{"id":7499,"date":"2019-04-24T00:00:00","date_gmt":"2019-04-24T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2019\/04\/24\/okta-identity-cloud-single-sign-on-overview-and-analysis\/"},"modified":"2022-05-30T01:16:11","modified_gmt":"2022-05-30T01:16:11","slug":"okta-identity-cloud","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/","title":{"rendered":"Okta Identity Cloud: Single Sign-On Overview and Analysis"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><em>See our complete list of <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/single-sign-on-solutions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em><strong>Top SSO Solutions<\/strong><\/em><\/a><\/p>\n<h2>Bottom Line<\/h2>\n<p>The Okta Identity Cloud includes single sign-on, adaptive multi-factor authentication, lifecycle management, universal directory and API access management. SSO is also available as a standalone solution. As one of the top products in the field, it finds itself in most vendor evaluation shortlists except for those requiring an on-premises approach.<\/p>\n<h2>Product Description<\/h2>\n<p>Single sign-on (SSO) and other features are available as standalone solutions or as part of the Okta Identity Cloud.<\/p>\n<p>The Okta Identity Cloud is the identity layer for IT and software stacks. For the IT stack, the Okta Identity Cloud helps manage and secure the extended enterprise by connecting companies to thousands of pre-integrated apps and millions of devices. For the software stack, the Okta Identity Cloud makes it possible to build identity layers into apps, websites and partner portals. Okta APIs and developer tools are used to build custom or commercial apps.<\/p>\n<h2>Markets and Use Cases<\/h2>\n<p>Okta works with any company, small or large. It has industry-specific content tailored to education, energy, financial services, technology, non-profit, healthcare and government verticals.<\/p>\n<h2>Security Qualifications<\/h2>\n<p>Okta uses the SOC 2, Type I and Type II processes to audit the operational and security processes of its service and the company. Okta has also achieved the Cloud Security Alliance (CSA) Security, Trust, &amp; Assurance Registry (STAR) Level 2 Attestation, ISO 27001:2013 Certification, and ISO 27018:2014 Certification. Additionally, Okta has an official authorized status with the Federal Risk and Authorization Management Program (FedRAMP) Moderate authority to operate (ATO), and has established a HIPAA Compliant Service instance to better serve the highly-regulated healthcare industry.<\/p>\n<h2>Intelligence<\/h2>\n<p>The Okta System Log records system events to provide an audit trail that can be used to understand platform activity and diagnose problems. The Okta System Log API provides near real-time read-only access to the system log, and it can be used by customers for integrating Okta into SIEM, CASB and UEBA solutions. For SIEM integration, customers are using Okta with Splunk, ArcSight, QRadar and others. The new ThreatInsight feature will help users make more intelligent security decisions.<\/p>\n<h2>Delivery<\/h2>\n<p>Okta is delivered as a SaaS solution.<\/p>\n<h2>Agents<\/h2>\n<p>Okta uses agents to connect to on-premises resources for provisioning and connecting to systems of record. If a customer does not have an on-prem directory to connect to, no agent is required.<\/p>\n<h2>Pricing<\/h2>\n<p>Okta offers a la carte pricing:<\/p>\n<ul>\n<li>Universal Directory: $1\/mo<\/li>\n<li>Single Sign-On: $2\/mo<\/li>\n<li>Adaptive Single Sign-On: $5\/mo<\/li>\n<li>Lifecycle Management:\n<ul>\n<li>$4\/mo &#8211; for 5 Okta Integration Network (OIN) apps<\/li>\n<li>$6\/mo &#8211; for 10 OIN apps<\/li>\n<li>$7\/mo &#8211; unlimited OIN apps<\/li>\n<li>$2\/mo &#8211; advanced mastering<\/li>\n<li>$1\/mo &#8211; custom integrations<\/li>\n<li>$8\/mo &#8211; unlimited OIN apps + advanced mastering + custom integrations<\/li>\n<\/ul>\n<\/li>\n<li>MFA: $3\/mo<\/li>\n<li>Adaptive MFA: $6\/mo<\/li>\n<li>API Access Management: $2\/mo<\/li>\n<\/ul>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d703b07f0cb-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d703b07f0cb\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d703b07f0cb\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d703b07f0cb\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d703b07f0cb\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d703b07f0cb\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d703b07f0cb\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; See our complete list of Top SSO Solutions Bottom Line The Okta Identity Cloud includes single sign-on, adaptive multi-factor authentication, lifecycle management, universal directory and API access management. SSO is also available as a standalone solution. As one of the top products in the field, it finds itself in most vendor evaluation shortlists except [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[6455,3388,4904],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[384],"class_list":["post-7499","post","type-post","status-publish","format-standard","hentry","category-products","tag-access-management","tag-single-sign-on","tag-sso","b2b_audience-evaluation-and-selection","b2b_product-identity-management-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Okta Identity Cloud Single Sign-On | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"We review Okta Identity Cloud, an identification-as-a-service offering used by more than 4,000 organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Okta Identity Cloud Single Sign-On | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"We review Okta Identity Cloud, an identification-as-a-service offering used by more than 4,000 organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-24T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T01:16:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"Okta Identity Cloud: Single Sign-On Overview and Analysis\",\"datePublished\":\"2019-04-24T00:00:00+00:00\",\"dateModified\":\"2022-05-30T01:16:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/\"},\"wordCount\":458,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"access management\",\"single sign-on\",\"SSO\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/\",\"name\":\"Okta Identity Cloud Single Sign-On | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2019-04-24T00:00:00+00:00\",\"dateModified\":\"2022-05-30T01:16:11+00:00\",\"description\":\"We review Okta Identity Cloud, an identification-as-a-service offering used by more than 4,000 organizations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Okta Identity Cloud: Single Sign-On Overview and Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Okta Identity Cloud Single Sign-On | eSecurity Planet","description":"We review Okta Identity Cloud, an identification-as-a-service offering used by more than 4,000 organizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Okta Identity Cloud Single Sign-On | eSecurity Planet","og_description":"We review Okta Identity Cloud, an identification-as-a-service offering used by more than 4,000 organizations.","og_url":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/","og_site_name":"eSecurity Planet","article_published_time":"2019-04-24T00:00:00+00:00","article_modified_time":"2022-05-30T01:16:11+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"Okta Identity Cloud: Single Sign-On Overview and Analysis","datePublished":"2019-04-24T00:00:00+00:00","dateModified":"2022-05-30T01:16:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/"},"wordCount":458,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["access management","single sign-on","SSO"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/","url":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/","name":"Okta Identity Cloud Single Sign-On | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2019-04-24T00:00:00+00:00","dateModified":"2022-05-30T01:16:11+00:00","description":"We review Okta Identity Cloud, an identification-as-a-service offering used by more than 4,000 organizations.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Okta Identity Cloud: Single Sign-On Overview and Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7499"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7499"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7499\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7499"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7499"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7499"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}