{"id":132377,"date":"2026-03-31T09:43:44","date_gmt":"2026-03-31T09:43:44","guid":{"rendered":"https:\/\/www.42gears.com\/?p=132377"},"modified":"2026-03-31T10:39:24","modified_gmt":"2026-03-31T10:39:24","slug":"mdm-security-zero-trust-approach","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/pt-br\/blog\/mdm-security-zero-trust-approach\/","title":{"rendered":"MDM Security Explained: Preventing Credential Misuse with Zero Trust"},"content":{"rendered":"\n<p>Cybersecurity incidents keep happening across industries, but they often reveal gaps in how systems are managed\u2014not flaws in the systems themselves. Sometimes, privileged credentials can be misused to perform critical actions, like remotely wiping devices, showing just how important it is to have strong controls around administrative access.<\/p>\n\n\n\n<p>It\u2019s worth noting that these situations don\u2019t necessarily mean the device management platform is insecure. More often, the system is fine, and the risk comes from misconfigured settings, weak access controls, or gaps in security practices. That\u2019s why strong governance, proper policy setup, and careful management of admin privileges are so crucial.<\/p>\n\n\n\n<p>In this blog, we will dive into top <a href=\"https:\/\/www.42gears.com\/products\/mobile-device-management\/\">SureMDM<\/a> security features and also best practices for IT admins, that together help safeguards against cyberattacks.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-modern-mdm-security-must-go-beyond-passwords\"><strong>Why Modern MDM Security Must Go Beyond Passwords<\/strong><\/h2>\n\n\n\n<p>According to industry research, over 80% of breaches involve compromised or stolen credentials<sup>1<\/sup>. Yet many organizations still rely on passwords alone to protect their most critical systems. For IT teams managing enterprise devices at scale, this is a significant blind spot \u2014 one that attackers are actively exploiting.<\/p>\n\n\n\n<p>This is why relying solely on usernames and passwords is no longer sufficient. True security lies in layered verification, controlled access, and continuous monitoring.<\/p>\n\n\n\n<p>SureMDM aligns with this Zero Trust security approach by combining identity validation, contextual access controls, and operational safeguards.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-suremdm-prevents-credential-misuse\"><strong>How SureMDM Prevents Credential Misuse<\/strong><\/h2>\n\n\n\n<p>SureMDM is built on a defense-in-depth approach\u2014ensuring that even if one layer is compromised, others actively prevent misuse. Here\u2019s how:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-multi-factor-authentication-mfa\"><strong>1. Multi-Factor Authentication (MFA)<\/strong><\/h3>\n\n\n\n<p>All administrative access can\u2014and should\u2014be protected with MFA. Even if credentials are compromised, unauthorized users cannot access the console without the second authentication factor.&nbsp;<\/p>\n\n\n\n<p>\ud83d\udc49<a href=\"https:\/\/knowledgebase.42gears.com\/article\/how-to-set-up-multi-factor-authentication-in-suremdm\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to set up an MFA in SureMDM?<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-role-based-access-control-rbac\"><strong>2. Role-Based Access Control (RBAC)<\/strong><\/h3>\n\n\n\n<p>Not every admin has the same level of access. RBAC enforces strict privilege separation, ensuring users only have permissions necessary for their role. This minimizes exposure to critical actions and enforces accountability across the system.<\/p>\n\n\n\n<p>\ud83d\udc49<a href=\"https:\/\/knowledgebase.42gears.com\/article\/how-to-create-users-in-suremdm-and-assign-them-specific-roles\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to create users in SureMDM and assign them specific roles?<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-four-eyes-initiator-approver-approval-framework\"><strong>3. Four-Eyes (Initiator-Approver) Approval Framework<\/strong><\/h3>\n\n\n\n<p>Under the <a href=\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/\">4 Eyes Principle<\/a>, high-risk actions like remote wipe are protected by a mandatory approval workflow. A single admin\u2014even with valid credentials\u2014cannot execute destructive actions independently. A second authorized approver must review and approve the request before execution.<\/p>\n\n\n\n<p>This significantly reduces the blast radius of any compromised account.<\/p>\n\n\n\n<p>\ud83d\udc49 <a href=\"https:\/\/docs.42gears.com\/suremdm\/four-eyes-framework\/four-eyes\/introduction#enabling-the-four-eyes-framework\" target=\"_blank\" rel=\"noreferrer noopener\">How to enable four-eyes principle in SureMDM?<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-it-administrators-should-do\"><strong>What IT Administrators Should Do<\/strong><\/h2>\n\n\n\n<p>Managing admin credentials is just as important as managing the devices themselves. Here&#8217;s a quick checklist to ensure your MDM environment stays secure:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enforce MFA across all admin accounts\u2014without exceptions<\/li>\n\n\n\n<li>Apply the principle of least privilege when assigning roles<\/li>\n\n\n\n<li>Regularly audit and remove inactive or shared admin accounts<\/li>\n\n\n\n<li>Restrict critical actions\/permissions (like wipe actions) to specific, accountable individuals<\/li>\n\n\n\n<li>Enable the Four-Eyes approval framework for all critical actions<\/li>\n\n\n\n<li>Configure and monitor real-time alerts for device compliance policies<\/li>\n\n\n\n<li>Periodically review audit logs to detect anomalies early<\/li>\n\n\n\n<li>Implement strong password policies and rotate credentials regularly<\/li>\n\n\n\n<li>Educate admin users on phishing and credential security best practices<\/li>\n<\/ul>\n\n\n\n<p>Taking these steps ensures that even attempted credential misuse is quickly contained and neutralized.<\/p>\n\n\n\n<span><i><b>Source:<\/b><br>2025 Verizon Data Breach Investigations Report<\/i><\/span>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-faqs\"><strong>FAQs:<\/strong><\/h2>\n\n\n\n<p><strong>1. If admin credentials are compromised, can attackers wipe all devices?<\/strong><br>No. When SureMDM\u2019s Four-Eyes approval framework is enabled, it ensures that no single admin can execute destructive actions like mass device wipe. A second authorized approver is always required once enabled.<\/p>\n\n\n\n<p><strong>2. What makes SureMDM different from other MDM solutions in this context?<\/strong><br>SureMDM goes beyond basic device management by integrating identity security, access control, approval workflows\u2014ensuring that even valid credentials cannot be misused without additional verification.<\/p>\n\n\n\n<p><strong>3. How can I tighten the security of my account?&nbsp;<\/strong><br>Start by enabling MFA for all admins, auditing user roles, activating the Four-Eyes framework, and reviewing alert configurations. These steps significantly reduce the risk of credential-based attacks.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity incidents keep happening across industries, but they often reveal gaps in how systems are managed\u2014not flaws in the systems themselves. Sometimes, privileged credentials can be misused to perform critical actions, like remotely wiping devices, showing just how important it is to have strong controls around administrative access. It\u2019s worth noting that these situations don\u2019t&hellip;<\/p>\n","protected":false},"author":47,"featured_media":132390,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"latest-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-132377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust MDM Security: Stop Credential-Based Attacks | SureMDM<\/title>\n<meta name=\"description\" content=\"Discover how compromised admin credentials lead to MDM misuse\u2014and how SureMDM prevents it with layered security and Zero Trust controls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MDM Security Explained: Preventing Credential Misuse with Zero Trust\" \/>\n<meta property=\"og:description\" content=\"Discover how compromised admin credentials lead to MDM misuse\u2014and how SureMDM prevents it with layered security and Zero Trust controls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-31T09:43:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T10:39:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laxmi G Joshi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laxmi G Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/\"},\"author\":{\"name\":\"Laxmi G Joshi\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/2e2fb8e313d26a7375a70751ab717427\"},\"headline\":\"MDM Security Explained: Preventing Credential Misuse with Zero Trust\",\"datePublished\":\"2026-03-31T09:43:44+00:00\",\"dateModified\":\"2026-03-31T10:39:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/\"},\"wordCount\":658,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/\",\"name\":\"Zero Trust MDM Security: Stop Credential-Based Attacks | SureMDM\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg\",\"datePublished\":\"2026-03-31T09:43:44+00:00\",\"dateModified\":\"2026-03-31T10:39:24+00:00\",\"description\":\"Discover how compromised admin credentials lead to MDM misuse\u2014and how SureMDM prevents it with layered security and Zero Trust controls.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg\",\"width\":2000,\"height\":1080,\"caption\":\"Strengthen MDM security with SureMDM\u2019s Zero Trust approach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MDM Security Explained: Preventing Credential Misuse with Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/2e2fb8e313d26a7375a70751ab717427\",\"name\":\"Laxmi G Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcff53a2f8b8a82e5a152189a9c62033d7cbadecdce79563a92a03b6d046a12b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcff53a2f8b8a82e5a152189a9c62033d7cbadecdce79563a92a03b6d046a12b?s=96&d=mm&r=g\",\"caption\":\"Laxmi G Joshi\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust MDM Security: Stop Credential-Based Attacks | SureMDM","description":"Discover how compromised admin credentials lead to MDM misuse\u2014and how SureMDM prevents it with layered security and Zero Trust controls.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/","og_locale":"pt_BR","og_type":"article","og_title":"MDM Security Explained: Preventing Credential Misuse with Zero Trust","og_description":"Discover how compromised admin credentials lead to MDM misuse\u2014and how SureMDM prevents it with layered security and Zero Trust controls.","og_url":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2026-03-31T09:43:44+00:00","article_modified_time":"2026-03-31T10:39:24+00:00","og_image":[{"width":2000,"height":1080,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg","type":"image\/jpeg"}],"author":"Laxmi G Joshi","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"Laxmi G Joshi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/"},"author":{"name":"Laxmi G Joshi","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/2e2fb8e313d26a7375a70751ab717427"},"headline":"MDM Security Explained: Preventing Credential Misuse with Zero Trust","datePublished":"2026-03-31T09:43:44+00:00","dateModified":"2026-03-31T10:39:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/"},"wordCount":658,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg","articleSection":["Uncategorized"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/","url":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/","name":"Zero Trust MDM Security: Stop Credential-Based Attacks | SureMDM","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg","datePublished":"2026-03-31T09:43:44+00:00","dateModified":"2026-03-31T10:39:24+00:00","description":"Discover how compromised admin credentials lead to MDM misuse\u2014and how SureMDM prevents it with layered security and Zero Trust controls.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg","width":2000,"height":1080,"caption":"Strengthen MDM security with SureMDM\u2019s Zero Trust approach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/mdm-security-zero-trust-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"MDM Security Explained: Preventing Credential Misuse with Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/2e2fb8e313d26a7375a70751ab717427","name":"Laxmi G Joshi","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcff53a2f8b8a82e5a152189a9c62033d7cbadecdce79563a92a03b6d046a12b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcff53a2f8b8a82e5a152189a9c62033d7cbadecdce79563a92a03b6d046a12b?s=96&d=mm&r=g","caption":"Laxmi G Joshi"}}]}},"author_meta":{"ID":"47","user_nicename":"laxmi-joshi42gears-com","user_email":"laxmi.joshi@42gears.com","user_registered":"2025-12-12 11:20:07","display_name":"Laxmi G Joshi","first_name":"Laxmi","last_name":"G Joshi"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/Strengthening-Trust-in-MDM-Security.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/132377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/comments?post=132377"}],"version-history":[{"count":6,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/132377\/revisions"}],"predecessor-version":[{"id":132415,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/132377\/revisions\/132415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/media\/132390"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/media?parent=132377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/categories?post=132377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/tags?post=132377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}