{"id":4632,"date":"2018-05-17T00:00:00","date_gmt":"2018-05-17T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/05\/17\/symantec-managed-security-services-overview-and-analysis\/"},"modified":"2021-01-28T16:20:08","modified_gmt":"2021-01-28T16:20:08","slug":"symantec-managed-security-services","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/","title":{"rendered":"Symantec Managed Security Services: Overview and Analysis"},"content":{"rendered":"<div id=\"article-content\">\n<p><em>See our complete list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\">top managed security service providers<\/a><\/em><\/p>\n<h2>Company Description<\/h2>\n<p>Symantec, a Fortune 500 company and a member of the S&amp;P 500, provides security software and services. It has a huge cyber intelligence network, as well as a large portfolio of security solutions that includes Cyber Security Services, Managed Security Services (MSS), Incident Response, DeepSight Threat Intelligence, and Cyber Skills Development. The company has been providing managed services for almost two decades. Recent acquisitions include Outlier Security (EDR), Skycure (mobile device protection) and Fireglass (isolation technology).<\/p>\n<h2>Service Description<\/h2>\n<p>Symantec operates six security operations centers (SOCs) across the globe and provides end-to-end monitoring services, IDPS management, hosted log retention, intelligence services and advanced threat protection, plus incident response and cyber skills development. Symantec monitors and manage its customers&#8217; security environment \u2013 everything from data collection to incident identification and interactive alerting. Its dedicated security analysts prepare reports and provide details and recommendations on the incidents found. It monitors on-premises and cloud-based devices and services, including SaaS-based security solutions, SaaS applications, IaaS and cloud audit and logging services.<\/p>\n<h2>Its MSSP services include:<\/h2>\n<ul>\n<li>Cloud-based services, applications and infrastructure<\/li>\n<li>Application security monitoring, scanning\/testing<\/li>\n<li>Continuous monitoring (applications, server, endpoints and network)<\/li>\n<li>Web proxy monitoring<\/li>\n<li>Anomaly-based advanced persistent threat (APT) protection\/sandbox\/protected code execution<\/li>\n<li>Data loss prevention (DLP)<\/li>\n<li>Incident response and forensics<\/li>\n<li>Security incident and event correlation management (SIECM)<\/li>\n<li>Security compliance monitoring<\/li>\n<li>Security event and threat analysis\/operational intelligence<\/li>\n<li>Threat intelligence information feeds\/advanced threat research<\/li>\n<li>Vulnerability management (VM) via integration with VM vendors<\/li>\n<\/ul>\n<h2>Markets and Use Cases<\/h2>\n<p>Symantec Managed Security Services serves companies of all sizes all over the world. It organizes segments based on industry and also customer security maturity so that it can tailor SOC service delivery to customers&#8217; needs.<\/p>\n<h2>Metrics<\/h2>\n<p>Symantec MSS collects and processes an average of 124.9 billion security logs each day. Its intelligence network tracks over 700,000 adversaries and records events from 98 million attack sensors worldwide. In addition, Symantec&#8217;s vulnerability databases consist of more than 88,900 recorded vulnerabilities.<\/p>\n<h2>Delivery<\/h2>\n<p>Symantec provides customers a Log Collection Platform (LCP) that can be deployed on-premises or in the cloud. The platform collects log data from monitored devices and forwards it to the SOC for analysis and reporting. The LCP may host multiple event collectors and an event agent on box. Each customer receives a dedicated onboarding engineer for each engagement. The SOC Technology Platform aggregates, normalizes, correlates and analyzes data collected from customer security controls and other log and event sources. The multi-tenant platform is located in the SOC.<\/p>\n<h2>Intelligence<\/h2>\n<p>Symantec applies machine learning, analytics and analyst security expertise to eliminate false positives and escalate only critical incidents that need attention within 10 minutes of identification. Its resource network provides threat analytics that are correlated with threat data. Symantec Managed Security Services are powered by 500+ security experts who average 15 years of experience in security monitoring and log management. Security experts work with customers directly and are located in six SOCs throughout the world.<\/p>\n<h2>Pricing<\/h2>\n<p>The company has an enterprise-wide pricing model that offers larger customers flexibility in pricing and configuration.<\/p>\n<h2>Analyst View<\/h2>\n<p>Symantec has been a Leader in the Gartner MSS Magic Quadrant 13 consecutive times. It was named as a top player in the IDC MarketScape Worldwide Managed Security Services Vendor Assessment, 2017, as well as a Strong Performer and in the Forrester Wave for Managed Security Services, North America.<\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6f3fada1f9-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f3fada1f9\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f3fada1f9\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f3fada1f9\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f3fada1f9\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f3fada1f9\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f3fada1f9\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>See our complete list of top managed security service providers Company Description Symantec, a Fortune 500 company and a member of the S&amp;P 500, provides security software and services. It has a huge cyber intelligence network, as well as a large portfolio of security solutions that includes Cyber Security Services, Managed Security Services (MSS), Incident [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[23378,14680,31117,31118,23044,4459],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[389],"class_list":["post-4632","post","type-post","status-publish","format-standard","hentry","category-products","tag-managed-security","tag-managed-security-services","tag-managed-security-services-providers","tag-managed-services-providers","tag-mssp","tag-symantec","b2b_audience-evaluation-and-selection","b2b_product-managed-security-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symantec Managed Security Services | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"We review Symantec&#039;s Managed Security Services, which has received top ratings from industry analysts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symantec Managed Security Services | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"We review Symantec&#039;s Managed Security Services, which has received top ratings from industry analysts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-17T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:20:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"Symantec Managed Security Services: Overview and Analysis\",\"datePublished\":\"2018-05-17T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:20:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/\"},\"wordCount\":564,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"managed security\",\"Managed Security Services\",\"managed security services providers\",\"managed services providers\",\"MSSP\",\"Symantec\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/\",\"name\":\"Symantec Managed Security Services | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2018-05-17T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:20:08+00:00\",\"description\":\"We review Symantec's Managed Security Services, which has received top ratings from industry analysts.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Symantec Managed Security Services: Overview and Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Symantec Managed Security Services | eSecurity Planet","description":"We review Symantec's Managed Security Services, which has received top ratings from industry analysts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/","og_locale":"en_US","og_type":"article","og_title":"Symantec Managed Security Services | eSecurity Planet","og_description":"We review Symantec's Managed Security Services, which has received top ratings from industry analysts.","og_url":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/","og_site_name":"eSecurity Planet","article_published_time":"2018-05-17T00:00:00+00:00","article_modified_time":"2021-01-28T16:20:08+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"Symantec Managed Security Services: Overview and Analysis","datePublished":"2018-05-17T00:00:00+00:00","dateModified":"2021-01-28T16:20:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/"},"wordCount":564,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["managed security","Managed Security Services","managed security services providers","managed services providers","MSSP","Symantec"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/","url":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/","name":"Symantec Managed Security Services | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2018-05-17T00:00:00+00:00","dateModified":"2021-01-28T16:20:08+00:00","description":"We review Symantec's Managed Security Services, which has received top ratings from industry analysts.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/symantec-managed-security-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Symantec Managed Security Services: Overview and Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4632"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=4632"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4632\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=4632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=4632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=4632"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=4632"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=4632"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=4632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}