Create a JumpCloud-Managed VPN Using Pritunl

Get strong perimeter security with zero trust access control at sustainable costs with JumpCloud and Pritunl. The post Create a JumpCloud-Managed VPN Using Pritunl appeared first on JumpCloud ...
API security rise GitOps Finite State API APIs tokenization

The Rise of APIs and Risks of API Security

Some strange phrases have become cultural touchstones: “Hey, Siri,” “Hey, Alexa,” and “Hey, Google.” If you’ve ever uttered any of these phrases to ask for directions, play a song or find out ...
Security Boulevard

Experts Weigh-In on the U.S. Presidential Executive Order; Zero Trust Architecture and Identity Management

Zero Trust Overview Earlier this year, U.S. President Joe Biden signed the Executive Order (EO) on Improving the Nation’s Cybersecurity to “identify, deter, protect against, detect, and respond” to the ... The ...
legacy tech to zero trust

Transitioning From Legacy Tech to Zero Trust? Do These 4 Things

The biggest mistake SMEs make when making when switching from legacy tech to Zero Trust? Not mapping out incremental steps to... The post Transitioning From Legacy Tech to Zero Trust? Do These ...

Supercharge Fortinet NGFW Security with JumpCloud SSO and Conditional Access

JumpCloud’s IAM security controls supercharge firewall and SSL VPN security through its directory, conditional access, and MFA. The post Supercharge Fortinet NGFW Security with JumpCloud SSO and Conditional Access appeared first on ...
container zero-trust ZTNA

Protecting Container Workloads With a Zero-Trust Strategy

Zero-trust security models are rising in popularity as arguably the most practical and logical approach for securing container environments. Whereas traditional reactive security models focus on maintaining firewalls and enforcing a ‘deny ...
Security Boulevard
microsegmentation NDR network SASE K8s Network Traffic Analysis Security Goals

Microsegmentation and Zero-Trust Security

Zero-trust security is much more than just a buzzword. It is a critical mindset for organizations to consider as they encounter security challenges related to the growing distributed workforce that is accessing ...
Security Boulevard
Whac-A-Mole CHAMP!!!

IT Project Prioritization: How to Get It All Done (On a Budget)

Remember the Japanese arcade game Whac-A-Mole? If you have worked in IT long enough, chances are you have experienced several “Whac-a-Mole” days. The post IT Project Prioritization: How to Get It All Done ...
zero-trust ZTNA digital identities

Palo Alto Networks Makes the Case for ZTNA 2.0

Palo Alto Networks today launched a zero-trust network architecture (ZTNA) 2.0 initiative defined by an ability to apply more granular controls to remote access. Kumar Ramachandran, senior vice president of product at ...
Security Boulevard
Accessing File Shares on AD-Connected Windows File Servers the Easy Way

Accessing File Shares on AD-Connected Windows File Servers the Easy Way

Use a map network drive command to keep your File Servers and transition from Active Directory to JumpCloud. The post Accessing File Shares on AD-Connected Windows File Servers the Easy Way appeared ...