{"id":30623,"date":"2023-06-13T17:27:21","date_gmt":"2023-06-13T17:27:21","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?page_id=30623"},"modified":"2023-06-14T23:51:47","modified_gmt":"2023-06-14T23:51:47","slug":"editorial-policy","status":"publish","type":"page","link":"https:\/\/www.esecurityplanet.com\/editorial-policy\/","title":{"rendered":"eSecurity Planet Editorial Policy"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We at <\/span><i><span style=\"font-weight: 400;\">eSecurity Planet<\/span><\/i><span style=\"font-weight: 400;\"> have one goal: To give IT security professionals the information they need to do their jobs as best as they possibly can. To accomplish that, we conduct rigorous, independent product analysis to give readers security product recommendations they can trust, and we use our vantage point to bring to light the trends and threats that will help cybersecurity pros defend their cloud and on-premises environments both today and in the future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our mission is to provide the best, most trustworthy, and most actionable advice for security professionals, whether they&#8217;re in the midst of a cyber crisis or in the market for new security tools. We strive to provide both critical takeaways for readers who are in a hurry, and in-depth analysis and insights for those conducting deep research into products and issues.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">eSecurity Planet and Sponsored Content<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Our partners and sponsors fund our high-quality journalism and product evaluations, but they do not influence our coverage or editorial decisions. They understand that our value comes from our commitment to providing the best answer to our readers \u2014 and that the trust that readers have in us brings the highest-quality security professionals to our site.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The insights and product analysis that appears in our articles reflects the judgment of our editors and writers that this is information our readers need to know \u2014 and it passes through multiple layers of review before it appears on our pages. While we have decades of experience in IT, cybersecurity, and IT journalism, we continuously strive to stay on top of evolving technology and threats. Our collegial staff passionately debates matters big and small to make sure that we give readers the best information and answers to questions they may be asking \u2014 or should be asking.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">eSecurity Planet and AI<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Our judgment is not informed or influenced by AI. We conducted an analysis of our work against ChatGPT and found that our human analysts and reviewers so far surpass what AI is currently capable of that any shortcuts would be a disservice to our readers. What you read on our pages is the painstaking analysis of our editors, writers and analysts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity is a critically important area for all of humanity, and we invest considerably in our content to bring our readers the best possible information. In the interest of transparency, here is a list of partners who have sponsored our work.<\/span><\/p>\n<p><strong>Learn more <a href=\"https:\/\/www.esecurityplanet.com\/about\/\">about eSecurity Planet&#8217;s history and staff<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We at eSecurity Planet have one goal: To give IT security professionals the information they need to do their jobs as best as they possibly can. To accomplish that, we conduct rigorous, independent product analysis to give readers security product recommendations they can trust, and we use our vantage point to bring to light the [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"class_list":["post-30623","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Editorial Policy for eSecurity Planet<\/title>\n<meta name=\"description\" content=\"eSecurityPlanet&#039;s Editorial Policy: Trusted insights, unbiased analysis, and expert opinions on cybersecurity trends and technologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/editorial-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Editorial Policy for eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"eSecurityPlanet&#039;s Editorial Policy: Trusted insights, unbiased analysis, and expert opinions on cybersecurity trends and technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/editorial-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-14T23:51:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/editorial-policy\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/editorial-policy\/\",\"name\":\"Editorial Policy for eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2023-06-13T17:27:21+00:00\",\"dateModified\":\"2023-06-14T23:51:47+00:00\",\"description\":\"eSecurityPlanet's Editorial Policy: Trusted insights, unbiased analysis, and expert opinions on cybersecurity trends and technologies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/editorial-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/editorial-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/editorial-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"eSecurity Planet Editorial Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Editorial Policy for eSecurity Planet","description":"eSecurityPlanet's Editorial Policy: Trusted insights, unbiased analysis, and expert opinions on cybersecurity trends and technologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/editorial-policy\/","og_locale":"en_US","og_type":"article","og_title":"Editorial Policy for eSecurity Planet","og_description":"eSecurityPlanet's Editorial Policy: Trusted insights, unbiased analysis, and expert opinions on cybersecurity trends and technologies.","og_url":"https:\/\/www.esecurityplanet.com\/editorial-policy\/","og_site_name":"eSecurity Planet","article_modified_time":"2023-06-14T23:51:47+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@eSecurityPlanet","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/editorial-policy\/","url":"https:\/\/www.esecurityplanet.com\/editorial-policy\/","name":"Editorial Policy for eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2023-06-13T17:27:21+00:00","dateModified":"2023-06-14T23:51:47+00:00","description":"eSecurityPlanet's Editorial Policy: Trusted insights, unbiased analysis, and expert opinions on cybersecurity trends and technologies.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/editorial-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/editorial-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/editorial-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"eSecurity Planet Editorial Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/pages\/30623"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=30623"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/pages\/30623\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=30623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}