{"id":3161,"date":"2024-06-28T14:55:33","date_gmt":"2024-06-28T13:55:33","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=3161"},"modified":"2025-12-02T13:53:17","modified_gmt":"2025-12-02T13:53:17","slug":"what-is-conditional-access","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/","title":{"rendered":"What is Conditional Access? Explained"},"content":{"rendered":"\n<p>In today&#8217;s modern landscape, where organisations increasingly rely on <a href=\"https:\/\/cwsisecurity.com\/cloud-app-security-services\/\">cloud-based services<\/a>, managing access to essential documents and data has become a critical challenge. As businesses migrate their operations to the cloud, it becomes paramount to ensure that only authorised accounts have access to the correct information.<\/p>\n\n\n\n<p>This must be done whilst maintaining a seamless user experience, so individuals can perform their duties effectively. Organisations need to safeguard their assets while providing appropriate access for authorised individuals. To achieve this successfully, implementing conditional access controls is essential.<\/p>\n\n\n\n<p>Conditional access is a security approach designed to address this very challenge. By implementing conditional access controls, organisations can enforce specific policies that determine how and when users can access resources. As a result, businesses can enhance their security posture.&nbsp;<\/p>\n\n\n\n<p>In this blog, we will explore the concept of conditional access, how it works and the benefits it offers modern organisations.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Does Conditional Access Work?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/cwsisecurity.com\/what-is-risk-based-conditional-access\/\">Conditional access<\/a> is a set of defined controls which govern who has access to certain resources. These configurations evaluate the trustworthiness of a device\/user and, depending on their access controls to the user\/device, they either grant or block access.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>To determine a device\/user\u2019s access, conditional access relies on various signals from different sources to inform the system about the device\/user to learn what level of access they should be granted. The signals that determine user\/device access include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>User or group membership:<\/strong> Policies can be tailored towards specific users or groups, providing administrators with detailed control over access.<\/li>\n\n\n\n<li><strong>IP Location Information:<\/strong> Organisations can create trusted IP address ranges for policy decisions, and administrators can specify entire countries or regions IP ranges to be blocked or to allow traffic from.<\/li>\n\n\n\n<li><strong>Device:<\/strong> Specific platforms or specific states can be used when enforcing conditional access.<\/li>\n\n\n\n<li><strong>Application:<\/strong> The requested access of different applications can trigger conditional access policies.<\/li>\n\n\n\n<li><strong>Risk <\/strong><a href=\"https:\/\/cwsisecurity.com\/our-services-old\/mdr-endpoints\/\"><strong>Detection<\/strong><\/a><strong>:<\/strong> Signals, integrated with <a href=\"https:\/\/cwsisecurity.com\/what-is-microsoft-entra\/\">Microsoft\u2019s Entra ID<\/a> Protection, identify and remediate risky users.<\/li>\n\n\n\n<li><strong>Microsoft Defender for Cloud Apps:<\/strong> This enables user\u2019s sessions to be monitored and controlled in real-time, increasing visibility and control within the <a href=\"https:\/\/cwsisecurity.com\/secure-cloud\/\">cloud<\/a> environment<\/li>\n<\/ul>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2023\/12\/Four-Practice-Page-Images-8.png\" alt=\"\" class=\"wp-image-2432\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why Do We Need to Implement Conditional Access?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Organisations require conditional access to increase the security and compliance of their business data. Conditional access provides organisations with the ability to implement a customised set of policies that restrict access to only what the user or device needs. The adoption of conditional access can enhance user experience by allowing users to access resources without undergoing multiple authentication steps.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Microsoft Entra Conditional Access<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/cwsisecurity.com\/technical-solutions\/microsoft-entra\/\">Microsoft Entra<\/a> Conditional Access operates by detecting signals, using the signals to make informed decisions, and enforcing the organisational policies. Conditional Access policies in Microsoft Entra are as simple as \u201c<strong>if-then<\/strong>\u201d statements, such as if a user wants to access an application, then they must undergo <a href=\"https:\/\/cwsisecurity.com\/number-matching-and-additional-context-in-microsoft-authenticator\/\">multifactor authentication<\/a> to be granted access. Administrators with the Conditional Access Administrator role assigned can manage organisational polices.&nbsp;<\/p>\n\n\n\n<p>Conditional Access can be located in the Microsoft admin centre under Protection> Conditional Access. Conditional Access policies on the\u00a0Policies\u00a0page can be filtered by administrators based on items such as the actor, target resource, condition, control applied, state, or date. This filtering ability enables administrators to identify specific policies based on their configuration quickly.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">To Conclude<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In conclusion, as businesses continue to migrate to cloud-based environments, securing access to critical documents and data becomes increasingly crucial. Implementing conditional access controls is a strategic approach to ensure that only authorised users and devices can access the necessary resources, while maintaining a seamless user experience.<\/p>\n\n\n\n<p>Tools like Microsoft Entra Conditional Access empower organisations with the ability to tailor security policies, ensuring that users access resources securely and efficiently. By leveraging these tools, organisations can effectively safeguard their assets and streamline operations, making conditional access not just a necessity but an essential part of modern business.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">About CWSI<\/mark><\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>CWSI are leading European cyber security specialists with over a decade of experience working with some of Europe\u2019s most security conscious organisations. Our mission is to enable organisations to work securely from anywhere on any device.<\/p>\n\n\n\n<p>Explore our \u2018<a href=\"https:\/\/cwsisecurity.com\/secure-cloud\/\">Secure Cloud Consultancy\u2019<\/a> to learn how CWSI can empower your employees to work from anywhere, safeguarding\u00a0 their identity and access. Furthermore, you can <a href=\"https:\/\/cwsisecurity.com\/contact-us\/\">contact us<\/a> to speak to one of our experts about how we can work together.<\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2024-06-28\/grgpq\" width=\"100%\" height=\"650\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n\n\n\n<div style=\"height:47px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/overview\">What is Conditional Access in Microsoft Entra ID? &#8211; Microsoft Entra ID | Microsoft Learn<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/oxfordcomputertraining.com\/glossary\/conditional-access\/\">What is Conditional Access and how does it work? (oxfordcomputertraining.com)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s modern landscape, where organisations increasingly rely on cloud-based services, managing access to essential documents and data has become a critical challenge. As businesses migrate their operations to the cloud, it becomes paramount to ensure that only authorised accounts have access to the correct information. This must be done whilst maintaining a seamless user [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":505,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4],"tags":[],"class_list":["post-3161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Conditional Access? | Blog | CWSI<\/title>\n<meta name=\"description\" content=\"Discover what Conditional Access is in this detailed guide from CWSI Security. We discuss how conditional access works, why we need it, and much more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Conditional Access? Explained\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-28T13:55:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-02T13:53:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-373@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"560\" \/>\n\t<meta property=\"og:image:height\" content=\"57\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/\"},\"headline\":\"What is Conditional Access? Explained\",\"datePublished\":\"2024-06-28T13:55:33+00:00\",\"dateModified\":\"2025-12-02T13:53:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/\"},\"wordCount\":753,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-373@2x.png\",\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/\",\"name\":\"What is Conditional Access? | Blog | CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-373@2x.png\",\"datePublished\":\"2024-06-28T13:55:33+00:00\",\"dateModified\":\"2025-12-02T13:53:17+00:00\",\"description\":\"Discover what Conditional Access is in this detailed guide from CWSI Security. We discuss how conditional access works, why we need it, and much more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-373@2x.png\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-373@2x.png\",\"width\":560,\"height\":57},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-conditional-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Conditional Access? Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Conditional Access? | Blog | CWSI","description":"Discover what Conditional Access is in this detailed guide from CWSI Security. We discuss how conditional access works, why we need it, and much more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/","og_locale":"nl_NL","og_type":"article","og_title":"What is Conditional Access? Explained","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/","og_site_name":"CWSI","article_published_time":"2024-06-28T13:55:33+00:00","article_modified_time":"2025-12-02T13:53:17+00:00","og_image":[{"width":560,"height":57,"url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-373@2x.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/"},"headline":"What is Conditional Access? Explained","datePublished":"2024-06-28T13:55:33+00:00","dateModified":"2025-12-02T13:53:17+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/"},"wordCount":753,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-373@2x.png","articleSection":["Insights","Our Voice"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/","url":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/","name":"What is Conditional Access? | Blog | CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-373@2x.png","datePublished":"2024-06-28T13:55:33+00:00","dateModified":"2025-12-02T13:53:17+00:00","description":"Discover what Conditional Access is in this detailed guide from CWSI Security. We discuss how conditional access works, why we need it, and much more.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/#primaryimage","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-373@2x.png","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-373@2x.png","width":560,"height":57},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-conditional-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"What is Conditional Access? Explained"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=3161"}],"version-history":[{"count":0,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3161\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media\/505"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=3161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=3161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=3161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}