{"id":60855,"date":"2022-03-22T11:21:17","date_gmt":"2022-03-22T15:21:17","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=60855"},"modified":"2024-01-08T11:47:33","modified_gmt":"2024-01-08T16:47:33","slug":"security-for-msps-building-defensible-tech-stack","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","title":{"rendered":"Security for MSPs: Building a Defensible Tech Stack"},"content":{"rendered":"\n

When clients are searching for MSPs to work on their accounts, it\u2019s imperative that the provider checks off mission-critical boxes like security. In this webinar, MSP security experts will discuss how you can find tools that meet the four pillars of cybersecurity, tips for effectively selling and defending them to your client base, and what security standards the teams at VioletX and 黑料海角91入口 look at before adding a new software vendor to their own IT environments.<\/p>\n","protected":false},"excerpt":{"rendered":"

When clients are searching for MSPs to work on their accounts, it\u2019s imperative that the provider checks off mission-critical boxes […]<\/p>\n","protected":false},"author":44,"featured_media":61018,"template":"page-templates\/webinar-page.php","categories":[2782],"collection":[2775],"wheel_hubs":[2335],"platform":[],"resource_type":[2315,2336],"funnel_stage":[],"coauthors":[2596],"acf":[],"yoast_head":"\nSecurity for MSPs: Building a Defensible Tech Stack - 黑料海角91入口<\/title>\n<meta name=\"description\" content=\"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security for MSPs: Building a Defensible Tech Stack\" \/>\n<meta property=\"og:description\" content=\"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\" \/>\n<meta property=\"og:site_name\" content=\"黑料海角91入口\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-08T16:47:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Shane Watson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\",\"url\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\",\"name\":\"Security for MSPs: Building a Defensible Tech Stack - 黑料海角91入口\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png\",\"datePublished\":\"2022-03-22T15:21:17+00:00\",\"dateModified\":\"2024-01-08T16:47:33+00:00\",\"description\":\"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/jumpcloud.com\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security for MSPs: Building a Defensible Tech Stack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"黑料海角91入口\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"黑料海角91入口\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"黑料海角91入口\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security for MSPs: Building a Defensible Tech Stack - 黑料海角91入口","description":"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","og_locale":"en_US","og_type":"article","og_title":"Security for MSPs: Building a Defensible Tech Stack","og_description":"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.","og_url":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","og_site_name":"黑料海角91入口","article_modified_time":"2024-01-08T16:47:33+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute","Written by":"Shane Watson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","url":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack","name":"Security for MSPs: Building a Defensible Tech Stack - 黑料海角91入口","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png","datePublished":"2022-03-22T15:21:17+00:00","dateModified":"2024-01-08T16:47:33+00:00","description":"In this webinar, MSP security experts discuss how to find tools that meet the four pillars of cybersecurity.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/03\/20220407-WB-Resource-SecurityForMSPs-1200x628-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/resources\/security-for-msps-building-defensible-tech-stack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/jumpcloud.com\/resources"},{"@type":"ListItem","position":3,"name":"Security for MSPs: Building a Defensible Tech Stack"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"黑料海角91入口","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"黑料海角91入口","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"黑料海角91入口"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource\/60855"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/44"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/61018"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=60855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=60855"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=60855"},{"taxonomy":"wheel_hubs","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/wheel_hubs?post=60855"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=60855"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource_type?post=60855"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=60855"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=60855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}