Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":89957,"date":"2024-10-23T18:51:03","date_gmt":"2024-10-23T18:51:03","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/"},"modified":"2024-10-23T18:51:03","modified_gmt":"2024-10-23T18:51:03","slug":"simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/","title":{"rendered":"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar"},"content":{"rendered":"

In today’s fast-paced business environment, organizations collaborate with an ecosystem of business partners. Therefore, the need for seamless, secure connectivity to applications and resources hosted in business partners\u2019 networks (i.e., extranet) is paramount. Organizations are looking for ways to simplify connectivity to extranets while adhering to modern security frameworks like zero trust. Here are some areas where seamless and secure communication to business partners is essential:<\/p>\n

Healthcare and medical industry: Healthcare providers often collaborate with third-party labs, pharmacies, and insurance companies requiring secure access to patient records and health management systems.
\nFinancial services\/audit firms: Banks and financial institutions regularly interact with external vendors and partners to process transactions and manage financial data.
\nInformation technology enabled services (ITES): ITES companies, particularly those offering business process outsourcing (BPO), knowledge process outsourcing (KPO), and shared services, often need to access sensitive data and applications hosted in client data centers.
\nManufacturing and supply chain: In the manufacturing sector, companies often need to grant access to their supply chain partners, including raw material suppliers and logistics providers.
\nTelecommunications: Telecom companies often collaborate with external vendors and service providers to manage network infrastructure, billing systems, and customer data.
\nHerein lies the challenge of secure connectivity. Zero trust emphasizes the “never trust, always verify” approach, ensuring that every entity accessing the network is authenticated, authorized, and continuously validated before gaining access. This concept is critical when connecting to partner applications and data centers, but traditional VPN-based solutions struggle to achieve this.<\/p>\n

When organizations go through the zero trust journey, they migrate private applications on their internal networks from VPNs to a zero trust network access (ZTNA) solution. However, these organizations also need to access applications hosted in their business partners\u2019 networks. And since organizations do not control these networks, VPNs remain the typical means of accessing these applications. <\/p>\n

According to the Zscaler ThreatLabz 2024 VPN Risk Report, 56% of enterprises cite being the target of at least one VPN-related cyberattack in the past year. Challenges of relying on VPNs for business partner connectivityIn addition to introducing vulnerability risk and increasing the attack surface, VPNs add significant operational complexity in configuring and managing access across multiple partners. Then, there are the logistical challenges of shipping VPN appliances to different sites and maintaining high availability across various locations. Let\u2019s dive deeper into what these challenges mean for an organization:<\/p>\n

Operational complexityTraditional VPN-based solutions necessitate manual configuration and management of multiple IPsec tunnels for each business partner, leading to significant complexity in managing virtual routing and forwarding (VRF) aware DNS settings. Custom DNS configurations are required for each partner’s application, and VRF must be accurately set up to prevent IP address overlaps. This results in a heavy operational burden, with each partner needing an isolated routing and DNS framework. Consequently, scaling and maintaining the infrastructure becomes resource-intensive, hindering agility and operational efficiency.<\/p>\n

Lateral movement riskVPNs expose organizations to the risk of lateral movement. This is particularly risky when connecting to business partner resources, as a breach could extend beyond the organization, impacting both parties. The broad attack surface traditional VPN solutions create contradicts the core principles of zero trust.<\/p>\n

Poor user experienceAs VPN traffic often follows inefficient paths, users experience latency and reduced performance when accessing partner applications, especially if the connection spans multiple geographical locations.<\/p>\n

Availability issuesExtending VPNs to business partners\u2019 networks demands significant effort in scaling and maintenance, including redundant tunnels, manual configuration of failover, and constant monitoring to ensure uptime. As more partners are onboarded, management of these tunnels becomes increasingly complex. Ensuring high availability in such an environment requires extensive planning, increased operational overhead, and a heavy reliance on redundant infrastructure, which can be costly and difficult to manage effectively.<\/p>\n

How Zscaler Private Access\u2122 (ZPA) helps with business partner connectivity todayAt Zscaler, we are on a mission to eliminate VPN risk and provide zero trust connectivity for all apps, no matter where they are hosted. Adopting zero trust for connectivity to business partner applications mitigates risks inherent with traditional VPNs by enforcing tighter control, limiting lateral movement, and reducing the attack surface, all while streamlining both operational and logistical efforts.<\/p>\n

ZPA addresses some of these challenges today in two ways:<\/p>\n

Installing App Connectors in the partner\u2019s data center: This provides direct, secure access to applications. This method generally requires less management effort compared to traditional VPN configurations but organizations may face resistance from partners due to IT overhead and resource limitations.
\nDeploying App Connectors in the customer’s data center and extending an IPsec tunnel to the partner’s network: This approach allows customers to retain full control over their infrastructure, but it still presents DNS and routing complexities, albeit more manageable compared to traditional VPNs\u200b.
\n Introducing Extranet Application Support: The simple and secure method for business partner connectivityTo solve the problem of extending ZTNA to business partners’ private applications, Extranet Application Support enables trusted partners of Zscaler customers to effortlessly establish IPsec tunnels directly to Zscaler data centers. The solution ensures that only authenticated and authorized users gain access, mitigating risks associated with external access for applications.<\/p>\n

This new capability enhances scalability by offloading tunnel termination to the cloud and ensures high availability by allowing tunnels to connect to multiple Zscaler data centers, providing seamless redundancy. The solution provides a scalable, secure, and low-maintenance approach to partner connectivity while enabling customers to onboard new partners with greater agility, facilitating quicker collaboration and integration.<\/p>\n

Here are the key benefits of using ZPA\u2019s Extranet Application Support:<\/p>\n

Secure partner application access: Organizations can securely connect to a partner\u2019s private applications without exposing their internal network.
\nStreamlined onboarding for new business partners: Instead of manually configuring VPNs for each new partner, Extranet Application Support allows partners to connect to the Zscaler Zero Trust Exchange\u2122 platform via IPsec. Since the platform is highly available, this drastically reduces the complexity and time required to onboard a new partner.
\nMulti-partner connectivity management: Organizations with multiple business partners, each requiring unique application access, can simplify connectivity by centralizing traffic routing and access control through the Zero Trust Exchange. This reduces the operational burden of managing DNS and routing configurations for each partner.
\nHigh availability and redundancy for critical partner applications: With active-active IPsec tunnels and seamless failover capabilities, organizations can ensure uninterrupted access to critical partner applications, even during network failures.
\nCross-regional access to partner applications: Organizations with global operations can optimize performance by utilizing location-aware routing, ensuring users connect to the nearest data center, reducing latency and improving the overall user experience when accessing partner applications hosted in different regions.<\/p>\n

ConclusionZPA\u2019s Extranet Application Support is transforming how organizations securely connect with business partners by applying zero trust principles to streamline onboarding, enhance security, and improve agility, all while reducing complexity.<\/p>\n

Ready to discover how this capability can revolutionize your business operations? Sign up now to explore the full potential of this innovative solution firsthand!<\/p>\n

We\u2019re not stopping here\u2014to learn more about what\u2019s new with ZPA, join our live webinar with the ZPA product team on October 30, 2024.\u00a0\u00a0<\/p>\n

\u200b[#item_full_content]\u00a0[[{“value”:”In today’s fast-paced business environment, organizations collaborate with an ecosystem of business partners. Therefore, the need for seamless, secure connectivity to applications and resources hosted in business partners\u2019 networks (i.e., extranet) is paramount. Organizations are looking for ways to simplify connectivity to extranets while adhering to modern security frameworks like zero trust. Here are some areas where seamless and secure communication to business partners is essential:<\/p>\n

Healthcare and medical industry: Healthcare providers often collaborate with third-party labs, pharmacies, and insurance companies requiring secure access to patient records and health management systems.
\nFinancial services\/audit firms: Banks and financial institutions regularly interact with external vendors and partners to process transactions and manage financial data.
\nInformation technology enabled services (ITES): ITES companies, particularly those offering business process outsourcing (BPO), knowledge process outsourcing (KPO), and shared services, often need to access sensitive data and applications hosted in client data centers.
\nManufacturing and supply chain: In the manufacturing sector, companies often need to grant access to their supply chain partners, including raw material suppliers and logistics providers.
\nTelecommunications: Telecom companies often collaborate with external vendors and service providers to manage network infrastructure, billing systems, and customer data.
\nHerein lies the challenge of secure connectivity. Zero trust emphasizes the “never trust, always verify” approach, ensuring that every entity accessing the network is authenticated, authorized, and continuously validated before gaining access. This concept is critical when connecting to partner applications and data centers, but traditional VPN-based solutions struggle to achieve this.<\/p>\n

When organizations go through the zero trust journey, they migrate private applications on their internal networks from VPNs to a zero trust network access (ZTNA) solution. However, these organizations also need to access applications hosted in their business partners\u2019 networks. And since organizations do not control these networks, VPNs remain the typical means of accessing these applications. <\/p>\n

According to the Zscaler ThreatLabz 2024 VPN Risk Report, 56% of enterprises cite being the target of at least one VPN-related cyberattack in the past year. Challenges of relying on VPNs for business partner connectivityIn addition to introducing vulnerability risk and increasing the attack surface, VPNs add significant operational complexity in configuring and managing access across multiple partners. Then, there are the logistical challenges of shipping VPN appliances to different sites and maintaining high availability across various locations. Let\u2019s dive deeper into what these challenges mean for an organization:<\/p>\n

Operational complexityTraditional VPN-based solutions necessitate manual configuration and management of multiple IPsec tunnels for each business partner, leading to significant complexity in managing virtual routing and forwarding (VRF) aware DNS settings. Custom DNS configurations are required for each partner’s application, and VRF must be accurately set up to prevent IP address overlaps. This results in a heavy operational burden, with each partner needing an isolated routing and DNS framework. Consequently, scaling and maintaining the infrastructure becomes resource-intensive, hindering agility and operational efficiency.<\/p>\n

Lateral movement riskVPNs expose organizations to the risk of lateral movement. This is particularly risky when connecting to business partner resources, as a breach could extend beyond the organization, impacting both parties. The broad attack surface traditional VPN solutions create contradicts the core principles of zero trust.<\/p>\n

Poor user experienceAs VPN traffic often follows inefficient paths, users experience latency and reduced performance when accessing partner applications, especially if the connection spans multiple geographical locations.<\/p>\n

Availability issuesExtending VPNs to business partners\u2019 networks demands significant effort in scaling and maintenance, including redundant tunnels, manual configuration of failover, and constant monitoring to ensure uptime. As more partners are onboarded, management of these tunnels becomes increasingly complex. Ensuring high availability in such an environment requires extensive planning, increased operational overhead, and a heavy reliance on redundant infrastructure, which can be costly and difficult to manage effectively.<\/p>\n

How Zscaler Private Access\u2122 (ZPA) helps with business partner connectivity todayAt Zscaler, we are on a mission to eliminate VPN risk and provide zero trust connectivity for all apps, no matter where they are hosted. Adopting zero trust for connectivity to business partner applications mitigates risks inherent with traditional VPNs by enforcing tighter control, limiting lateral movement, and reducing the attack surface, all while streamlining both operational and logistical efforts.<\/p>\n

ZPA addresses some of these challenges today in two ways:<\/p>\n

Installing App Connectors in the partner\u2019s data center: This provides direct, secure access to applications. This method generally requires less management effort compared to traditional VPN configurations but organizations may face resistance from partners due to IT overhead and resource limitations.
\nDeploying App Connectors in the customer’s data center and extending an IPsec tunnel to the partner’s network: This approach allows customers to retain full control over their infrastructure, but it still presents DNS and routing complexities, albeit more manageable compared to traditional VPNs\u200b.
\n Introducing Extranet Application Support: The simple and secure method for business partner connectivityTo solve the problem of extending ZTNA to business partners’ private applications, Extranet Application Support enables trusted partners of Zscaler customers to effortlessly establish IPsec tunnels directly to Zscaler data centers. The solution ensures that only authenticated and authorized users gain access, mitigating risks associated with external access for applications.<\/p>\n

This new capability enhances scalability by offloading tunnel termination to the cloud and ensures high availability by allowing tunnels to connect to multiple Zscaler data centers, providing seamless redundancy. The solution provides a scalable, secure, and low-maintenance approach to partner connectivity while enabling customers to onboard new partners with greater agility, facilitating quicker collaboration and integration.<\/p>\n

Here are the key benefits of using ZPA\u2019s Extranet Application Support:<\/p>\n

Secure partner application access: Organizations can securely connect to a partner\u2019s private applications without exposing their internal network.
\nStreamlined onboarding for new business partners: Instead of manually configuring VPNs for each new partner, Extranet Application Support allows partners to connect to the Zscaler Zero Trust Exchange\u2122 platform via IPsec. Since the platform is highly available, this drastically reduces the complexity and time required to onboard a new partner.
\nMulti-partner connectivity management: Organizations with multiple business partners, each requiring unique application access, can simplify connectivity by centralizing traffic routing and access control through the Zero Trust Exchange. This reduces the operational burden of managing DNS and routing configurations for each partner.
\nHigh availability and redundancy for critical partner applications: With active-active IPsec tunnels and seamless failover capabilities, organizations can ensure uninterrupted access to critical partner applications, even during network failures.
\nCross-regional access to partner applications: Organizations with global operations can optimize performance by utilizing location-aware routing, ensuring users connect to the nearest data center, reducing latency and improving the overall user experience when accessing partner applications hosted in different regions.<\/p>\n

ConclusionZPA\u2019s Extranet Application Support is transforming how organizations securely connect with business partners by applying zero trust principles to streamline onboarding, enhance security, and improve agility, all while reducing complexity.<\/p>\n

Ready to discover how this capability can revolutionize your business operations? Sign up now to explore the full potential of this innovative solution firsthand!<\/p>\n

We\u2019re not stopping here\u2014to learn more about what\u2019s new with ZPA, join our live webinar with the ZPA product team on October 30, 2024.”}]]\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

In today’s fast-paced business environment, organizations collaborate with an ecosystem […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-89957","post","type-post","status-publish","format-standard","hentry","category-zenith-zscaler"],"yoast_head":"\nSimplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar\" \/>\n<meta property=\"og:description\" content=\"In today’s fast-paced business environment, organizations collaborate with an ecosystem […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-23T18:51:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar\",\"datePublished\":\"2024-10-23T18:51:03+00:00\",\"dateModified\":\"2024-10-23T18:51:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/\"},\"wordCount\":2362,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/\",\"name\":\"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"datePublished\":\"2024-10-23T18:51:03+00:00\",\"dateModified\":\"2024-10-23T18:51:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/","og_locale":"en_US","og_type":"article","og_title":"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar","og_description":"In today’s fast-paced business environment, organizations collaborate with an ecosystem […]","og_url":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/","og_site_name":"JHC","article_published_time":"2024-10-23T18:51:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/"},"author":{"name":"","@id":""},"headline":"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar","datePublished":"2024-10-23T18:51:03+00:00","dateModified":"2024-10-23T18:51:03+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/"},"wordCount":2362,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/","url":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/","name":"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"datePublished":"2024-10-23T18:51:03+00:00","dateModified":"2024-10-23T18:51:03+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/simplify-secure-connectivity-to-business-partners-private-apps-shakti-kumar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Simplify Secure Connectivity to Business Partners\u2019 Private Apps Shakti Kumar"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/89957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=89957"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/89957\/revisions"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=89957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=89957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=89957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}