{"id":17950,"date":"2020-08-01T03:44:44","date_gmt":"2020-08-01T03:44:44","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?page_id=17950"},"modified":"2024-06-07T18:58:32","modified_gmt":"2024-06-07T18:58:32","slug":"about","status":"publish","type":"page","link":"https:\/\/www.esecurityplanet.com\/about\/","title":{"rendered":"About eSecurity Planet"},"content":{"rendered":"\n<p><strong>eSecurity Planet<\/strong> is a leading independent resource for IT professionals who are actively researching cybersecurity vendors, processes, best practices, and trends. Founded in 2000, the site provides in-depth analysis and reviews of a wide range of cybersecurity products, along with instruction for how to approach common security challenges and informational deep-dives into advanced cybersecurity topics. eSecurity Planet is part of <strong><a href=\"https:\/\/technologyadvice.com\/\">TechnologyAdvice&#8217;s<\/a><\/strong> portfolio of B2B technology websites.<\/p>\n\n\n\n<p>Through rigorous research and decades of experience, eSecurity Planet brings perspective and depth unmatched in the cybersecurity industry. See our <a href=\"https:\/\/www.esecurityplanet.com\/editorial-policy\/\"><strong>editorial policy<\/strong><\/a>.<\/p>\n\n\n\n<p>eSecurity Planet is led by managing editor Meghan Lafferty, who also serves as associate director of content for TechnologyAdvice&#8217;s enterprise IT\u2013focused websites. Meghan supports the writers and editors for the sites to provide the best, most comprehensive answers to readers&#8217; questions. Prior to joining TechnologyAdvice, she worked for Selling Signals, an online publication geared toward B2B sales reps and managers, and a healthcare trade publication covering topics for C-suite and health IT professionals.<\/p>\n\n\n\n<p><strong>eSecurity Planet staff writers include:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"><strong>Jenna Phipps<\/strong><\/a> has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. Jenna also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/author\/mbasan\/\"><strong>Maine Basan<\/strong><\/a> has a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"><strong>Chad Kime<\/strong><\/a> covers a variety of security, compliance, and risk topics. Before joining the site, he studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. Chad served as eSecurity Planet\u2019s lead writer until his retirement in May 2024.<\/p>\n\n\n\n<p>eSecurity Planet has also published work from a number of long-time independent contributors, including <a href=\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"><strong>Drew Robb<\/strong><\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/author\/henry-newman-esp\/\"><strong>Henry Newman<\/strong><\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/author\/aminu-abdullahi\/\"><strong>Aminu Abdullahi<\/strong><\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/author\/shelby-hiter\/\"><strong>Shelby Hiter<\/strong><\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"><strong>Jeff Goldman<\/strong><\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"><strong>Julien Maury<\/strong><\/a>, <strong><a href=\"https:\/\/www.esecurityplanet.com\/author\/kihara-kimachia\/\">Kihara Kimachia<\/a><\/strong>, and <a href=\"https:\/\/www.esecurityplanet.com\/author\/tom-taulli\/\"><strong>Tom Taulli<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>eSecurity Planet is a leading independent resource for IT professionals who are actively researching cybersecurity vendors, processes, best practices, and trends. Founded in 2000, the site provides in-depth analysis and reviews of a wide range of cybersecurity products, along with instruction for how to approach common security challenges and informational deep-dives into advanced cybersecurity topics. [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"class_list":["post-17950","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>About eSecurity Planet | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"eSecurity Planet is a leading independent resource for IT professionals who are actively researching cybersecurity vendors and trends.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/about\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About eSecurity Planet | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"eSecurity Planet is a leading independent resource for IT professionals who are actively researching cybersecurity vendors and trends.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/about\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-07T18:58:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/about\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/about\/\",\"name\":\"About eSecurity Planet | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2020-08-01T03:44:44+00:00\",\"dateModified\":\"2024-06-07T18:58:32+00:00\",\"description\":\"eSecurity Planet is a leading independent resource for IT professionals who are actively researching cybersecurity vendors and trends.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/about\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/about\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/about\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About eSecurity Planet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About eSecurity Planet | eSecurity Planet","description":"eSecurity Planet is a leading independent resource for IT professionals who are actively researching cybersecurity vendors and trends.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/about\/","og_locale":"en_US","og_type":"article","og_title":"About eSecurity Planet | eSecurity Planet","og_description":"eSecurity Planet is a leading independent resource for IT professionals who are actively researching cybersecurity vendors and trends.","og_url":"https:\/\/www.esecurityplanet.com\/about\/","og_site_name":"eSecurity Planet","article_modified_time":"2024-06-07T18:58:32+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@eSecurityPlanet","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/about\/","url":"https:\/\/www.esecurityplanet.com\/about\/","name":"About eSecurity Planet | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2020-08-01T03:44:44+00:00","dateModified":"2024-06-07T18:58:32+00:00","description":"eSecurity Planet is a leading independent resource for IT professionals who are actively researching cybersecurity vendors and trends.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/about\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/about\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/about\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"About eSecurity Planet"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/pages\/17950"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=17950"}],"version-history":[{"count":3,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/pages\/17950\/revisions"}],"predecessor-version":[{"id":35901,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/pages\/17950\/revisions\/35901"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=17950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}