{"id":60855,"date":"2022-03-22T11:21:17","date_gmt":"2022-03-22T15:21:17","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=60855"},"modified":"2024-01-08T11:47:33","modified_gmt":"2024-01-08T16:47:33","slug":"security-for-msps-building-defensible-tech-stack","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","title":{"rendered":"Security for MSPs: Building a Defensible Tech Stack"},"content":{"rendered":"\n

When clients are searching for MSPs to work on their accounts, it\u2019s imperative that the provider checks off mission-critical boxes like security. In this webinar, MSP security experts will discuss how you can find tools that meet the four pillars of cybersecurity, tips for effectively selling and defending them to your client base, and what security standards the teams at VioletX and JumpCloud look at before adding a new software vendor to their own IT environments.<\/p>\n","protected":false},"excerpt":{"rendered":"

When clients are searching for MSPs to work on their accounts, it\u2019s imperative that the provider checks off mission-critical boxes […]<\/p>\n","protected":false},"author":44,"featured_media":61018,"template":"page-templates\/webinar-page.php","categories":[2782],"collection":[2775],"wheel_hubs":[2335],"platform":[],"resource_type":[2315,2336],"funnel_stage":[],"coauthors":[2596],"acf":[],"yoast_head":"\nSecurity for MSPs: Building a Defensible Tech Stack - JumpCloud<\/title>\n<meta name=\"description\" content=\"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security for MSPs: Building a Defensible Tech Stack\" \/>\n<meta property=\"og:description\" content=\"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-08T16:47:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Shane Watson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\",\"url\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\",\"name\":\"Security for MSPs: Building a Defensible Tech Stack - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png\",\"datePublished\":\"2022-03-22T15:21:17+00:00\",\"dateModified\":\"2024-01-08T16:47:33+00:00\",\"description\":\"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/jumpcloud.com\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security for MSPs: Building a Defensible Tech Stack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security for MSPs: Building a Defensible Tech Stack - JumpCloud","description":"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","og_locale":"en_US","og_type":"article","og_title":"Security for MSPs: Building a Defensible Tech Stack","og_description":"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.","og_url":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","og_site_name":"JumpCloud","article_modified_time":"2024-01-08T16:47:33+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute","Written by":"Shane Watson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","url":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","name":"Security for MSPs: Building a Defensible Tech Stack - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png","datePublished":"2022-03-22T15:21:17+00:00","dateModified":"2024-01-08T16:47:33+00:00","description":"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/jumpcloud.com\/resources"},{"@type":"ListItem","position":3,"name":"Security for MSPs: Building a Defensible Tech Stack"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource\/60855"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/44"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/61018"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=60855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=60855"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=60855"},{"taxonomy":"wheel_hubs","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/wheel_hubs?post=60855"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=60855"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource_type?post=60855"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=60855"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=60855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}