<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Wroffy Technologies Pvt. Ltd. &#xAE;</provider_name><provider_url>https://www.wroffy.com/blog</provider_url><author_name>Ishika Rao</author_name><author_url>https://www.wroffy.com/blog/author/admin/</author_url><title>Zero Trust Network Access (ZTNA) - Evaluation Guide</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="6gNcbegVeR"&gt;&lt;a href="https://www.wroffy.com/blog/zero-trust-network-access/"&gt;Zero Trust Network Access (ZTNA) &#x2013; Evaluation Guide&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.wroffy.com/blog/zero-trust-network-access/embed/#?secret=6gNcbegVeR" width="600" height="338" title="&#x201C;Zero Trust Network Access (ZTNA) &#x2013; Evaluation Guide&#x201D; &#x2014; Wroffy Technologies Pvt. Ltd. &#xAE;" data-secret="6gNcbegVeR" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.wroffy.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.wroffy.com/blog/wp-content/uploads/2023/12/Zero-Trust-Network-Access.jpg</thumbnail_url><thumbnail_width>1500</thumbnail_width><thumbnail_height>1000</thumbnail_height><description>Secure connections have become a necessity for all of us, and security has forced businesses to incur a huge cost in buying firewall and antivirus solutions that enhance security. Perhaps it helps the organization secure their data. Now that companies have gone beyond the offices and have allowed employees to work from home or anywhere, [&hellip;]</description></oembed>
