JumpCloud, Principal Strategist, Chase Doelling - AITech Interview

0
111

Chase, please tell us about your background and what brought you to your role as Principal Strategist at JumpCloud.

I’ve spent over a decade in the tech industry, in cloud computing and cybersecurity. Over that time, I’ve been able to indulge my passion for all things identity-related and JumpCloud has been a perfect fit.  JumpCloud’s mission to simplify and secure IT management for businesses of all sizes— especially for the traditionally overlooked small and medium-sized enterprises (SMEs)—is unique, and I’d argue we’re uniquely good at it. My role is to help shape our product vision to ensure we’re meeting the evolving needs of our customers in an increasingly complex IT landscape.

The survey highlights a growing reliance on Managed Service Providers (MSPs) for IT management. What implications does this have for cybersecurity?

The increasing reliance is an interesting one. Consider that 76% of SMEs rely on an MSP for at least some functions. SMEs report that better security, productivity, and cost-savings are all key benefits of using an MSP—but—there are also signs that SMEs are starting to expect more from their MSP partners. On one hand, MSPs give SMEs access to more advanced security tools and practices, which can significantly enhance an SME’s security posture. However, this also introduces some risk, as attackers could target MSPs to try to gain access to multiple client networks and we’ve seen examples of this with recent supply chain attacks. So SMEs are understandably a little wary: while 67% of SMEs plan to increase their MSP investment over the next 12 months, 39% are concerned about how MSPs handle security. It’s crucial for SMEs to maintain visibility and control over their IT landscape, even when working with an MSP.

What are the key security considerations that IT departments should keep in mind when working with MSPs?

Clear communication and defined responsibilities are critical. IT departments should ensure there’s a comprehensive understanding of which security tasks are handled by the MSP and which remain in-house. Conduct regular security audits of the MSP’s practices. Data handling and privacy should be clearly outlined in service agreements, with strict protocols for how the MSP accesses and manages sensitive information. It’s also important to have a well-defined incident response plan that outlines how security events will be handled and communicated between the MSP and the client.

IT departments should also maintain oversight and not completely abdicate their security responsibilities because they think their MSP will handle everything. Regularly reviewing logs, access patterns, and security reports from the MSP can help maintain this oversight.

To Know More, Read Full Interview @ https://ai-techpark.com/aitech-interview-with-chase-doelling/

Related Articles -

Top Five Best AI Coding Assistant Tools

Spatial Computing Future of Tech

Trending Category - Mobile Fitness/Health Apps/ Fitness wearables

 

Pesquisar
Patrocinado
Categorias
Leia mais
Outro
New release: Point of Care (POC) Market Technology, Development Trends and Business Opportunities till2024- 2030
The Point of Care (POC) market research is a report that is the result of careful investigation...
Por Tejaswini Aarote 2024-06-11 06:11:08 0 422
Shopping
Sympathy Flowers
Sympathy flowers are usually arranged by florists and sent to the homes of grieving families....
Por Cosmea Gardens 2021-07-24 05:37:13 0 1KB
Food
Global Dried Soup Market Size, Share, and Forecast 2024-2032
According to IMARC Group latest report titled “Dried Soup Market: Global Industry Trends,...
Por Oliver Reigns 2024-03-19 07:16:35 0 659
Outro
How does Lodha Bannerghatta provide its residents with amenities?
Introduction: Lodha Bannerghatta in Bangalore Lodha Bannerghatta In the bustling cityscape of...
Por Apartment Sale 2024-02-19 17:28:52 0 707
Outro
Health Functional Food Market Size, Trends, Industry Growth [2024-2030]
  Report Description The Health Functional Food Market research provides an in-depth...
Por Tejaswini Aarote 2024-05-11 04:41:24 0 473