<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Software AG</provider_name><provider_url>https://www.softwareag.com/ja</provider_url><author_name>Felix Friedrich</author_name><author_url>https://www.softwareag.com/ja/blog/author/felix-friedruch/</author_url><title>What does Zero Trust Security mean for you</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="QkjykfrNsl"&gt;&lt;a href="https://www.softwareag.com/ja/resources/adabas-natural/zero-trust-security/"&gt;What does Zero Trust Security mean for you&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.softwareag.com/ja/resources/adabas-natural/zero-trust-security/embed/#?secret=QkjykfrNsl" width="600" height="338" title="&#x201C;What does Zero Trust Security mean for you&#x201D; &#x2014; Software AG" data-secret="QkjykfrNsl" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.softwareag.com/wp/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;</html><thumbnail_url>https://www.softwareag.com/app/uploads/2025/09/software-gmbh-dark-logo-bg_Small.jpeg</thumbnail_url><thumbnail_width>800</thumbnail_width><thumbnail_height>450</thumbnail_height><description>You&#x2019;ve heard the buzz! More and more organizations are mandating Zero Trust as the new security architecture. What does this mean for you? We explain the principles and components of Zero Trust as well as highlight various capabilities that can be brought to bear to support Zero Trust in an Adabas &amp;</description></oembed>
