{"id":21189,"date":"2016-10-26T05:00:11","date_gmt":"2016-10-26T12:00:11","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=21189"},"modified":"2016-10-21T07:15:44","modified_gmt":"2016-10-21T14:15:44","slug":"cybersecurity-download-user-based-access-controls","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/10\/cybersecurity-download-user-based-access-controls\/","title":{"rendered":"The Cybersecurity Download: User-Based Access Controls"},"content":{"rendered":"<p>Do you know who is accessing your network? To maintain a strong security posture and prevent successful cyber breaches, organizations should apply user-based access controls to identify and manage who is accessing your network and your valuable data and applications.<\/p>\n<p>We\u2019ve rounded up several <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights.html\" target=\"_blank\">Info &amp; Insights<\/a> resources to give you the download on user-based access controls, including key considerations from exploration to implementation, to safely enable the applications and technologies that are required to drive your business forward.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/4-reasons-to-leverage-user-based-access-policy\" target=\"_blank\">4 Reasons to Employ User-Based Access Policy (Don\u2019t Let Your Users be the Weak Link in Your Security Infrastructure)<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/implementing-user-based-access-controls\" target=\"_blank\">End Users: The Achilles Heel of Cybersecurity: 5 Key Considerations when Implementing User-Based Access Controls<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/secure-network-user-based-access-policy-team-effort\">There\u2019s No \u201cI\u201d in Secure Network: User-based Access Policy is a Team Effort<\/a><\/li>\n<\/ul>\n<p>Make the most out of your next-generation firewall investment with user-based access controls, and be sure to check out\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights.html\" target=\"_blank\">Info &amp; Insights\u00a0<\/a>for the latest educational assets on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know who is accessing your network? To maintain a strong security posture and prevent successful cyber breaches, organizations should apply user-based access controls to identify and manage who is accessing &hellip;<\/p>\n","protected":false},"author":249,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[2521,2862],"coauthors":[2745],"class_list":["post-21189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","tag-info-insights","tag-user-based-access-controls"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/249"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=21189"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21189\/revisions"}],"predecessor-version":[{"id":21249,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21189\/revisions\/21249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=21189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=21189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=21189"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=21189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}