{"id":35577,"date":"2024-01-12T15:10:08","date_gmt":"2024-01-12T23:10:08","guid":{"rendered":"https:\/\/pathlock.com\/?p=35577"},"modified":"2026-03-05T08:26:24","modified_gmt":"2026-03-05T13:26:24","slug":"zero-risk-application-landscape","status":"publish","type":"post","link":"https:\/\/pathlock.com\/zero-risk-application-landscape\/","title":{"rendered":"Achieving a Zero Risk Application Landscape"},"content":{"rendered":"\n<p>With the continuous evolution of technology solutions, it has become crucial for organizations to develop effective methodologies for granting access to resources, which is the core of a solid cybersecurity program. Cybercriminals are always hunting for human resources and financial data, so companies need to take a proactive approach to eliminate access risk in the earliest stages of cybersecurity and <a href=\"https:\/\/pathlock.com\/blog\/grc\/\" data-internallinksmanager029f6b8e52c=\"66\" title=\"governance risk and compliance framework\">GRC<\/a> planning. This includes analyzing access risk, provisioning new users, establishing visibility around control effectiveness, and ensuring an efficient strategy for detecting and fixing vulnerabilities in application configurations. Risk is inherent in all these stages, so organizations must work towards developing a comprehensive risk management strategy that addresses risk in a cross-functional manner\u2014introducing Zero Risk. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-zero-risk-nbsp-nbsp\">What is Zero Risk?  <\/h2>\n\n\n\n<p>Ultimately, a Zero Risk methodology transcends a reactive approach to security by proactively establishing a multi-layered foundation for secure application access. This foundation allows organizations to embrace new technologies and adapt to evolving threats with confidence, safeguarding sensitive data and enabling business growth in a dynamic digital landscape. Plus, by employing solutions that enable granular control and continuous visibility over data and transaction usage, organizations using a Zero Risk strategy will have a more scalable journey toward aligning to evolving security best practices and frameworks like <a href=\"https:\/\/csrc.nist.gov\/pubs\/cswp\/29\/the-nist-cybersecurity-framework-20\/ipd\" target=\"_blank\" rel=\"noreferrer noopener\">NIST<\/a> and <a href=\"https:\/\/www.coso.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">COSO<\/a>.   <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero Risk vs. Zero Trust  <\/h2>\n\n\n\n<p>Much has been made about a similar-sounding but substantially different approach called <a href=\"https:\/\/pathlock.com\/learn\/zero-trust-is-a-centerpiece-of-president-bidens-latest-executive-order-on-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust<\/a>. While it has been said that Zero Trust is a journey rather than a destination, therein lies the problem. It takes a significant amount of time, effort, and cost to implement a Zero Trust strategy. Few have been able to define a clear Zero Trust strategy and roadmap with the ability to prioritize investments based on risk assessments. It also requires buy-in from employees because, in many instances, Zero Trust puts more ownness on the employees to change the way they work, which can lead to friction and unauthorized workarounds.   <\/p>\n\n\n\n<p>The main difference between Zero Risk and Zero Trust lies in the cross-functional nature of Zero Risk. Encompassing elements of IT Operations, Cybersecurity, <a href=\"https:\/\/pathlock.com\/initiative\/audit-readiness\/\" target=\"_blank\" rel=\"noreferrer noopener\">Audit<\/a>, Risk, and Compliance \u2013 the point of Zero Risk is to use a unified platform that eliminates control and visibility silos while aligning multiple functions toward a single, common goal. The goal is to systematically eliminate external and internally driven risks across the business.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Deploying a Zero Risk Strategy  <\/h2>\n\n\n\n<p>A robust and effective Zero Risk application landscape is best deployed through a proactive, preventative approach to security that is grounded in a layered defense strategy. This multifaceted approach includes: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/pathlock.com\/products\/application-access-governance\/#access-risk-analysis\" target=\"_blank\" rel=\"noreferrer noopener\">Application Access Risk Analysis (SOD)<\/a>  <\/li>\n\n\n\n<li><a href=\"https:\/\/pathlock.com\/products\/application-access-governance\/#compliant-provisioning\" target=\"_blank\" rel=\"noreferrer noopener\">Compliant Provisioning<\/a>  <\/li>\n\n\n\n<li><a href=\"https:\/\/pathlock.com\/products\/application-access-governance\/#elevated-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Elevated Access Management<\/a>  <\/li>\n\n\n\n<li><a href=\"https:\/\/pathlock.com\/products\/application-access-governance\/#access-certification\" target=\"_blank\" rel=\"noreferrer noopener\">Automation for Executing Access Certifications<\/a>  <\/li>\n\n\n\n<li><a href=\"https:\/\/pathlock.com\/products\/cybersecurity-application-controls\/#dynamic-data-masking\" target=\"_blank\" rel=\"noreferrer noopener\">Master Data Security<\/a>  <\/li>\n\n\n\n<li><a href=\"https:\/\/pathlock.com\/products\/cybersecurity-application-controls\/#vulnerability-and-code-scanning\" target=\"_blank\" rel=\"noreferrer noopener\">Configuration Vulnerability Management<\/a>  <\/li>\n\n\n\n<li><a href=\"https:\/\/pathlock.com\/products\/continuous-controls-monitoring\/#risk-quantification-and-transaction-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Transaction Monitoring and Risk Quantification<\/a>   <\/li>\n<\/ul>\n\n\n\n<p>Additionally, proactively identifying and patching vulnerabilities in systems and applications before they can be attacked, combined with <a href=\"https:\/\/pathlock.com\/learn\/threat-detection-and-response\/\">threat detection and response<\/a> to identify and neutralize risk in real time, adds to the layered nature of defense of a Zero Risk strategy.\u00a0 \u00a0\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pathlock Brings a Zero Risk Application Landscape to Life  <\/h2>\n\n\n\n<p>Imagine a command center supported by intuitive dashboards, insightful analytics, and comprehensive reporting. Pathlock delivers these elements, infused throughout our platform, to help paint a real-time picture of your application access landscape. Gone are the days of manual (i.e., spreadsheet-based) governance processes and siloed insights &#8211; instead, Pathlock arms your organization with granular details on user activity, anomalous behavior, and potential vulnerabilities that all converge into actionable intelligence.  <\/p>\n\n\n\n<p>Ready to start your journey to a Zero Risk application landscape? Contact us today for a <a href=\"https:\/\/pathlock.com\/contact\/?tab=request-a-demo\" target=\"_blank\" rel=\"noreferrer noopener\">personalized demo<\/a>.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the continuous evolution of technology solutions, it has become crucial for organizations to develop effective methodologies for granting access to resources, which is the core of a solid cybersecurity program. Cybercriminals are always hunting for human resources and financial data, so companies need to take a proactive approach to eliminate access risk in the&#8230;<\/p>\n","protected":false},"author":42,"featured_media":35579,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[857],"tags":[871],"erp-blog":[550,551,552,553],"class_list":["post-35577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-application-controls","tag-application-data-security","erp-blog-sap","erp-blog-peoplesoft","erp-blog-jd-edwards","erp-blog-oracle"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Achieving a Zero Risk Application Landscape | Pathlock<\/title>\n<meta name=\"description\" content=\"Zero Risk Application Landscape: Explore key strategies for advanced cybersecurity and resilience against evolving digital threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/zero-risk-application-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving a Zero Risk Application Landscape\" \/>\n<meta property=\"og:description\" content=\"Zero Risk Application Landscape: Explore key strategies for advanced cybersecurity and resilience against evolving digital threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/zero-risk-application-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-12T23:10:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T13:26:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/01\/zero-risk-application-landscape.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1081\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Keri Bowman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pathlock\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Keri Bowman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/\"},\"author\":{\"name\":\"Keri Bowman\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/#\\\/schema\\\/person\\\/49c0ac22ac29d5a30f593641279538f7\"},\"headline\":\"Achieving a Zero Risk Application Landscape\",\"datePublished\":\"2024-01-12T23:10:08+00:00\",\"dateModified\":\"2026-03-05T13:26:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/\"},\"wordCount\":627,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/zero-risk-application-landscape.jpg\",\"keywords\":[\"Application &amp; Data Security\"],\"articleSection\":[\"Cybersecurity Application Controls\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/\",\"name\":\"Achieving a Zero Risk Application Landscape | Pathlock\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/zero-risk-application-landscape.jpg\",\"datePublished\":\"2024-01-12T23:10:08+00:00\",\"dateModified\":\"2026-03-05T13:26:24+00:00\",\"description\":\"Zero Risk Application Landscape: Explore key strategies for advanced cybersecurity and resilience against evolving digital threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/zero-risk-application-landscape.jpg\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/zero-risk-application-landscape.jpg\",\"width\":1920,\"height\":1081,\"caption\":\"Achieving a Zero Risk Application Landscape\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/zero-risk-application-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Security\",\"item\":\"https:\\\/\\\/pathlock.com\\\/category\\\/application-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Achieving a Zero Risk Application Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/#\\\/schema\\\/person\\\/49c0ac22ac29d5a30f593641279538f7\",\"name\":\"Keri Bowman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c6cf34c2ab5b849f322d8039bfe47bce448b601a31ca69f7a060a34b58c8a6b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c6cf34c2ab5b849f322d8039bfe47bce448b601a31ca69f7a060a34b58c8a6b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c6cf34c2ab5b849f322d8039bfe47bce448b601a31ca69f7a060a34b58c8a6b?s=96&d=mm&r=g\",\"caption\":\"Keri Bowman\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/kbowman1\\\/\"],\"award\":[\"Certified Information Systems Auditor (CISA)\"],\"knowsLanguage\":[\"English\"],\"jobTitle\":\"Senior Director, Service Operations\",\"worksFor\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/author\\\/keri-bowman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Achieving a Zero Risk Application Landscape | Pathlock","description":"Zero Risk Application Landscape: Explore key strategies for advanced cybersecurity and resilience against evolving digital threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/zero-risk-application-landscape\/","og_locale":"en_US","og_type":"article","og_title":"Achieving a Zero Risk Application Landscape","og_description":"Zero Risk Application Landscape: Explore key strategies for advanced cybersecurity and resilience against evolving digital threats.","og_url":"https:\/\/pathlock.com\/zero-risk-application-landscape\/","og_site_name":"Pathlock","article_published_time":"2024-01-12T23:10:08+00:00","article_modified_time":"2026-03-05T13:26:24+00:00","og_image":[{"width":1920,"height":1081,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/01\/zero-risk-application-landscape.jpg","type":"image\/jpeg"}],"author":"Keri Bowman","twitter_card":"summary_large_image","twitter_creator":"@pathlock","twitter_site":"@pathlock","twitter_misc":{"Written by":"Keri Bowman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/#article","isPartOf":{"@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/"},"author":{"name":"Keri Bowman","@id":"https:\/\/pathlock.com\/#\/schema\/person\/49c0ac22ac29d5a30f593641279538f7"},"headline":"Achieving a Zero Risk Application Landscape","datePublished":"2024-01-12T23:10:08+00:00","dateModified":"2026-03-05T13:26:24+00:00","mainEntityOfPage":{"@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/"},"wordCount":627,"commentCount":0,"publisher":{"@id":"https:\/\/pathlock.com\/#organization"},"image":{"@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/01\/zero-risk-application-landscape.jpg","keywords":["Application &amp; Data Security"],"articleSection":["Cybersecurity Application Controls"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pathlock.com\/zero-risk-application-landscape\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/","url":"https:\/\/pathlock.com\/zero-risk-application-landscape\/","name":"Achieving a Zero Risk Application Landscape | Pathlock","isPartOf":{"@id":"https:\/\/pathlock.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/#primaryimage"},"image":{"@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/01\/zero-risk-application-landscape.jpg","datePublished":"2024-01-12T23:10:08+00:00","dateModified":"2026-03-05T13:26:24+00:00","description":"Zero Risk Application Landscape: Explore key strategies for advanced cybersecurity and resilience against evolving digital threats.","breadcrumb":{"@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/zero-risk-application-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/#primaryimage","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/01\/zero-risk-application-landscape.jpg","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/01\/zero-risk-application-landscape.jpg","width":1920,"height":1081,"caption":"Achieving a Zero Risk Application Landscape"},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/zero-risk-application-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/"},{"@type":"ListItem","position":2,"name":"Application Security","item":"https:\/\/pathlock.com\/category\/application-security\/"},{"@type":"ListItem","position":3,"name":"Achieving a Zero Risk Application Landscape"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/#website","url":"https:\/\/pathlock.com\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pathlock.com\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]},{"@type":"Person","@id":"https:\/\/pathlock.com\/#\/schema\/person\/49c0ac22ac29d5a30f593641279538f7","name":"Keri Bowman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c6cf34c2ab5b849f322d8039bfe47bce448b601a31ca69f7a060a34b58c8a6b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c6cf34c2ab5b849f322d8039bfe47bce448b601a31ca69f7a060a34b58c8a6b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c6cf34c2ab5b849f322d8039bfe47bce448b601a31ca69f7a060a34b58c8a6b?s=96&d=mm&r=g","caption":"Keri Bowman"},"sameAs":["https:\/\/www.linkedin.com\/in\/kbowman1\/"],"award":["Certified Information Systems Auditor (CISA)"],"knowsLanguage":["English"],"jobTitle":"Senior Director, Service Operations","worksFor":"Pathlock, Inc","url":"https:\/\/pathlock.com\/author\/keri-bowman\/"}]}},"_links":{"self":[{"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/posts\/35577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/comments?post=35577"}],"version-history":[{"count":0,"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/posts\/35577\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/media\/35579"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/media?parent=35577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/categories?post=35577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/tags?post=35577"},{"taxonomy":"erp-blog","embeddable":true,"href":"https:\/\/pathlock.com\/wp-json\/wp\/v2\/erp-blog?post=35577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}