Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":3694,"date":"2024-07-31T00:53:32","date_gmt":"2024-07-31T00:53:32","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/"},"modified":"2024-07-31T00:53:32","modified_gmt":"2024-07-31T00:53:32","slug":"why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/","title":{"rendered":"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa"},"content":{"rendered":"

In response to today\u2019s sophisticated threat landscape, organizations around the world are prioritizing cybersecurity more and more. However, these organizations often overlook a critical part of the picture when it comes to bolstering their security postures and reducing risk. <\/p>\n

When organizations think about cybersecurity, they tend to think of securing their workforce. While this is important, it isn\u2019t just internal users that access their IT applications\u2014there are also third-party or B2B users throughout the supply chain who have legitimate reasons for connecting to corporate apps. Examples of these external entities include channel partners, technology partners, vendors, customers, and more. <\/p>\n

Why you should secure third-party access to appsExtending app access to third parties enhances interorganizational collaboration and allows organizations to operate more productively. However, B2B access also exposes organizations to increased risk. <\/p>\n

Naturally, allowing a third party into your environment means that their security posture is going to impact your security posture. That is, if their organization doesn\u2019t do the best job of preventing cyberattacks, then it is more likely that they will bring threats with them into your ecosystem. But even if that is not the case, and a B2B partner has an immaculate security posture, one of their users can still cause damage either maliciously or carelessly. <\/p>\n

How not to secure third-party access to appsHistorically, organizations have used a few go-to methods in an attempt to provide secure access to third parties:<\/p>\n

Site-to-site VPNs can offer network connectivity between the office locations of separate organizations so that their resources can be accessed by each other\u2019s users.
\nServer-to-server connectivity involves leveraging the internet to provide third-party access to EDI and ERP servers.
\nTraditional \u201csupplier portals\u201d provide a consolidated interface that offers access to multiple applications via the internet.
\nBackend application access via API (application programming interface) offers yet another way for third parties to interact with IT resources. <\/p>\n

Unfortunately, these \u201csolutions\u201d create more problems than they solve. That\u2019s because they are underpinned by the philosophical assumptions of what is known as castle-and-moat security (you can read more about this architectural approach here). So, what are these problems?<\/p>\n

They expand the attack surface: The above tactics entail the use of inbound demilitarized zones (DMZs), open firewall ports, and apps and servers that are exposed to the internet. But this does more than facilitate access for business partners\u2014cybercriminals can also traverse the web and find these entry points into the organization. This gives them an attack surface that they are all too eager to assault.
\nThey enable lateral threat movement: Castle-and-moat methodologies are intended to defend access to the network. But once an attacker gets past the moat (the secure perimeter) and into the castle (the network), it means they overcame the organization\u2019s primary defense. As a result, they can move laterally, across the connected IT resources within that network, and expand the reaches of their breaches.
\nThey increase complexity and cost: Building hub-and-spoke networks and castle-and-moat security architectures is a complex endeavor that involves expensive labor and countless costly appliances. Additionally, the ongoing management of these complex environments is a massive undertaking that requires significant amounts of time from administrators and, as a result, continuously leads to extensive overhead costs.<\/p>\n

Organizations around the world have been grappling with these issues for decades. Clearly, the status quo must go.<\/p>\n

How to secure third-party access to appsUnlike traditional tools built upon perimeter-based architectures, zero trust is ideal for extending secure app access to B2B partners. That\u2019s because zero trust is a distinct architecture that is based upon the principle of least-privileged access, whereby users get access only to what they need and excessive permissions are avoided. This approach is ideal in manufacturing, banking, consumer goods, and other industry verticals where there are complex supply chains and third parties regularly accessing IT resources. <\/p>\n

Zscaler for B2BWith Zscaler, organizations get zero trust architecture delivered as a service from the world\u2019s largest inline security cloud, the Zscaler Zero Trust Exchange. To put it simply, Zscaler acts as an intelligent switchboard to provide secure any-to-any connectivity in a one-to-one fashion that does not extend the network to anyone or anything. Embracing this architecture and departing from the traditional castle-and-moat model of security allows organizations to securely facilitate B2B app access. With Zscaler, you can:<\/p>\n

Minimize your attack surface: Zero trust eliminates the need for inbound DMZs, firewalls and their open ports, and the exposing of apps, servers, and portals to the public internet. Instead of allowing inbound connections, you can leverage inside-out connections and hide your IT resources behind a zero trust cloud.
\nPrevent lateral threat movement: Unlike castle-and-moat architectures and legacy tools that extend access to the network as a whole, zero trust architecture provides direct-to-app connectivity. That means attackers, third parties, and internal users are unable to abuse network access to reach resources connected to that network.
\nDecrease complexity and cost: Embracing cloud-delivered zero trust means retiring yesterday\u2019s tools and the perimeter-based architectures they presuppose. As a result, you can avoid the complexity of hub-and-spoke networks and castle-and-moat security models, drastically reducing both hardware costs and management overhead.<\/p>\n

To learn more information about Zscaler for B2B and how it can help your organization secure third-party access, visit our webpage here. <\/p>\n

Or, if you would like to hear more about zero trust architecture in general, register for our webinar, \u201cStart Here: An Introduction to Zero Trust.\u201d\u00a0\u00a0<\/p>\n

\u200b<\/p>\n

In response to today\u2019s sophisticated threat landscape, organizations around the world are prioritizing cybersecurity more and more. However, these organizations often overlook a critical part of the picture when it comes to bolstering their security postures and reducing risk.\u00a0<\/p>\n

When organizations think about cybersecurity, they tend to think of securing\u00a0their<\/em> workforce. While this is important, it isn\u2019t just internal users that access their IT applications\u2014there are also third-party or B2B users throughout the supply chain who have legitimate reasons for connecting to corporate apps. Examples of these external entities include channel partners, technology partners, vendors, customers, and more.\u00a0<\/p>\n

Why you should secure third-party access to apps<\/h2>\n

Extending app access to third parties enhances interorganizational collaboration and allows organizations to operate more productively. However, B2B access also exposes organizations to increased risk.\u00a0<\/p>\n

Naturally, allowing a third party into your environment means that their security posture is going to impact your security posture. That is, if their organization doesn\u2019t do the best job of preventing cyberattacks, then it is more likely that they will bring threats with them into your ecosystem. But even if that is not the case, and a B2B partner has an immaculate security posture, one of their users can still cause damage either maliciously or carelessly.\u00a0<\/p>\n

How\u00a0not<\/em> to secure third-party access to apps<\/h2>\n

Historically, organizations have used a few go-to methods in an attempt to provide secure access to third parties:<\/p>\n

Site-to-site VPNs<\/strong> can offer network connectivity between the office locations of separate organizations so that their resources can be accessed by each other\u2019s users.\u00a0Server-to-server connectivity<\/strong> involves leveraging the internet to provide third-party access to EDI and ERP servers.\u00a0Traditional \u201csupplier portals\u201d<\/strong> provide a consolidated interface that offers access to multiple applications via the internet.\u00a0Backend application access via API<\/strong> (application programming interface) offers yet another way for third parties to interact with IT resources.\u00a0<\/p>\n

Unfortunately, these \u201csolutions\u201d create more problems than they solve. That\u2019s because they are underpinned by the philosophical assumptions of what is known as castle-and-moat security (you can read more about this architectural approach\u00a0here<\/a>). So, what are these problems?<\/p>\n

They expand the attack surface:<\/strong> The above tactics entail the use of inbound demilitarized zones (DMZs<\/a>), open firewall ports, and apps and servers that are exposed to the internet. But this does more than facilitate access for business partners\u2014cybercriminals can also traverse the web and find these entry points into the organization. This gives them an attack surface that they are all too eager to assault.\u00a0They enable lateral threat movement:<\/strong> Castle-and-moat methodologies are intended to defend access to the network. But once an attacker gets past the moat (the secure perimeter) and into the castle (the network), it means they overcame the organization\u2019s primary defense. As a result, they can move laterally, across the connected IT resources within that network, and expand the reaches of their breaches.\u00a0They increase complexity and cost:<\/strong>Building hub-and-spoke networks and castle-and-moat security architectures is a complex endeavor that involves expensive labor and countless\u00a0costly appliances<\/a>. Additionally, the ongoing management of these complex environments is a massive undertaking that requires significant amounts of time from administrators and, as a result, continuously leads to extensive\u00a0overhead costs<\/a>.<\/p>\n

Organizations around the world have been grappling with these issues for decades. Clearly, the status quo must go.<\/p>\n

How to secure third-party access to apps<\/h2>\n

Unlike traditional tools built upon perimeter-based architectures, zero trust is ideal for extending secure app access to B2B partners. That\u2019s because zero trust is a distinct architecture that is based upon the principle of least-privileged access, whereby users get access only to what they need and excessive permissions are avoided. This approach is ideal in manufacturing, banking, consumer goods, and other industry verticals where there are complex supply chains and third parties regularly accessing IT resources.\u00a0<\/p>\n

Zscaler for B2B<\/h2>\n

With Zscaler, organizations get zero trust architecture delivered as a service from the world\u2019s largest inline security cloud, the Zscaler\u00a0Zero Trust Exchange<\/a>. To put it simply, Zscaler acts as an intelligent switchboard to provide secure any-to-any connectivity in a one-to-one fashion that does not extend the network to anyone or anything. Embracing this architecture and departing from the traditional castle-and-moat model of security allows organizations to securely facilitate B2B app access. With Zscaler, you can:<\/p>\n

Minimize your attack surface:<\/strong> Zero trust eliminates the need for inbound DMZs, firewalls and their open ports, and the exposing of apps, servers, and portals to the public internet. Instead of allowing inbound connections, you can leverage\u00a0inside-out connections<\/a> and hide your IT resources behind a zero trust cloud.\u00a0Prevent lateral threat movement:<\/strong>Unlike castle-and-moat architectures and legacy tools that extend access to the network as a whole, zero trust architecture provides direct-to-app connectivity. That means attackers, third parties, and internal users are unable to abuse network access to reach resources connected to that network.\u00a0Decrease complexity and cost:<\/strong>Embracing cloud-delivered zero trust means retiring yesterday\u2019s tools and the perimeter-based architectures they presuppose. As a result, you can avoid the complexity of hub-and-spoke networks and castle-and-moat security models, drastically reducing both hardware costs and management overhead.<\/p>\n

To learn more information about Zscaler for B2B and how it can help your organization secure third-party access,\u00a0visit our webpage here<\/a>.\u00a0<\/p>\n

Or, if you would like to hear more about zero trust architecture in general, register for our webinar, \u201cStart Here: An Introduction to Zero Trust<\/a>.\u201d<\/p>\n

\u00a0[[{“value”:”In response to today\u2019s sophisticated threat landscape, organizations around the world are prioritizing cybersecurity more and more. However, these organizations often overlook a critical part of the picture when it comes to bolstering their security postures and reducing risk. <\/p>\n

When organizations think about cybersecurity, they tend to think of securing their workforce. While this is important, it isn\u2019t just internal users that access their IT applications\u2014there are also third-party or B2B users throughout the supply chain who have legitimate reasons for connecting to corporate apps. Examples of these external entities include channel partners, technology partners, vendors, customers, and more. <\/p>\n

Why you should secure third-party access to appsExtending app access to third parties enhances interorganizational collaboration and allows organizations to operate more productively. However, B2B access also exposes organizations to increased risk. <\/p>\n

Naturally, allowing a third party into your environment means that their security posture is going to impact your security posture. That is, if their organization doesn\u2019t do the best job of preventing cyberattacks, then it is more likely that they will bring threats with them into your ecosystem. But even if that is not the case, and a B2B partner has an immaculate security posture, one of their users can still cause damage either maliciously or carelessly. <\/p>\n

How not to secure third-party access to appsHistorically, organizations have used a few go-to methods in an attempt to provide secure access to third parties:<\/p>\n

Site-to-site VPNs can offer network connectivity between the office locations of separate organizations so that their resources can be accessed by each other\u2019s users.
\nServer-to-server connectivity involves leveraging the internet to provide third-party access to EDI and ERP servers.
\nTraditional \u201csupplier portals\u201d provide a consolidated interface that offers access to multiple applications via the internet.
\nBackend application access via API (application programming interface) offers yet another way for third parties to interact with IT resources. <\/p>\n

Unfortunately, these \u201csolutions\u201d create more problems than they solve. That\u2019s because they are underpinned by the philosophical assumptions of what is known as castle-and-moat security (you can read more about this architectural approach here). So, what are these problems?<\/p>\n

They expand the attack surface: The above tactics entail the use of inbound demilitarized zones (DMZs), open firewall ports, and apps and servers that are exposed to the internet. But this does more than facilitate access for business partners\u2014cybercriminals can also traverse the web and find these entry points into the organization. This gives them an attack surface that they are all too eager to assault.
\nThey enable lateral threat movement: Castle-and-moat methodologies are intended to defend access to the network. But once an attacker gets past the moat (the secure perimeter) and into the castle (the network), it means they overcame the organization\u2019s primary defense. As a result, they can move laterally, across the connected IT resources within that network, and expand the reaches of their breaches.
\nThey increase complexity and cost: Building hub-and-spoke networks and castle-and-moat security architectures is a complex endeavor that involves expensive labor and countless costly appliances. Additionally, the ongoing management of these complex environments is a massive undertaking that requires significant amounts of time from administrators and, as a result, continuously leads to extensive overhead costs.<\/p>\n

Organizations around the world have been grappling with these issues for decades. Clearly, the status quo must go.<\/p>\n

How to secure third-party access to appsUnlike traditional tools built upon perimeter-based architectures, zero trust is ideal for extending secure app access to B2B partners. That\u2019s because zero trust is a distinct architecture that is based upon the principle of least-privileged access, whereby users get access only to what they need and excessive permissions are avoided. This approach is ideal in manufacturing, banking, consumer goods, and other industry verticals where there are complex supply chains and third parties regularly accessing IT resources. <\/p>\n

Zscaler for B2BWith Zscaler, organizations get zero trust architecture delivered as a service from the world\u2019s largest inline security cloud, the Zscaler Zero Trust Exchange. To put it simply, Zscaler acts as an intelligent switchboard to provide secure any-to-any connectivity in a one-to-one fashion that does not extend the network to anyone or anything. Embracing this architecture and departing from the traditional castle-and-moat model of security allows organizations to securely facilitate B2B app access. With Zscaler, you can:<\/p>\n

Minimize your attack surface: Zero trust eliminates the need for inbound DMZs, firewalls and their open ports, and the exposing of apps, servers, and portals to the public internet. Instead of allowing inbound connections, you can leverage inside-out connections and hide your IT resources behind a zero trust cloud.
\nPrevent lateral threat movement: Unlike castle-and-moat architectures and legacy tools that extend access to the network as a whole, zero trust architecture provides direct-to-app connectivity. That means attackers, third parties, and internal users are unable to abuse network access to reach resources connected to that network.
\nDecrease complexity and cost: Embracing cloud-delivered zero trust means retiring yesterday\u2019s tools and the perimeter-based architectures they presuppose. As a result, you can avoid the complexity of hub-and-spoke networks and castle-and-moat security models, drastically reducing both hardware costs and management overhead.<\/p>\n

To learn more information about Zscaler for B2B and how it can help your organization secure third-party access, visit our webpage here. <\/p>\n

Or, if you would like to hear more about zero trust architecture in general, register for our webinar, \u201cStart Here: An Introduction to Zero Trust.\u201d”}]]\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

In response to today\u2019s sophisticated threat landscape, organizations around the […]<\/p>\n","protected":false},"author":0,"featured_media":3695,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-3694","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zenith-zscaler"],"yoast_head":"\nWhy and How You Should Secure Third-Party Access to Apps Jacob Serpa - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa\" \/>\n<meta property=\"og:description\" content=\"In response to today\u2019s sophisticated threat landscape, organizations around the […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-31T00:53:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa\",\"datePublished\":\"2024-07-31T00:53:32+00:00\",\"dateModified\":\"2024-07-31T00:53:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/\"},\"wordCount\":2741,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg\",\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/\",\"name\":\"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg\",\"datePublished\":\"2024-07-31T00:53:32+00:00\",\"dateModified\":\"2024-07-31T00:53:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/","og_locale":"en_US","og_type":"article","og_title":"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa","og_description":"In response to today\u2019s sophisticated threat landscape, organizations around the […]","og_url":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/","og_site_name":"JHC","article_published_time":"2024-07-31T00:53:32+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/"},"author":{"name":"","@id":""},"headline":"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa","datePublished":"2024-07-31T00:53:32+00:00","dateModified":"2024-07-31T00:53:32+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/"},"wordCount":2741,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg","articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/","url":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/","name":"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg","datePublished":"2024-07-31T00:53:32+00:00","dateModified":"2024-07-31T00:53:32+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/07\/secure-third-party-access-blog-tile-img-700x467-FHxw2Z.jpeg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/why-and-how-you-should-secure-third-party-access-to-apps-jacob-serpa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Why and How You Should Secure Third-Party Access to Apps Jacob Serpa"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=3694"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3694\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/3695"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=3694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=3694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=3694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}