Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2659,"date":"2024-03-06T01:53:17","date_gmt":"2024-03-06T01:53:17","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/"},"modified":"2024-03-06T01:53:17","modified_gmt":"2024-03-06T01:53:17","slug":"cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/","title":{"rendered":"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm"},"content":{"rendered":"

Welcome \u201cInvestigate API\u201d into the Cisco Cloud Security API experience<\/h2>\n

Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

Welcome \u201cInvestigate API\u201d into the Cisco Cloud Security API experience<\/h2>\n

Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to Investigate API alongside other Umbrella APIs, utilizing a modern OAuth2 mechanism<\/a>. Previously, the process for authenticating the Investigate API<\/a> involved generating a specific Investigate API token (basic authentication) via the Investigate section in the user interface.<\/p>\n

Cisco customers and partners can also extensively utilize the Investigate API to enhance the data in their Security Information and Event Management (SIEM) systems, threat intelligence platforms, or incident management workflows. This enables them to promptly identify critical security events and provide additional information for security analysts and incident responders. The Investigate API is also a fundamental component in major integrations, such as Cisco XDR.<\/p>\n

In the screenshot below you can see how you can now set the description for the related API Key in the Umbrella dashboard.<\/p>\n\n

If we take into account cases where clients integrate Umbrella with a lot of 3d party platforms, descriptions can provide clarity as to the use of related API credentials. For example, you can add a description like \u201cInvestigate API Key with Read\/Write admin scope for Splunk.\u201d<\/p>\n

Restrict API access from specific IPs<\/h2>\n

Limiting API access for a given API Key<\/a> to a specific IP address or range of addresses is now possible. This significant security enhancement guarantees that customer API requests originate solely from secure and authorized locations. DevSecOps teams and administrators can now enforce that these requests are made exclusively from designated IP addresses or ranges and work with both IPv4 and IPv6 sources.<\/p>\n\n

A few more API updates<\/h2>\n

You can now seamlessly apply Internal Domains to Sites from the existing POST request<\/a>.
\nFor Application Discovery, now it\u2019s possible to
get a list of application attributes<\/a>, including Vulnerabilities, Application Security, Access Controls, Audibility, and others for detected applications.
\nFor a
list of Application API operation<\/a>, It\u2019s now possible to sort by Weighted Risk and Last Detected (in addition to First Detected).<\/p>\n

Try these updates in the DevNet Sandbox<\/h2>\n

Give it a try! Play with these updates using the Umbrella DevNet Sandbox<\/a>.<\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0See how developers can utilize the Investigate API to enhance the data in their Security Information and Event Management (SIEM) systems, threat intelligence platforms, or incident management workflows.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Welcome \u201cInvestigate API\u201d into the Cisco Cloud Security API experience<\/h2>\n

Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

Welcome \u201cInvestigate API\u201d into the Cisco Cloud Security API experience<\/h2>\n

Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to Investigate API alongside other Umbrella APIs, utilizing a modern OAuth2 mechanism<\/a>. Previously, the process for authenticating the Investigate API<\/a> involved generating a specific Investigate API token (basic authentication) via the Investigate section in the user interface.<\/p>\n

Cisco customers and partners can also extensively utilize the Investigate API to enhance the data in their Security Information and Event Management (SIEM) systems, threat intelligence platforms, or incident management workflows. This enables them to promptly identify critical security events and provide additional information for security analysts and incident responders. The Investigate API is also a fundamental component in major integrations, such as Cisco XDR.<\/p>\n

In the screenshot below you can see how you can now set the description for the related API Key in the Umbrella dashboard.<\/p>\n

If we take into account cases where clients integrate Umbrella with a lot of 3d party platforms, descriptions can provide clarity as to the use of related API credentials. For example, you can add a description like \u201cInvestigate API Key with Read\/Write admin scope for Splunk.\u201d<\/p>\n

Restrict API access from specific IPs<\/h2>\n

Limiting API access for a given API Key<\/a> to a specific IP address or range of addresses is now possible. This significant security enhancement guarantees that customer API requests originate solely from secure and authorized locations. DevSecOps teams and administrators can now enforce that these requests are made exclusively from designated IP addresses or ranges and work with both IPv4 and IPv6 sources.<\/p>\n

A few more API updates<\/h2>\n

You can now seamlessly apply Internal Domains to Sites from the existing POST request<\/a>.
\nFor Application Discovery, now it\u2019s possible to
get a list of application attributes<\/a>, including Vulnerabilities, Application Security, Access Controls, Audibility, and others for detected applications.
\nFor a
list of Application API operation<\/a>, It\u2019s now possible to sort by Weighted Risk and Last Detected (in addition to First Detected).<\/p>\n

Try these updates in the DevNet Sandbox<\/h2>\n

Give it a try! Play with these updates using the Umbrella DevNet Sandbox<\/a>.<\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0See how developers can utilize the Investigate API to enhance the data in their Security Information and Event Management (SIEM) systems, threat intelligence platforms, or incident management workflows.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2660,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2659","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nCloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm\" \/>\n<meta property=\"og:description\" content=\"Welcome \u201cInvestigate API\u201d into the Cisco Cloud Security API experience Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to\u2026 Read more on Cisco Blogs \u200b[[{"value":" Welcome \u201cInvestigate API\u201d into the Cisco Cloud Security API experience Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to Investigate API alongside other Umbrella APIs, utilizing a modern OAuth2 mechanism. Previously, the process for authenticating the Investigate API involved generating a specific Investigate API token (basic authentication) via the Investigate section in the user interface. Cisco customers and partners can also extensively utilize the Investigate API to enhance the data in their Security Information and Event Management (SIEM) systems, threat intelligence platforms, or incident management workflows. This enables them to promptly identify critical security events and provide additional information for security analysts and incident responders. The Investigate API is also a fundamental component in major integrations, such as Cisco XDR. In the screenshot below you can see how you can now set the description for the related API Key in the Umbrella dashboard. If we take into account cases where clients integrate Umbrella with a lot of 3d party platforms, descriptions can provide clarity as to the use of related API credentials. For example, you can add a description like \u201cInvestigate API Key with Read\/Write admin scope for Splunk.\u201d Restrict API access from specific IPs Limiting API access for a given API Key to a specific IP address or range of addresses is now possible. This significant security enhancement guarantees that customer API requests originate solely from secure and authorized locations. DevSecOps teams and administrators can now enforce that these requests are made exclusively from designated IP addresses or ranges and work with both IPv4 and IPv6 sources. A few more API updates You can now seamlessly apply Internal Domains to Sites from the existing POST request. For Application Discovery, now it\u2019s possible to get a list of application attributes, including Vulnerabilities, Application Security, Access Controls, Audibility, and others for detected applications. For a list of Application API operation, It\u2019s now possible to sort by Weighted Risk and Last Detected (in addition to First Detected). Try these updates in the DevNet Sandbox Give it a try! Play with these updates using the Umbrella DevNet Sandbox. Share Share: "}]]\u00a0\u00a0See how developers can utilize the Investigate API to enhance the data in their Security Information and Event Management (SIEM) systems, threat intelligence platforms, or incident management workflows.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-06T01:53:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm\",\"datePublished\":\"2024-03-06T01:53:17+00:00\",\"dateModified\":\"2024-03-06T01:53:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/\"},\"wordCount\":441,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/\",\"name\":\"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif\",\"datePublished\":\"2024-03-06T01:53:17+00:00\",\"dateModified\":\"2024-03-06T01:53:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm","og_description":"Welcome \u201cInvestigate API\u201d into the Cisco Cloud Security API experience Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to\u2026 Read more on Cisco Blogs \u200b[[{\"value\":\" Welcome \u201cInvestigate API\u201d into the Cisco Cloud Security API experience Developers and engineers can now leverage the new Umbrella API authentication to create API keys. This includes access to Investigate API alongside other Umbrella APIs, utilizing a modern OAuth2 mechanism. Previously, the process for authenticating the Investigate API involved generating a specific Investigate API token (basic authentication) via the Investigate section in the user interface. Cisco customers and partners can also extensively utilize the Investigate API to enhance the data in their Security Information and Event Management (SIEM) systems, threat intelligence platforms, or incident management workflows. This enables them to promptly identify critical security events and provide additional information for security analysts and incident responders. The Investigate API is also a fundamental component in major integrations, such as Cisco XDR. In the screenshot below you can see how you can now set the description for the related API Key in the Umbrella dashboard. If we take into account cases where clients integrate Umbrella with a lot of 3d party platforms, descriptions can provide clarity as to the use of related API credentials. For example, you can add a description like \u201cInvestigate API Key with Read\/Write admin scope for Splunk.\u201d Restrict API access from specific IPs Limiting API access for a given API Key to a specific IP address or range of addresses is now possible. This significant security enhancement guarantees that customer API requests originate solely from secure and authorized locations. DevSecOps teams and administrators can now enforce that these requests are made exclusively from designated IP addresses or ranges and work with both IPv4 and IPv6 sources. A few more API updates You can now seamlessly apply Internal Domains to Sites from the existing POST request. For Application Discovery, now it\u2019s possible to get a list of application attributes, including Vulnerabilities, Application Security, Access Controls, Audibility, and others for detected applications. For a list of Application API operation, It\u2019s now possible to sort by Weighted Risk and Last Detected (in addition to First Detected). Try these updates in the DevNet Sandbox Give it a try! Play with these updates using the Umbrella DevNet Sandbox. Share Share: \"}]]\u00a0\u00a0See how developers can utilize the Investigate API to enhance the data in their Security Information and Event Management (SIEM) systems, threat intelligence platforms, or incident management workflows.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/","og_site_name":"JHC","article_published_time":"2024-03-06T01:53:17+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/"},"author":{"name":"","@id":""},"headline":"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm","datePublished":"2024-03-06T01:53:17+00:00","dateModified":"2024-03-06T01:53:17+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/"},"wordCount":441,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/","url":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/","name":"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif","datePublished":"2024-03-06T01:53:17+00:00","dateModified":"2024-03-06T01:53:17+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16602702-ds9iHR.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/cloud-security-api-updates-improve-users-experience-oleksii-borysenko-on-march-5-2024-at-401-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Cloud Security API Updates Improve User\u2019s Experience Oleksii Borysenko on March 5, 2024 at 4:01 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2659"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2659\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2660"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}