{"id":21675,"date":"2022-10-12T01:57:25","date_gmt":"2022-10-12T01:57:25","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=21675"},"modified":"2026-04-17T18:07:43","modified_gmt":"2026-04-17T18:07:43","slug":"harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/","title":{"rendered":"Harry Potter&#8217;s Invisibility Cloak and Moody&#8217;s Eye: Software Defined Perimeter (SDP)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<p>In the last series of popular science, we talked about <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/zero-trust-network-access-ztna-never-trust-always-verify\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Network Access (ZTNA)<\/a> and learned the three critical technologies of zero trust&acirc;&euro;&rdquo;SDP, IAM and MSG. In this article, we will continue to introduce a security capability of NSFOCUS SASE &acirc;&euro;&ldquo; the SDP, one of the three major technologies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is SDP?<\/h2>\n\n\n\n<p>The SDP stands for Software Defined Perimeter, a new generation of network security technology architecture based on the concept of Zero Trust proposed by the International Cloud Security Alliance (CSA) in 2013.<\/p>\n\n\n\n<p>In 1993, the famous American cartoonist Peter Steiner published a world-famous cartoon dubbed &#8220;On the internet, nobody knows you&acirc;&euro;&trade;re a dog.&#8221;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/On-the-Internet-nobody-knows-youre-a-dog..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/On-the-Internet-nobody-knows-youre-a-dog..png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21676\"><\/a><\/figure>\n<\/div>\n\n\n<p>To solve the problem of verifying whether the remote connection is a human or a dog when you are sitting at the computer, the zero-trust concept of &acirc;&euro;&lsaquo;&acirc;&euro;&lsaquo;&#8221;never trust, always verify&#8221; came into being. How to achieve stealth on the Internet, trusted control, and minimal on-demand authorization? Those are what the SDP can do. So how does it do these things?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SDP Implementation Principle<\/h2>\n\n\n\n<p>The function of SDP won&acirc;&euro;&trade;t be<a> <\/a>realized without the three core components: SDP control center, SDP client and SDP gateway.<\/p>\n\n\n\n<p>The SDP control center is responsible for policy configuration, identity or device-based refined application authorization based on identity or device, log auditing, and docking authentication services;<\/p>\n\n\n\n<p>The SDP client is responsible for uniquely identifying the terminal, reporting status information, and initiating single&Acirc;&nbsp;packet&Acirc;&nbsp;authorization (SPA) and authentication requests. It also provides private DNS, and cooperates with business traffic proxy to automatically address application traffic to the corresponding gateway;<\/p>\n\n\n\n<p>The SDP gateway is responsible for service hiding. After the SPA knocking, it opens the dynamic TCP port to the authenticated terminal and implements the specific SDP control center policy after the user passes the authentication.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"553\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP-1024x553.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21678\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP-1024x553.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP-300x162.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP-768x415.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP-1536x829.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP-600x324.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP-200x108.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Three-components-of-SDP.png 1906w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Three core components of SDP<\/p>\n\n\n\n<p>Before the client accesses data, it establishes an authentication and authorization channel through the control plane, the SDP controller and the application server. After the authentication is passed and the access authorization is obtained, the SDP controller determines a list of hosts that the client can be authorized to communicate with. Then the client can establish a data access channel with the application server on the data plane, allowing intended traffic to pass through.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow.png\"><img decoding=\"async\" width=\"1024\" height=\"534\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow-1024x534.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21680\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow-1024x534.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow-300x156.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow-768x400.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow-1536x801.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow-600x313.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow-200x104.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/SDP-Access-Flow.png 1817w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">SDP access flow<\/p>\n\n\n\n<p>Once the user can be authenticated, we can be sure who the user is (could be a liar or a dog), and SDP creates a secure encrypted tunnel to protect communications between the user and the requested resource.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advantages of SDP<\/h2>\n\n\n\n<p>So what benefits does it bring to safe deployment? Through the separation of the control layer and the service layer, continuous monitoring and evaluation of the context, it provides on-demand minimum authorization and mutual TLS communication encryption to ensure the security of the link. SDP can effectively deal with many network security threats, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Data Breach<\/li><\/ul>\n\n\n\n<p>Reduce public exposure and implement a &acirc;&euro;&oelig;least access&acirc;&euro; model to reduce data leakage.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Weak Identity<\/li><\/ul>\n\n\n\n<p>Identity-centric, restricted access makes the security architecture more resilient to weak identities, credentials and access management.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Insecure System Interfaces and APIs<\/li><\/ul>\n\n\n\n<p>Unauthorized users (i.e. attackers) cannot access the interface and therefore cannot exploit any vulnerability.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Business System and Application Vulnerabilities<\/li><\/ul>\n\n\n\n<p>SDP significantly reduces the attack surface and hides the vulnerabilities in business systems and applications.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Account Hijacking<\/li><\/ul>\n\n\n\n<p>Web requests carrying hijacked session cookies not pre-authenticated and authorized will not be accessed by the SDP gateway.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Malicious insider threat<\/li><\/ul>\n\n\n\n<p>Restrict insiders&acirc;&euro;&trade; access to only those resources needed to perform business functions and all other resources will be hidden.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Advanced Persistent Threats (APTs)<\/li><\/ul>\n\n\n\n<p>Implement multi-factor authentication to limit the ability of infected endpoints to find network targets, and reduce the spread of APTs.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Data Loss<\/li><\/ul>\n\n\n\n<p>Reduce the possibility of data loss by hiding network resources from unauthorized users through the principle of least privilege.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>DDoS Attacks<\/li><\/ul>\n\n\n\n<p>SPA can consume fewer resources than typical TCP handshake connections, enabling servers to process and drop malicious network request packets at scale.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SDP in SASE<\/h2>\n\n\n\n<p>Now we know the advantages of SDP. Next, let&#8217;s see how these advantages are reflected in SASE products.<\/p>\n\n\n\n<p>First of all, SDP exists as an optional application publishing mode in the SASE-NPA service, which provides security, convenience and stability for enterprise application access.<\/p>\n\n\n\n<p><strong>Security<\/strong> is reflected in the fact that SASE can use<a> <\/a>the SDP technology to hide all kinds of applications deployed by customers on the cloud or locally, as well as the gateway IP and port of the cloud service itself. Only legitimate users can see the application, and hackers cannot scan corporate assets. This capability can well solve the problem of increased Internet exposure after asset cloudification and multi-location deployment, and comprehensive network and application cloaking makes it impossible for attackers to start.<\/p>\n\n\n\n<p><strong>Convenience<\/strong> is mainly reflected in the fact that enterprise users access the enterprise intranet anywhere through the Internet. Only deploying an agent on the user terminal can make users quickly access NSFOCUS SASE at any location and securely access back-end applications, which can avoid the dilemma of small carrier operators cannot establish VPN tunnels in the past.<\/p>\n\n\n\n<p><strong>Stability <\/strong>is another feature as SDP uses short links instead of VPN tunnels built by traditional VPN technologies. So it is more tolerant of poor network conditions, providing a more stable access experience without lagging and dropouts.<\/p>\n\n\n\n<p>Finally, if we use a metaphor o describe SDP, we will say that SDP is like adding &#8220;Harry Potter&#8217;s invisibility cloak&#8221; to a safe so that attackers cannot find it, while authorized users of the enterprise are granted &#8220;Moody&#8217;s magic&#8221; Eye&#8221;.<\/p>\n\n\n\n<p>Previous posts:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/nsfocus-empowers-isp-msp-with-zero-trust-and-security-access-service-edge-sase-solution\/\" target=\"_blank\" rel=\"noreferrer noopener\">NSFOCUS Empowers ISP\/MSP with Zero Trust and Security Access Service Edge (SASE) Solution<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/zero-trust-network-access-ztna-never-trust-always-verify\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Network Access (ZTNA): Never Trust, Always Verify<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/casb-a-tech-celebrity-from-the-cloud-era-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">CASB, A Tech &acirc;&euro;&oelig;Celebrity&acirc;&euro; from the Cloud Era<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/sase-the-relationship-between-sd-wan-and-sase\/\">SASE: The Relationship Between SD-WAN and SASE<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/sase-popular-science-series-understanding-sd-wan\/\" target=\"_blank\" rel=\"noreferrer noopener\">SASE Popular Science Series &acirc;&euro;&ldquo; Understanding SD-WAN<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/sase-born-for-digital-age\/\" target=\"_blank\" rel=\"noreferrer noopener\">SASE, Born for Digital Age<\/a><\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>In the last series of popular science, we talked about Zero Trust Network Access (ZTNA) and learned the three critical technologies of zero trust&acirc;&euro;&rdquo;SDP, IAM and MSG. In this article, we will continue to introduce a security capability of NSFOCUS SASE &acirc;&euro;&ldquo; the SDP, one of the three major technologies. What is SDP? The SDP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[631],"class_list":["post-21675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-sase"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Harry Potter&#039;s Invisibility Cloak and Moody&#039;s Eye: Software Defined Perimeter (SDP) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Harry Potter&#039;s Invisibility Cloak and Moody&#039;s Eye: Software Defined Perimeter (SDP) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"In the last series of popular science, we talked about Zero Trust Network Access (ZTNA) and learned the three critical technologies of zero\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-12T01:57:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/boundaries-e1665539727125.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Harry Potter&#039;s Invisibility Cloak and Moody&#039;s Eye: Software Defined Perimeter (SDP) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"In the last series of popular science, we talked about Zero Trust Network Access (ZTNA) and learned the three critical technologies of zero\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/boundaries-e1665539727125.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Harry Potter&#8217;s Invisibility Cloak and Moody&#8217;s Eye: Software Defined Perimeter (SDP)\",\"datePublished\":\"2022-10-12T01:57:25+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/\"},\"wordCount\":1024,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/boundaries-e1665539727125.jpg\",\"keywords\":[\"SASE\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/\",\"name\":\"Harry Potter's Invisibility Cloak and Moody's Eye: Software Defined Perimeter (SDP) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/boundaries-e1665539727125.jpg\",\"datePublished\":\"2022-10-12T01:57:25+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/boundaries-e1665539727125.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/boundaries-e1665539727125.jpg\",\"width\":300,\"height\":200,\"caption\":\"White line on green sports field grass.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Harry Potter&#8217;s Invisibility Cloak and Moody&#8217;s Eye: Software Defined Perimeter (SDP)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Harry Potter's Invisibility Cloak and Moody's Eye: Software Defined Perimeter (SDP) - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/","og_locale":"pt_BR","og_type":"article","og_title":"Harry Potter's Invisibility Cloak and Moody's Eye: Software Defined Perimeter (SDP) - NSFOCUS","og_description":"In the last series of popular science, we talked about Zero Trust Network Access (ZTNA) and learned the three critical technologies of zero","og_url":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/","og_site_name":"NSFOCUS","article_published_time":"2022-10-12T01:57:25+00:00","article_modified_time":"2026-04-17T18:07:43+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/boundaries-e1665539727125.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Harry Potter's Invisibility Cloak and Moody's Eye: Software Defined Perimeter (SDP) - NSFOCUS","twitter_description":"In the last series of popular science, we talked about Zero Trust Network Access (ZTNA) and learned the three critical technologies of zero","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/boundaries-e1665539727125.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Harry Potter&#8217;s Invisibility Cloak and Moody&#8217;s Eye: Software Defined Perimeter (SDP)","datePublished":"2022-10-12T01:57:25+00:00","dateModified":"2026-04-17T18:07:43+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/"},"wordCount":1024,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/boundaries-e1665539727125.jpg","keywords":["SASE"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/","url":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/","name":"Harry Potter's Invisibility Cloak and Moody's Eye: Software Defined Perimeter (SDP) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/boundaries-e1665539727125.jpg","datePublished":"2022-10-12T01:57:25+00:00","dateModified":"2026-04-17T18:07:43+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/boundaries-e1665539727125.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/boundaries-e1665539727125.jpg","width":300,"height":200,"caption":"White line on green sports field grass."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/harry-potters-invisibility-cloak-and-moodys-eye-software-defined-perimeter-sdp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Harry Potter&#8217;s Invisibility Cloak and Moody&#8217;s Eye: Software Defined Perimeter (SDP)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=21675"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21675\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/21684"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=21675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=21675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=21675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}