{"id":18067,"date":"2017-04-05T17:03:51","date_gmt":"2017-04-05T17:03:51","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18067"},"modified":"2023-05-26T18:25:54","modified_gmt":"2023-05-26T18:25:54","slug":"mobile-device-management","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/","title":{"rendered":"What is Mobile Device Management (MDM)?"},"content":{"rendered":"<p>The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of devices. Bring Your Own Device, often shortened to\u00a0<a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\">BYOD,<\/a>\u00a0opens up organizations to new risks and creates a need for a new type of device control.<\/p>\n<h2>What is MDM?<\/h2>\n<p>Mobile Device Management, or MDM, is a class of technology platform that is used to help organizations manage and control mobile devices used to access business resources.<\/p>\n<p>A core element of an MDM platform is\u00a0<a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">network access control (NAC)<\/a>\u00a0and pre-admission control. MDM technologies often include the capability to check devices that want access to the network to first verify that the device has not been compromised or jailbroken. MDM technologies can also be used to selectively enable or disable native device capabilities.<\/p>\n<p>Other features that can sometime be attributed to MDM platform are remote Virtual Private Network (VPN) capabilities, enabling users to securely connect to corporate resources. Additionally, remote lock and wipe capabilities may also be part of an MDM platform.<\/p>\n<h2>MDM vs EMM<\/h2>\n<p>The term &#8220;MDM&#8221; was initially just about hardware management, which led some vendors in the market to use the term Mobile Application Management (MAM). The early promise of MAM platforms was to provide capabilities that were not in MDM, namely the application piece, providing curated app stores for corporate use as well as data management policies.<\/p>\n<p>As a term and industry classification, MAM was quickly supplanted by the more expansive term\u00a0<a href=\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\">Enterprise Mobility Management (EMM)<\/a>, which includes attributes of both MDM and MAM platform technologies.<\/p>\n<p>EMM is an all-encompassing approach to securing and enabling employee use of mobile devices. EMM typically involves some combination of mobile device management (MDM), mobile application management (MAM), and mobile information management.<\/p>\n<h2>MDM solutions<\/h2>\n<p>While EMM has largely supplanted MDM as an industry term, many mobile management solutions still use the term MDM to define themselves even though they do more than just manage hardware.<\/p>\n<p><strong>Apple IOS:<\/strong>\u00a0Apple, for example, still uses the term MDM to\u00a0define\u00a0options for enterprise mobility management.<\/p>\n<p><strong>Google Android:<\/strong>\u00a0Google also continues to use the term MDM for its enterprise mobility management capabilities. Google now provides MDM and EMM capabilities via its\u00a0<a href=\"https:\/\/workspace.google.com\/products\/admin\/endpoint\/\">Mobile Management<\/a>\u00a0service capability that is part of the G-Suite services platform.<\/p>\n<p>For more information on EMM, visit our\u00a0<a href=\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\">EMM page<\/a>.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d8f97c776-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d8f97c776\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d8f97c776\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d8f97c776\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d8f97c776\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d8f97c776\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d8f97c776\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of devices. Bring Your Own Device, often shortened to\u00a0BYOD,\u00a0opens up organizations to new risks and creates a need for a new type of device control. What is MDM? Mobile Device Management, or [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[18],"tags":[],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-18067","post","type-post","status-publish","format-standard","hentry","category-mobile"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Mobile Device Management (MDM)? | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Mobile Device Management, or MDM, helps businesses manage and control mobile devices used to access business resources. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Mobile Device Management (MDM)? | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Mobile Device Management, or MDM, helps businesses manage and control mobile devices used to access business resources. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-05T17:03:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-26T18:25:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sean Michael Kerner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Michael Kerner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\"},\"author\":{\"name\":\"Sean Michael Kerner\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\"},\"headline\":\"What is Mobile Device Management (MDM)?\",\"datePublished\":\"2017-04-05T17:03:51+00:00\",\"dateModified\":\"2023-05-26T18:25:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\"},\"wordCount\":397,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"articleSection\":[\"Mobile\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\",\"name\":\"What is Mobile Device Management (MDM)? | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2017-04-05T17:03:51+00:00\",\"dateModified\":\"2023-05-26T18:25:54+00:00\",\"description\":\"Mobile Device Management, or MDM, helps businesses manage and control mobile devices used to access business resources. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Mobile Device Management (MDM)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\",\"name\":\"Sean Michael Kerner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"caption\":\"Sean Michael Kerner\"},\"description\":\"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Mobile Device Management (MDM)? | eSecurity Planet","description":"Mobile Device Management, or MDM, helps businesses manage and control mobile devices used to access business resources. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/","og_locale":"en_US","og_type":"article","og_title":"What is Mobile Device Management (MDM)? | eSecurity Planet","og_description":"Mobile Device Management, or MDM, helps businesses manage and control mobile devices used to access business resources. Learn more.","og_url":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/","og_site_name":"eSecurity Planet","article_published_time":"2017-04-05T17:03:51+00:00","article_modified_time":"2023-05-26T18:25:54+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Sean Michael Kerner","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sean Michael Kerner","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/"},"author":{"name":"Sean Michael Kerner","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0"},"headline":"What is Mobile Device Management (MDM)?","datePublished":"2017-04-05T17:03:51+00:00","dateModified":"2023-05-26T18:25:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/"},"wordCount":397,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"articleSection":["Mobile"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/","url":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/","name":"What is Mobile Device Management (MDM)? | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2017-04-05T17:03:51+00:00","dateModified":"2023-05-26T18:25:54+00:00","description":"Mobile Device Management, or MDM, helps businesses manage and control mobile devices used to access business resources. Learn more.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What is Mobile Device Management (MDM)?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0","name":"Sean Michael Kerner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","caption":"Sean Michael Kerner"},"description":"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.","url":"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18067"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18067"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18067\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18067"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18067"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18067"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}