{"id":61227,"date":"2022-04-05T13:50:03","date_gmt":"2022-04-05T17:50:03","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=61227"},"modified":"2022-04-05T13:53:44","modified_gmt":"2022-04-05T17:53:44","slug":"securing-dispersed-resources-with-zero-trust","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust","title":{"rendered":"Securing Dispersed Resources with Zero Trust"},"content":{"rendered":"\n

Perimeter-based security is no longer the best way to secure your organization, especially with the proliferation of dispersed work. Now, a Zero Trust strategy is the preferred method to ensure all of your IT resources are secure, regardless of location. With JumpCloud\u2019s cloud directory, you can make Zero Trust<\/a> a reality by granting access to trusted devices, identities, and networks from a single admin console. Plus, monitor activity and secure resources with group-based access.<\/p>\n","protected":false},"excerpt":{"rendered":"

Perimeter-based security is no longer the best way to secure your organization, especially with the proliferation of dispersed work. Now, […]<\/p>\n","protected":false},"author":125,"featured_media":61672,"template":"page-templates\/resource-video.php","categories":[2337],"collection":[2775],"wheel_hubs":[2335],"platform":[],"resource_type":[2314],"funnel_stage":[],"coauthors":[2525],"acf":[],"yoast_head":"\nSecuring Dispersed Resources with Zero Trust - JumpCloud<\/title>\n<meta name=\"description\" content=\"Perimeter-based security is no longer the best way to secure your organization, especially with the proliferation of dispersed work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Dispersed Resources with Zero Trust\" \/>\n<meta property=\"og:description\" content=\"Perimeter-based security is no longer the best way to secure your organization, especially with the proliferation of dispersed work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-05T17:53:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/04\/JC_CondAccessVideo_FeaturedImage-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"kelsey.carlson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust\",\"url\":\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust\",\"name\":\"Securing Dispersed Resources with Zero Trust - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/04\/JC_CondAccessVideo_FeaturedImage-1.png\",\"datePublished\":\"2022-04-05T17:50:03+00:00\",\"dateModified\":\"2022-04-05T17:53:44+00:00\",\"description\":\"Perimeter-based security is no longer the best way to secure your organization, especially with the proliferation of dispersed work.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/04\/JC_CondAccessVideo_FeaturedImage-1.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/04\/JC_CondAccessVideo_FeaturedImage-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/jumpcloud.com\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing Dispersed Resources with Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Dispersed Resources with Zero Trust - JumpCloud","description":"Perimeter-based security is no longer the best way to secure your organization, especially with the proliferation of dispersed work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust","og_locale":"en_US","og_type":"article","og_title":"Securing Dispersed Resources with Zero Trust","og_description":"Perimeter-based security is no longer the best way to secure your organization, especially with the proliferation of dispersed work.","og_url":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust","og_site_name":"JumpCloud","article_modified_time":"2022-04-05T17:53:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/04\/JC_CondAccessVideo_FeaturedImage-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute","Written by":"kelsey.carlson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust","url":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust","name":"Securing Dispersed Resources with Zero Trust - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/04\/JC_CondAccessVideo_FeaturedImage-1.png","datePublished":"2022-04-05T17:50:03+00:00","dateModified":"2022-04-05T17:53:44+00:00","description":"Perimeter-based security is no longer the best way to secure your organization, especially with the proliferation of dispersed work.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/04\/JC_CondAccessVideo_FeaturedImage-1.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/04\/JC_CondAccessVideo_FeaturedImage-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/resources\/securing-dispersed-resources-with-zero-trust#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/jumpcloud.com\/resources"},{"@type":"ListItem","position":3,"name":"Securing Dispersed Resources with Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource\/61227"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/61672"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=61227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=61227"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=61227"},{"taxonomy":"wheel_hubs","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/wheel_hubs?post=61227"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=61227"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource_type?post=61227"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=61227"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=61227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}