{"id":104676,"date":"2025-02-27T12:31:34","date_gmt":"2025-02-27T04:31:34","guid":{"rendered":"https:\/\/version-2.com\/?p=104676"},"modified":"2025-02-20T12:35:15","modified_gmt":"2025-02-20T04:35:15","slug":"from-endpoints-to-identities-why-msps-need-a-user-centric-approach","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/02\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/","title":{"rendered":"From Endpoints to Identities: Why MSPs Need a User-Centric Approach"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"104676\" class=\"elementor elementor-104676\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp\" width=\"1280\" height=\"720\" \/><\/p><div class=\"elementor-widget-container\"><p>How many devices are you managing in your network?<\/p><p>That\u2019s not a rhetorical question. A <a href=\"https:\/\/blog.1password.com\/unmanaged-devices-run-rampant\/\" target=\"_blank\" rel=\"noopener\">study found<\/a> that 47% of companies allow employees to access their resources on unmanaged devices.<\/p><p>But how can you protect those <a href=\"https:\/\/guardz.com\/blog\/begin-from-the-endpoint-why-msps-need-to-implement-device-posture-checks-complete-guide\/\">unmanaged devices<\/a> if you don\u2019t even know who has access to them? Another important thought to consider is who accepts blame in the event of a breach. Hopefully, it\u2019s not you or your team.<\/p><p>We\u2019re going to discuss a strategy that makes each individual fully accountable for their actions. This is known as a user-centric approach. We\u2019ll explore how this method works and how you can successfully implement it to strengthen your overall cybersecurity posture.<\/p><h2 class=\"wp-block-heading\">The Need for a User-Centric Approach<\/h2><p>The rules have changed since COVID-19 introduced the WFH model. Literally, access was once granted freely without strict verification processes.<\/p><p>BYOD became the norm, with employees using personal devices to access confidential documents and communicate via private company Slack channels, often from a cafe or other public hotspot, without approval from IT. Yes, indeed, the cringe was quite real.<\/p><p>Employees and third parties enjoyed open access to the corporate network from any location and any device. This led to many security incidents and breaches, which forced organizations and IT departments to rethink how access should be granted.<\/p><p>This meant that any threat actor within proximity could potentially intercept all traffic and use it to launch a man-in-the-middle attack, exfiltrate data, or compromise user credentials.<\/p><p>Today, every device, user, and identity <strong><em>must be verified before accessing<\/em><\/strong> the corporate network. No exceptions. A user-centric approach connects the security dots back to a specific user in the organization and ensures accountability for every action taken.<\/p><p>A user-centric approach enables MSPs to deploy more effective BYOD policies and tighten access controls by focusing on the specific roles and needs of each user within the organization.<\/p><p>This involves isolating devices and implementing least privilege access, ensuring that users are granted only the minimum permissions necessary to perform their day-to-day tasks. For example, a third party providing outsourced services should not have access to financial transactions or payroll systems.<\/p><p>A user-centric approach greatly reduces the risk of unauthorized access or accidental data exposure that can lead to a breach. And why take that risk? Seriously.<\/p><h2 class=\"wp-block-heading\">4 Ways a User-Centric Approach Works for MSPs<\/h2><p><strong>Proactive threat monitoring:<\/strong> Suspicious user behavior, such as unusual login times or login attempts, might signal a threat actor in your network. A Managed Detection and Response (MDR) helps by continuously monitoring user activity and network traffic to detect and mitigate potential threats in real-time. An unknown user who tried to access your network from an unfamiliar location or unusual hour would be flagged by the MDR service, triggering automated alerts for further investigation.<\/p><p><strong>Accountability:<\/strong> This refers to the ability to trace actions back to specific users. If a user attempts to access a system or application they\u2019re not authorized to, an automated alert is sent out, notifying the security team that suspicious activity has been recorded and traced back to the individual user. Details such as the user\u2019s identity, time of access attempt, geolocation, device type, and the resource in question all help security teams assess the situation and enforce internal policies before anything escalates.<\/p><p><strong>Improved access controls:<\/strong> Does the junior analyst have access to financial slide decks or sensitive data unrelated to their role? A user-centric approach ensures they don\u2019t. Instead, access is tightly controlled based on the principle of least privilege.<\/p><p><a href=\"https:\/\/guardz.com\/blog\/mfa-in-cybersecurity-4-types-to-secure-msp-client-data\/\">Multi-factor authentication (MFA)<\/a> also helps improve access controls by requiring users to verify their identity through a second factor, linking all actions to verified identities and ultimately to the root cause or culprit of the potential threat.<\/p><p><strong>Increased endpoint security:<\/strong> It\u2019s one thing to keep track of how many endpoints are in your organization, and even that\u2019s difficult, but imagine trying to do so for an enterprise with over 5,000 employees and a ton of unvetted third parties. If that\u2019s not challenging enough, how about the number of identities continuously being created, updated, or removed across the organization? Is your head spinning yet?<\/p><p>Endpoint security is a constant battle without the right tools and strategies.<\/p><p>A user-centric approach focuses on securing devices by connecting them directly to the identities of the users who operate them. Whether it\u2019s on a personal laptop, iPhone, or a corporate-issued desktop, every device is treated as an extension of the user\u2019s identity.<\/p><p>Every last digital step can be traced back to an individual user, providing a clear audit trail of actions taken on that device. Did that user login from a secured gateway? Did they enable MFA? Was the device running the latest Windows OS updates before they shared a sensitive file?<\/p><p>A user-centric approach takes the guesswork out and helps address these critical questions from the endpoint, where most security breaches begin.<\/p><p>Guardz ensures that company-managed devices are fully protected and monitored from malicious threats. Guardz detects outdated operating systems and vulnerable software so you can take immediate action.<\/p><h2 class=\"wp-block-heading\">Amplify Threat Detection and Response with The Ultimate Cybersecurity Plan<\/h2><p>Introducing a new user-centric approach to unified detection and response. <a href=\"https:\/\/guardz.com\/the-ultimate-cybersecurity-plan-for-msps\/\">The Ultimate Cybersecurity Plan for MSPs<\/a>.<\/p><p>The Ultimate Cybersecurity Plan builds on the Guardz platform\u2019s holistic, user-centric approach to security by incorporating managed SentinelOne EDR capabilities with Guardz MDR. Guardz empowers MSPs to monitor and resolve incidents from a single interface.<\/p><figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdyi4WYFloaFzkdwF05kPG1Q7VZDxzPxiI69thltIEGFfjYKx97leTO8eIQyFw8_QuwzAAJVWmiztptKu2Q8CO0p9R5oOHuhpSVX6fy0XJsy56VV10voOgzukjrmutPOKu1NZmQ?key=ArkJ0Zvre6ixvTbBU7xCIbp_\" alt=\"\" \/><noscript><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdyi4WYFloaFzkdwF05kPG1Q7VZDxzPxiI69thltIEGFfjYKx97leTO8eIQyFw8_QuwzAAJVWmiztptKu2Q8CO0p9R5oOHuhpSVX6fy0XJsy56VV10voOgzukjrmutPOKu1NZmQ?key=ArkJ0Zvre6ixvTbBU7xCIbp_\" alt=\"\"\/><\/noscript><\/figure><p>Guardz MDR aggregates signals from multiple layers of security identities, endpoints, email, cloud, and data into a user-centric analysis that detects complex indicators of compromise (IOCs) and automatically responds to them.<\/p><p>Enhance incident response times and go beyond endpoint protection with The Ultimate Cybersecurity Plan. Get automated detection and response today.<\/p><p><a href=\"https:\/\/guardz.com\/schedule-a-meeting\/\">Speak with one of our experts<\/a><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86d84e0 elementor-widget elementor-widget-button\" data-id=\"86d84e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/guardz.com\/distributors\/v2\/?utm_source=web&#038;utm_medium=v2sg&#038;utm_campaign=guardz&#038;utm_content=trial\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Free Trial<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"76994\" class=\"elementor elementor-76994\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Guardz<br \/><\/strong>Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>How many devices are you managing in your network? That [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1276,1305,61],"tags":[1077,1277],"class_list":["post-104676","post","type-post","status-publish","format-standard","hentry","category-guardz","category-1305","category-press-release","tag-1077","tag-guardz"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Endpoints to Identities: Why MSPs Need a User-Centric Approach - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Endpoints to Identities: Why MSPs Need a User-Centric Approach - Version 2\" \/>\n<meta property=\"og:description\" content=\"How many devices are you managing in your network? That [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-27T04:31:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"From Endpoints to Identities: Why MSPs Need a User-Centric Approach\",\"datePublished\":\"2025-02-27T04:31:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/\"},\"wordCount\":979,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp\",\"keywords\":[\"2025\",\"Guardz\"],\"articleSection\":[\"Guardz\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/\",\"url\":\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/\",\"name\":\"From Endpoints to Identities: Why MSPs Need a User-Centric Approach - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp\",\"datePublished\":\"2025-02-27T04:31:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp\",\"contentUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Endpoints to Identities: Why MSPs Need a User-Centric Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Endpoints to Identities: Why MSPs Need a User-Centric Approach - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/","og_locale":"en_US","og_type":"article","og_title":"From Endpoints to Identities: Why MSPs Need a User-Centric Approach - Version 2","og_description":"How many devices are you managing in your network? That [&hellip;]","og_url":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/","og_site_name":"Version 2","article_published_time":"2025-02-27T04:31:34+00:00","og_image":[{"url":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"From Endpoints to Identities: Why MSPs Need a User-Centric Approach","datePublished":"2025-02-27T04:31:34+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/"},"wordCount":979,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp","keywords":["2025","Guardz"],"articleSection":["Guardz","2025","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/","url":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/","name":"From Endpoints to Identities: Why MSPs Need a User-Centric Approach - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/#primaryimage"},"image":{"@id":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp","datePublished":"2025-02-27T04:31:34+00:00","breadcrumb":{"@id":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/#primaryimage","url":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp","contentUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/From-Endpoints-to-Identities_-Why-MSPs-Need-a-User-Centric-Approach.jpg.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/guardz.com\/blog\/from-endpoints-to-identities-why-msps-need-a-user-centric-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"From Endpoints to Identities: Why MSPs Need a User-Centric Approach"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-rek","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=104676"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104676\/revisions"}],"predecessor-version":[{"id":104683,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104676\/revisions\/104683"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=104676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=104676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=104676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}