{"version":"1.0","provider_name":"PTP | Cloud Experts | Biotech Enablers","provider_url":"https:\/\/ptp.cloud","title":"Cloud Security: Creating Borders in Borderless Environments | PTP News","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6XS512rV0d\"><a href=\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/\">Cloud Security: Creating Borders in Borderless Environments<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/embed\/#?secret=6XS512rV0d\" width=\"600\" height=\"338\" title=\"&#8220;Cloud Security: Creating Borders in Borderless Environments&#8221; &#8212; PTP | Cloud Experts | Biotech Enablers\" data-secret=\"6XS512rV0d\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png","thumbnail_width":1069,"thumbnail_height":727,"description":"Maximize Cloud Security with CASB: Explore how Cloud Access Security Brokers (CASB) offer centralized control and protection for your data in the cloud. Gain insights into CASB benefits like enhanced visibility, data security, threat protection, and compliance, ensuring your cloud environment remains secure against rising breaches. Learn about CASB deployment methods for comprehensive cloud security coverage and prepare your business for the future with PTP's expert guidance."}