{"id":67953,"date":"2022-08-29T16:48:12","date_gmt":"2022-08-29T20:48:12","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&#038;p=67953"},"modified":"2026-01-22T02:09:12","modified_gmt":"2026-01-22T07:09:12","slug":"secure-your-sme-with-jumpcloud-and-crowdstrike","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike","title":{"rendered":"How to Secure Your SME with JumpCloud and Crowdstrike"},"content":{"rendered":"\n<section id=\"ebook-section-block_93b2f25f1d507932bd195f46a7ec7916\" class=\"section ebook-section has-background-pure-white has-text-pitch-black\" style=\"--ebook-section-bg-color: #ffffff;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<div id=\"cover-block_8bbc63b7091bc345629996cf466eed7c\" class=\"alignfull cover has-background-image has-layout-center\" style=\"background-image: url(https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/04\/Image.jpeg);\">\n        \n        \n            <div class=\"cover__overlay cover__overlay--semi-transparent cover__overlay--full\"><\/div>\n        \n    <div class=\"cover__inner\" >\n        <!-- TODO: Add second logo and separator logic -->\n                \n                    <div class=\"cover__logos\">\n                                    <img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/logos\/jumpcloud-logo-tm-oceanblue.svg\" alt=\"JumpCloud Logo\" class=\"jumpcloud-logo-img\"\/>\n                \n                            <\/div>\n        \n                    <h1 class=\"cover__title m-t-0\" >\n                How to Secure Your SME with JumpCloud and CrowdStrike            <\/h1>\n                \n            <\/div>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_db20f29e53118bf93cd6ed379d39539b\" class=\"section ebook-section has-background-white-smoke has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #f7f7fb;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<p>Small to medium-sized enterprises (SMEs) are highly nimble, adaptable, and innovative &#8211; it&#8217;s what allows them to keep pace with (and often outstrip) larger competitors.&nbsp;<\/p>\n\n\n\n<p>However, SMEs typically have fewer resources than their larger competitors, requiring high efficiency and strategic decision-making when it comes to resource allocation. Initiatives that drive clear and immediate business value often receive higher priority than non-revenue generating initiatives like security. Over time, this prioritization can create increasingly large security gaps and heightens an SME&#8217;s risk of attack. It also creates the illusion of a dichotomy between business and security, where SMEs can only invest in one or the other &#8211; not both at once.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Fortunately, this perceived dichotomy between security and business is false: it&#8217;s possible to drive both security and business at once.&nbsp;<\/h4>\n\n\n\n<p>This whitepaper will explore the challenges and threats SMEs face today and offer solutions that make sense for fast-paced SMEs with finite resources and limited security expertise.<\/p>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_fb424d350d16e4e4c7a0b64f7dbce6a4\" class=\"section ebook-section has-background-sun-yellow-10 has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #fff5e0;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h2 class=\"wp-block-heading\"><strong>Understanding the SME Security Landscape<\/strong><\/h2>\n\n\n\n<p>While certain high-profile attacks are designed to target the largest, most attention-grabbing organizations, the vast majority have something to gain from businesses of all sizes. The reality is that SMEs face significant threats in today&#8217;s landscape; however, not all SMEs have the internal expertise to understand and defend against current threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What Motivates Cybercrime?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Direct payments<\/li>\n\n\n\n<li>Credentials and network access<\/li>\n\n\n\n<li>Intellectual property<\/li>\n\n\n\n<li>Company information<\/li>\n\n\n\n<li>Third-party access<\/li>\n\n\n\n<li>Company damage<\/li>\n\n\n\n<li>Access to resources<\/li>\n<\/ul>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_1856e82d17c389685ba51b698db41b5e\" class=\"section ebook-section has-background-sun-yellow has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #ffa800;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h3 class=\"wp-block-heading\"><strong>Types of Cyberattacks<\/strong><\/h3>\n\n\n\n<div id=\"list-boxes-block_3f6a7ea0ba632464ebbcb954c5521cf0\" class=\"list-boxes m-b-2\">\n    <ul class=\"list-boxes-list has-style\">\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Ransomware: According to CrowdStrike, 50-70% of ransomware attacks are aimed at small businesses. Ransomware attacks typically involve adversaries seizing and locking a company&#8217;s data or assets and promising to return it upon payment of a ransom.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Supply chain: When large corporations get attacked, its effects spread through the supply chain. In these cases, SMEs aren&#8217;t direct targets, but rather casualties resulting from a larger breach.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Account takeover (ATO): In ATO attacks, adversaries gain access to the network by taking over a user&#8217;s account. Account access can be gained through various means, including password-stealing software, social engineering, and using (often by purchasing) the credentials of already breached accounts.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Software exploitation: Leveraging software vulnerabilities is a common way to gain access into an organization&#8217;s systems. Often, exploited vulnerabilities are known and even have patches available &#8211; and may even be several years old.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Phishing: Phishing remains one of the top three threats SMEs face, even despite organizational awareness around it. Phishing is effective because it preys on human error and is relatively easy to deploy.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Advanced persistent threats (APTs): APTs are sophisticated attacks carried out stealthily over an extended period of time. They typically consist of infiltration, lateral movement toward targeted data or assets, and exfiltration. APTs can start from any ingress point and enter through methods as simple as a phishing attack or stolen password.<\/p>\n            <\/div>\n        <\/li>\n        <\/ul>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_db20f29e53118bf93cd6ed379d39539b\" class=\"section ebook-section has-background-white-smoke has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #f7f7fb;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h2 class=\"wp-block-heading\"><strong>Why Are SMEs Targets?<\/strong><\/h2>\n\n\n\n<p>SMEs are sometimes targets by choice, but they are often targets by chance\u2014even if an SME does everything right, it could still become an opportunistic casualty in an attack on another business. SMEs must invest in their defenses to protect them against attack, should one occur.<\/p>\n\n\n\n<p>The following are some of the common ways SMEs become cyberattack victims.<br><\/p>\n\n\n\n<div id=\"list-boxes-block_d725987a90116d95bc3e7499eb0cebb8\" class=\"list-boxes m-b-2\">\n    <ul class=\"list-boxes-list has-style\">\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Playing the unwilling test subject: Just like legitimate businesses, cybercriminals strategize and test before rolling out new tactics to optimize their efforts &#8211; typically on small, nondescript businesses whose defenses they expect they can overtake.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Acting as a stepping stone: Cybercriminals may also infiltrate an SME as a stepping stone on their way to a more high-impact target. Attacks may aim to conduct reconnaissance on the target or infect the target through the SME in another form of supply chain attack.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Underinvestment in security and IT personnel: With limited budgets and significant workloads of staff, SMEs tend to have underdeveloped defense and response measures (including tooling, processes, 24\/7 monitoring, and experience), making attacks easier to mount and carry out without detection or counteraction.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Tech sprawl: SME IT managers are often forced to make quick rather than strategic tooling decisions. Over time, this makes for a messy and sprawled environment where elements don&#8217;t integrate or communicate well, creating communication and visibility gaps. Adversaries look for these gaps to aid in their attack and prevent alerts to their activity.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Distributed cloud environments: Most SMEs have made their way (at least partially) to the cloud. However, this move isn&#8217;t always accompanied by sufficient security adaptations. Cloud service provider (CSP) security standards aren&#8217;t tailored to individual companies, and they are not robust enough to provide reliable security on their own. SMEs should supplement CSP-provided security with their own; failing to do so can create blind spots that hackers target.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>More likely to cooperate: When large enterprises are attacked, they often (though not always) have the resources to recover, even if they can&#8217;t reclaim all of their lost data, assets, and relationships. With tighter budgets and finite resources, an SME being shut down after an attack is a real possibility. Adversaries know and exploit this: With more to lose in an attack, SMEs are more likely to cooperate (i.e., pay ransoms).<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Positive news and press coverage: Unfortunately, an SME&#8217;s cause for celebration can be an adversary&#8217;s cause for drawing up an attack plan. Because cybercriminals look for exploitable data and capital, news about an SME securing funding, experiencing growth, undergoing an M&amp;A, or other similar events could put an SME on a cybercriminal&#8217;s radar.<\/p>\n            <\/div>\n        <\/li>\n        <\/ul>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_fb424d350d16e4e4c7a0b64f7dbce6a4\" class=\"section ebook-section has-background-sun-yellow-10 has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #fff5e0;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h2 class=\"wp-block-heading\"><strong>Mounting a Strong Defense<\/strong><\/h2>\n\n\n\n<p>There are many basic cyber hygiene solutions SMEs can implement to build a more secure defense system to cyberattacks.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to Mount a Strong Defense<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement policies that strengthen passwords, like password rotation and complexity requirements. Implementing a password manager will make that easy.<\/li>\n\n\n\n<li>99.9% of account compromise attacks can be blocked with multi-factor authentication (MFA). Keep users and resources safe by layering native MFA onto every identity in your directory.<\/li>\n\n\n\n<li>Challenge and limit users&#8217; sessions with MFA, conditional access policies, and session timeouts.<\/li>\n\n\n\n<li>Start with strong identity security, ideally rooted in <strong>Zero Trust<\/strong> methodology. Zero Trust applies security at the identity layer, mandating that users should never be granted access before verifying their identity. Instead of allowing one login to grant access to all resources, Zero Trust continuously requires verification to help stop potential lateral movement.<\/li>\n\n\n\n<li>Patch management software is the best way to reliably track and push out patches while easing IT&#8217;s burden of tracking and implementing patches &#8211; especially when 40% of SMEs take more than one week to implement patches after a known software vulnerability is released.<\/li>\n\n\n\n<li>Conduct security awareness and best practices training to help prevent the credential theft that fuels account takeovers.<\/li>\n\n\n\n<li>Use comprehensive detection tools to make sure teams are alerted to breaches right away.<\/li>\n\n\n\n<li>Don&#8217;t neglect executive security training; in cybercriminals&#8217; eyes, executives are a fast track to the sensitive data and assets they&#8217;re looking for. Make no exceptions &#8211; every executive should participate in security awareness training.<\/li>\n<\/ul>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_1856e82d17c389685ba51b698db41b5e\" class=\"section ebook-section has-background-sun-yellow has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #ffa800;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h2 class=\"wp-block-heading\"><strong>Improve Your Security Posture with IT Unification<\/strong><\/h2>\n\n\n\n<p>The perceived dichotomy between security and business is false: it&#8217;s possible to drive both security and business at once. SMEs can achieve this through IT unification.<\/p>\n\n\n\n<p>IT unification breaks down sprawl and establishes a clear, functional, and efficient base layer of the IT infrastructure that needs to be secured. This unified approach eliminates the vulnerabilities, high costs, and burdensome workloads generated by disjointed IT and security, ultimately creating an architecture where IT and security tools work together seamlessly.<\/p>\n\n\n\n<p>It empowers IT and security teams and helps SMEs achieve a more strategic, cost-efficient stack that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduces complexity, which makes the stack more flexible and manageable<\/li>\n\n\n\n<li>Offers better controls for easier configuration and management<\/li>\n\n\n\n<li>Improves visibility and context, allowing teams to detect and respond to alerts faster<\/li>\n\n\n\n<li>Reduces alert fatigue, which improves productivity and threat response efforts<\/li>\n\n\n\n<li>Allows teams to spend more time on business-driving tasks without sacrificing security<\/li>\n<\/ul>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_db20f29e53118bf93cd6ed379d39539b\" class=\"section ebook-section has-background-white-smoke has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #f7f7fb;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h3 class=\"wp-block-heading\"><strong>The Steps to IT Unification<\/strong><\/h3>\n\n\n\n<div id=\"list-boxes-block_ac180db06ed34ba5770ae885f158edaf\" class=\"list-boxes m-b-2\">\n    <ol class=\"list-boxes-list has-style\">\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\">1<\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Identify Your Core Stack: Assess your entire IT environment and determine your needs.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\">2<\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Integrate Your Core Stack: Incorporate your new stack into areas that have unmet needs.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\">3<\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Consolidate and Eliminate Tools: Let go and move on from the tools that aren&#8217;t necessary.<\/p>\n            <\/div>\n        <\/li>\n        <\/ol>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><br><strong>What a Strategy of Unification Delivers<\/strong><\/h3>\n\n\n\n<p>When IT unification is at the center of your strategic plans, monetary costs and unnecessary effort go down while more time is spent deepening relationships with the people (and products) that matter most. With this strategy, each action you take carries more weight to help secure and drive your business forward.<br><\/p>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_fb424d350d16e4e4c7a0b64f7dbce6a4\" class=\"section ebook-section has-background-sun-yellow-10 has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #fff5e0;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h2 class=\"wp-block-heading\"><strong>JumpCloud + CrowdStrike: Better Together<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"246\" src=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/JumpCloud-Crowdstrike-Logo-1024x246.png\" alt=\"\" class=\"wp-image-138370\" srcset=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/JumpCloud-Crowdstrike-Logo-1024x246.png 1024w, https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/JumpCloud-Crowdstrike-Logo-300x72.png 300w, https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/JumpCloud-Crowdstrike-Logo-768x185.png 768w, https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/JumpCloud-Crowdstrike-Logo-1536x370.png 1536w, https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/JumpCloud-Crowdstrike-Logo-2048x493.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>To illustrate the power of IT unification, consider the pre-built integration between JumpCloud and CrowdStrike. JumpCloud partners with CrowdStrike, one of the cybersecurity leaders in protecting critical areas of enterprise risk &#8211; endpoints and cloud workloads, identity, and data.&nbsp;<\/p>\n\n\n\n<p>The combination of the two enhances visibility, response, controls, and end-to-end protection without increased resource burden. Here&#8217;s how it works.<\/p>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_1856e82d17c389685ba51b698db41b5e\" class=\"section ebook-section has-background-sun-yellow has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #ffa800;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h3 class=\"wp-block-heading\"><strong>JumpCloud Disk Encryption<\/strong><\/h3>\n\n\n\n<p>The JumpCloud platform integrates with the CrowdStrike Falcon platform to provide effective full disk encryption, allowing you to seamlessly enable BitLocker and FileVault 2 encryption across your fleet through integrated JumpCloud device policies.<\/p>\n\n\n\n<p>With the CrowdStrike Falcon integration you can deploy to individual hosts or thousands of managed endpoints through group-based policy management. JumpCloud automatically escrows the recovery keys of encrypted drives, preventing wasted time and data loss.<br><br><\/p>\n\n\n\n<div id=\"list-boxes-block_663ec8a7c0dfece9f249baf17fb19dee\" class=\"list-boxes m-b-2\">\n    <ul class=\"list-boxes-list has-style\">\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Compliance Ready: Easily track which devices were updated, encrypted, and any permission changes with out-of-the-box logging and reporting.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Secure Hosts From Anywhere: Deploy the JumpCloud agent quickly to Windows devices through the Falcon console, drastically cutting deployment time regardless of location.<\/p>\n            <\/div>\n        <\/li>\n        <\/ul>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_db20f29e53118bf93cd6ed379d39539b\" class=\"section ebook-section has-background-white-smoke has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #f7f7fb;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h3 class=\"wp-block-heading\"><strong>JumpCloud Patch Management<\/strong><\/h3>\n\n\n\n<p>Ensure your organization is running on the most up-to-date technology to eliminate risk and vulnerability. Enable automatic patch management for major and minor OS updates and browsers. The JumpCloud integration with the CrowdStrike Falcon platform makes it easy to deploy the JumpCloud agent across your entire fleet.<br><br><\/p>\n\n\n\n<div id=\"list-boxes-block_fda729137443d3a780b687c4feefde57\" class=\"list-boxes m-b-2\">\n    <ul class=\"list-boxes-list has-style\">\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Immediate Resolution: Improve device security globally across Windows, Mac, and Linux to eliminate vulnerabilities with minimal IT effort.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Reduce Zero-Day Impact: Define and automate specific rollout schedules and quickly add\/edit\/remove schedules as needed.<\/p>\n            <\/div>\n        <\/li>\n            \n        <li class=\"list-boxes-item has-background-ocean-blue-85 has-text-pure-white\">\n                            <div class=\"list-boxes-item-style has-background-ocean-blue-85\"><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/library\/components\/lists\/black-check.png\" alt=\"Checkmark\" class=\"list-boxes-item-icon\"><\/div>\n                        <div class=\"list-boxes-content is-type-body-default\">\n                <p>Compliance Ready: Gain visibility on device health and provide reporting of OS level by host.<\/p>\n            <\/div>\n        <\/li>\n        <\/ul>\n<\/div>\n\n\n<p><br><br>To learn more about the JumpCloud-CrowdStrike integration, <a href=\"https:\/\/jumpcloud.com\/leverage-jumpcloud-with-crowdstrike-integration\">visit our overview<\/a>.<br><\/p>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_fb424d350d16e4e4c7a0b64f7dbce6a4\" class=\"section ebook-section has-background-sun-yellow-10 has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #fff5e0;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<h2 class=\"wp-block-heading\"><strong>Unify Your Tech Stack with JumpCloud<\/strong><\/h2>\n\n\n\n<p>JumpCloud is a cloud directory platform that offers many of the key elements required for a secure, comprehensive core, including:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identity and access management (IAM)<\/li>\n\n\n\n<li>Device management with patch management, disk encryption, and mobile device management (MDM) capabilities<\/li>\n\n\n\n<li>Single sign-on (SSO)<\/li>\n\n\n\n<li>Privileged access management and conditional access policies<\/li>\n<\/ul>\n\n\n\n<p>Because it offers several solutions typically sourced from different vendors, the JumpCloud platform is an ideal piece of the core infrastructure in a unified environment. It unifies device and identity management, tying security and access measures to holistic user and device telemetry.<\/p>\n\n\n\n<p>This unification permeates throughout the infrastructure, offering SSO and access management to all of the resources users need to work as well as comprehensive MDM, with the ability to enable full disk encryption, remotely lock and wipe devices, and create device-contingent conditional access policies. Further, JumpCloud is compatible with Mac, Windows, and Linux management, which prevents the need for separate management tools.<\/p>\n\n\n\n<p>This holistic unification enables a significant amount of consolidation by replacing several point solutions and their many custom integrations with native ones.<\/p>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_9c952380949463095514d8e17388f5e2\" class=\"section ebook-section has-background-pure-white has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #ffffff;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"300\" height=\"84\" src=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2025\/02\/JumpCloud-Logo-One-Color-300x84-1.png\" alt=\"\" class=\"wp-image-120809\" \/><\/figure>\n\n\n\n<p>JumpCloud\u00ae helps IT teams Make Work Happen\u00ae by centralizing management of user identities and devices, enabling small and medium-sized enterprises to adopt Zero Trust security models. JumpCloud has a global user base of more than 200,000 organizations, with more than 5,000 paying customers, including<a href=\"http:\/\/cars.com\"> Cars.com<\/a>, GoFundMe, Grab, ClassPass, Uplight, Beyond Finance, and Foursquare. JumpCloud has raised over $400M from world-class investors, including Sapphire Ventures, General Atlantic, Sands Capital, Atlassian, and CrowdStrike.<br><br><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"190\" src=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/CrowdStrike_logo.svg-1024x190.png\" alt=\"\" class=\"wp-image-103647\" style=\"width:366px;height:auto\" srcset=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/CrowdStrike_logo.svg-1024x190.png 1024w, https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/CrowdStrike_logo.svg-300x56.png 300w, https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/CrowdStrike_logo.svg-768x142.png 768w, https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/CrowdStrike_logo.svg.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>CrowdStrike Holdings, Inc. (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world\u2019s most advanced cloud-native platform for protecting critical areas of enterprise risk \u2014 endpoints and cloud workloads, identity, and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon\u00ae platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft, and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting, and prioritized observability of vulnerabilities.<\/p>\n\n\n\n<p>Purpose-built in the cloud with a single lightweight agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity, and immediate time to value.<\/p>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section id=\"ebook-section-block_1856e82d17c389685ba51b698db41b5e\" class=\"section ebook-section has-background-sun-yellow has-text-pitch-black has-constrained-content\" style=\"--ebook-section-bg-color: #ffa800;\">\n    <div class=\"ebook-section__inner\">\n        \n\n<div id=\"content-promo-block_fe5fb834742cb229bcc3d6c1ebbf996a\" class=\"content-promo-block has-background-white-smoke has-text-pitch-black\">\n    <div class=\"content-promo-block__inner\">\n        <div class=\"content-promo-block__content\">\n            <h3 class=\"content-promo-block__heading\">Security That Scales With You<\/h3>\n            \n            <p class=\"content-promo-block__text\">Small teams are big targets. JumpCloud\u00ae provides the tools you need to secure every user and device without the Enterprise price tag or complexity. Make sure your business stays safe as you grow.<\/p>\n            \n            <a \n                href=\"https:\/\/console.jumpcloud.com\/signup\" \n                class=\"content-promo-block__cta-button\"\n                target=\"_blank\"\n                                    rel=\"noopener noreferrer\"\n                            >\n                Try for Free            <\/a>\n        <\/div>\n\n        <div class=\"content-promo-block__image\">\n            <img decoding=\"async\" \n                src=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2025\/06\/JumpCloud-Password-Manager.png\" \n                alt=\"\"\n                loading=\"lazy\"\n            \/>\n        <\/div>\n    <\/div>\n<\/div>\n\n\n    <\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":164,"featured_media":98677,"template":"page-templates\/ebook-page.php","categories":[2753],"collection":[2775],"wheel_hubs":[2335],"platform":[2745],"resource_type":[2311],"funnel_stage":[],"coauthors":[2703],"class_list":["post-67953","resource","type-resource","status-publish","has-post-thumbnail","hentry","category-unification","collection-security","wheel_hubs-security","platform-unification","resource_type-whitepapers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Secure Your SME with JumpCloud and Crowdstrike - JumpCloud<\/title>\n<meta name=\"description\" content=\"Discover how IT unification helps SMEs prioritize both their business and security. Download the JumpCloud whitepaper to learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure Your SME with JumpCloud and Crowdstrike\" \/>\n<meta property=\"og:description\" content=\"JumpCloud\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T07:09:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/Crowdstrike-2023-704x420-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1310\" \/>\n\t<meta property=\"og:image:height\" content=\"790\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Mari Sharpe\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike\",\"url\":\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike\",\"name\":\"How to Secure Your SME with JumpCloud and Crowdstrike - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/Crowdstrike-2023-704x420-Featured.png\",\"datePublished\":\"2022-08-29T20:48:12+00:00\",\"dateModified\":\"2026-01-22T07:09:12+00:00\",\"description\":\"Discover how IT unification helps SMEs prioritize both their business and security. Download the JumpCloud whitepaper to learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/Crowdstrike-2023-704x420-Featured.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/Crowdstrike-2023-704x420-Featured.png\",\"width\":1310,\"height\":790},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/jumpcloud.com\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Secure Your SME with JumpCloud and Crowdstrike\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Secure Your SME with JumpCloud and Crowdstrike - JumpCloud","description":"Discover how IT unification helps SMEs prioritize both their business and security. Download the JumpCloud whitepaper to learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike","og_locale":"en_US","og_type":"article","og_title":"How to Secure Your SME with JumpCloud and Crowdstrike","og_description":"JumpCloud","og_url":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike","og_site_name":"JumpCloud","article_modified_time":"2026-01-22T07:09:12+00:00","og_image":[{"width":1310,"height":790,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/Crowdstrike-2023-704x420-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute","Written by":"Mari Sharpe"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike","url":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike","name":"How to Secure Your SME with JumpCloud and Crowdstrike - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/Crowdstrike-2023-704x420-Featured.png","datePublished":"2022-08-29T20:48:12+00:00","dateModified":"2026-01-22T07:09:12+00:00","description":"Discover how IT unification helps SMEs prioritize both their business and security. Download the JumpCloud whitepaper to learn more.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/Crowdstrike-2023-704x420-Featured.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/Crowdstrike-2023-704x420-Featured.png","width":1310,"height":790},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/resources\/secure-your-sme-with-jumpcloud-and-crowdstrike#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/jumpcloud.com\/resources"},{"@type":"ListItem","position":3,"name":"How to Secure Your SME with JumpCloud and Crowdstrike"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource\/67953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/98677"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=67953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=67953"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=67953"},{"taxonomy":"wheel_hubs","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/wheel_hubs?post=67953"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=67953"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource_type?post=67953"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=67953"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=67953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}