{"id":57073,"date":"2021-12-01T20:40:47","date_gmt":"2021-12-02T01:40:47","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=57073"},"modified":"2024-04-22T13:59:04","modified_gmt":"2024-04-22T17:59:04","slug":"the-five-key-components-of-modern-device-management-whitepaper","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/the-five-key-components-of-modern-device-management-whitepaper","title":{"rendered":"The Five Key Components of Modern Device Management"},"content":{"rendered":"\n
Is your workforce using only Windows devices? We thought not. Today\u2019s fleets often include Mac, Windows, and Linux devices \u2014 and both users and IT admins may be working from anywhere. That\u2019s why device management is at the core of today\u2019s IT security, keeping workers productive and protecting your org from costly security breaches.<\/p>\n","protected":false},"excerpt":{"rendered":"
Is your workforce using only Windows devices? We thought not. Today\u2019s fleets often include Mac, Windows, and Linux devices \u2014 […]<\/p>\n","protected":false},"author":125,"featured_media":51934,"template":"page-templates\/resource-download.php","categories":[23],"collection":[],"wheel_hubs":[2328],"platform":[],"resource_type":[2312],"funnel_stage":[],"coauthors":[2525],"acf":[],"yoast_head":"\n