hubspot on form submission and used when deduplicating
contacts.CONSENThttps16 years 2 months 26 days 8 hours 27 minutesYouTube sets
this cookie via embedded youtube-videos and registers anonymous statistical
data._hjIncludedInSessionSamplehttps2 minutesHotjar sets this cookie to know
whether a user is included in the data sampling defined by the site's daily
session limit.

Performance


Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.

CookieTypeDurationDescription_gaexphttps2 months 19 days 7 hours 14
minutesGoogle Analytics installs this cookie to determine a user's inclusion in
an experiment and the expiry of experiments a user has been included in.

Advertisement


Advertisement cookies are used to deliver visitors with customized
advertisements based on the pages they visited before and analyze the
effectiveness of the ad campaign.

CookieTypeDurationDescriptiontest_cookiehttps15 minutesThis cookie is set by
doubleclick.net. The purpose of the cookie is to determine if the user's browser
supports cookies.bscookiehttps2 yearsThis cookie is a browser ID cookie set by
Linked share Buttons and ad tags. mchttps1 year 1 monthQuantserve sets the mc
cookie to anonymously track user behaviour on the website.__qcahttps1 year 26
daysThe __qca cookie is associated with Quantcast. This anonymous data helps us
to better understand users' needs and customize the website accordingly.
YSChttpssessionYSC cookie is set by Youtube and is used to track the views of
embedded videos on Youtube pages.VISITOR_INFO1_LIVEhttps5 months 27 daysA cookie
set by YouTube to measure bandwidth that determines whether the user gets the
new or old player interface.IDEhttps1 year 24 daysGoogle DoubleClick IDE cookies
are used to store information about how the user uses the website to present
them with relevant ads and according to the user profile.

Others


Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.

CookieTypeDurationDescriptionTS01fac3f6httpssessionNo description
available.UserMatchHistoryhttps1 monthLinkedin - Used to track visitors on
multiple websites, in order to present relevant advertisement based on the
visitor's preferences.AnalyticsSyncHistoryhttp1 monthNo descriptionli_gchttp2
yearsNo description_dlthttp1 dayNo description_hjSessionUser_2804925http1 yearNo
description_hjSession_2804925http30 minutesNo descriptionloglevelhttpsneverNo
description available.cf_chl_seq_d7ff5d942a7cddahttpssessionNo
descriptioncf_chl_2http1 hourNo descriptioncf_chl_proghttps1 hourNo description
available.cf_chl_seq_3aee89f02468189httpssessionNo
descriptioncf_chl_seq_394906aa066b2a7httpssessionNo
descriptioncf_chl_seq_4b7ab1e44c4140bhttpssessionNo
descriptioncf_chl_seq_486323f96153ff7httpssessionNo
descriptioncf_chl_seq_3e839749a8ad213httpssessionNo
descriptioncf_chl_seq_25c2e9a47a3d092httpssessionNo description

Powered by CookieYes