zero trust
Create a JumpCloud-Managed VPN Using Pritunl
Get strong perimeter security with zero trust access control at sustainable costs with JumpCloud and Pritunl. The post Create a JumpCloud-Managed VPN Using Pritunl appeared first on JumpCloud ...

The Rise of APIs and Risks of API Security
Some strange phrases have become cultural touchstones: “Hey, Siri,” “Hey, Alexa,” and “Hey, Google.” If you’ve ever uttered any of these phrases to ask for directions, play a song or find out ...
Experts Weigh-In on the U.S. Presidential Executive Order; Zero Trust Architecture and Identity Management
Zero Trust Overview Earlier this year, U.S. President Joe Biden signed the Executive Order (EO) on Improving the Nation’s Cybersecurity to “identify, deter, protect against, detect, and respond” to the ... The ...

Transitioning From Legacy Tech to Zero Trust? Do These 4 Things
The biggest mistake SMEs make when making when switching from legacy tech to Zero Trust? Not mapping out incremental steps to... The post Transitioning From Legacy Tech to Zero Trust? Do These ...
Supercharge Fortinet NGFW Security with JumpCloud SSO and Conditional Access
JumpCloud’s IAM security controls supercharge firewall and SSL VPN security through its directory, conditional access, and MFA. The post Supercharge Fortinet NGFW Security with JumpCloud SSO and Conditional Access appeared first on ...

Protecting Container Workloads With a Zero-Trust Strategy
Zero-trust security models are rising in popularity as arguably the most practical and logical approach for securing container environments. Whereas traditional reactive security models focus on maintaining firewalls and enforcing a ‘deny ...

Microsegmentation and Zero-Trust Security
Zero-trust security is much more than just a buzzword. It is a critical mindset for organizations to consider as they encounter security challenges related to the growing distributed workforce that is accessing ...

IT Project Prioritization: How to Get It All Done (On a Budget)
Remember the Japanese arcade game Whac-A-Mole? If you have worked in IT long enough, chances are you have experienced several “Whac-a-Mole” days. The post IT Project Prioritization: How to Get It All Done ...

Palo Alto Networks Makes the Case for ZTNA 2.0
Palo Alto Networks today launched a zero-trust network architecture (ZTNA) 2.0 initiative defined by an ability to apply more granular controls to remote access. Kumar Ramachandran, senior vice president of product at ...

Accessing File Shares on AD-Connected Windows File Servers the Easy Way
Use a map network drive command to keep your File Servers and transition from Active Directory to JumpCloud. The post Accessing File Shares on AD-Connected Windows File Servers the Easy Way appeared ...