{"id":48742,"date":"2020-12-16T17:16:24","date_gmt":"2020-12-16T22:16:24","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=48742"},"modified":"2021-09-15T17:27:29","modified_gmt":"2021-09-15T21:27:29","slug":"simplify-zero-trust-security-from-the-cloud","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/simplify-zero-trust-security-from-the-cloud","title":{"rendered":"Simplify Zero Trust Security from the Cloud"},"content":{"rendered":"\n
The 2020 shift to work-from-home was the final straw for admins who used perimeter security. In its place, organizations must implement a Zero Trust model to secure user identities, resource access, and devices seamlessly regardless of their location. This doesn\u2019t need to be an expensive or laborious undertaking, though. Using this guide, you can implement Zero Trust Security in a way that\u2019s cost efficient and simple for your organization and straightforward for your users.<\/p>\n\n\n\n
\n
The 2020 shift to work-from-home was the final straw for admins who used perimeter security. In its place, organizations must […]<\/p>\n","protected":false},"author":116,"featured_media":0,"template":"page-templates\/gated-content.php","categories":[2337],"collection":[2775],"wheel_hubs":[2328,2335],"platform":[],"resource_type":[2311],"funnel_stage":[],"coauthors":[],"acf":[],"yoast_head":"\n