{"id":4574,"date":"2017-08-15T00:00:00","date_gmt":"2017-08-15T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/08\/15\/trend-micro-endpoint-encryption-product-overview-and-analysis\/"},"modified":"2021-01-28T16:20:06","modified_gmt":"2021-01-28T16:20:06","slug":"trend-micro-endpoint","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/","title":{"rendered":"Trend Micro Endpoint Encryption: Product Overview and Analysis"},"content":{"rendered":"<div id=\"article-content\">\n<p><em>See our complete list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">top 10 enterprise encryption solutions<\/a>.<\/em><\/p>\n<h2>Company Description<\/h2>\n<p>Trend Micro looks after 155 million endpoints and 500,000+ companies worldwide. For nearly 30 years, Trend Micro&#8217;s entire focus has been security. It began with anti-virus and has expanded to include the gamut of security tools. It is publicly traded.<\/p>\n<h2>Product Description<\/h2>\n<p>Trend Micro Endpoint Encryption provides full disk encryption, folder and file encryption, and removable media encryption. It can also manage Microsoft BitLocker and Apple FileVault. It encrypts data on PCs and Macs, laptops and desktops, USB drives, and other removable media. It combines enterprise-wide full disk, file\/folder, and removable media encryption to prevent unauthorized access and use of private information. A single management console allows security teams to manage users holistically, using the same console for endpoint protection as other Trend Micro security products.<\/p>\n<h2>Agents<\/h2>\n<p>Agents are employed.<\/p>\n<h2>Markets and Use Cases<\/h2>\n<p>SMBs to large enterprises.<\/p>\n<h2>Applicable Metrics<\/h2>\n<p>Can scale up to very large deployments.<\/p>\n<h2>Security Qualifications<\/h2>\n<p>FIPS 140-2 certification and AES 256-bit encryption.<\/p>\n<h2>Intelligence<\/h2>\n<p>Trend Micro builds machine learning and behavioral analytics into its security products.<\/p>\n<h2>Standalone or Suite<\/h2>\n<p>Endpoint Encryption is a component of Trend Micro\u2019s Smart Protection Suites, which deliver <br \/>capabilities such as DLP, device control, gateway, mobile device, endpoint protection, application <br \/>control, and intrusion prevention.<\/p>\n<h2>Delivery<\/h2>\n<p>Software is pushed out to endpoints via a management console.<\/p>\n<h2>Pricing<\/h2>\n<p>Trend Micro\u2019s encryption tools are available as part of larger suites. The Trend Micro Enterprise Security Suite for Endpoints pricing starts at $33.75 per user for 501 users. The Enterprise Data Protection add-on is $46 per user for 501 users. Tiered pricing is available for both, and prices include one year of standard support.<\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d707ad1b657-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d707ad1b657\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d707ad1b657\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d707ad1b657\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d707ad1b657\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d707ad1b657\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d707ad1b657\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>See our complete list of top 10 enterprise encryption solutions. Company Description Trend Micro looks after 155 million endpoints and 500,000+ companies worldwide. For nearly 30 years, Trend Micro&#8217;s entire focus has been security. It began with anti-virus and has expanded to include the gamut of security tools. It is publicly traded. Product Description Trend [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[860,2461],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[383],"class_list":["post-4574","post","type-post","status-publish","format-standard","hentry","category-products","tag-encryption","tag-trend-micro","b2b_audience-evaluation-and-selection","b2b_product-encryption-data-loss-prevention"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Trend Micro Endpoint Encryption | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"We review Trend Micro Endpoint Encryption, which offers full disk, folder, file and removable media encryption, along with central security management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro Endpoint Encryption | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"We review Trend Micro Endpoint Encryption, which offers full disk, folder, file and removable media encryption, along with central security management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-15T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:20:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"Trend Micro Endpoint Encryption: Product Overview and Analysis\",\"datePublished\":\"2017-08-15T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:20:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/\"},\"wordCount\":283,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"encryption\",\"Trend Micro\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/\",\"name\":\"Trend Micro Endpoint Encryption | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2017-08-15T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:20:06+00:00\",\"description\":\"We review Trend Micro Endpoint Encryption, which offers full disk, folder, file and removable media encryption, along with central security management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Endpoint Encryption: Product Overview and Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro Endpoint Encryption | eSecurity Planet","description":"We review Trend Micro Endpoint Encryption, which offers full disk, folder, file and removable media encryption, along with central security management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro Endpoint Encryption | eSecurity Planet","og_description":"We review Trend Micro Endpoint Encryption, which offers full disk, folder, file and removable media encryption, along with central security management.","og_url":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/","og_site_name":"eSecurity Planet","article_published_time":"2017-08-15T00:00:00+00:00","article_modified_time":"2021-01-28T16:20:06+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"Trend Micro Endpoint Encryption: Product Overview and Analysis","datePublished":"2017-08-15T00:00:00+00:00","dateModified":"2021-01-28T16:20:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/"},"wordCount":283,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["encryption","Trend Micro"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/","url":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/","name":"Trend Micro Endpoint Encryption | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2017-08-15T00:00:00+00:00","dateModified":"2021-01-28T16:20:06+00:00","description":"We review Trend Micro Endpoint Encryption, which offers full disk, folder, file and removable media encryption, along with central security management.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/trend-micro-endpoint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Endpoint Encryption: Product Overview and Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4574"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=4574"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4574\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=4574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=4574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=4574"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=4574"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=4574"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=4574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}