{"id":7546,"date":"2018-05-03T00:00:00","date_gmt":"2018-05-03T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/05\/03\/logicmanager-grc-vendor-overview-and-insight\/"},"modified":"2021-01-28T16:22:06","modified_gmt":"2021-01-28T16:22:06","slug":"logicmanager","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/","title":{"rendered":"LogicManager: GRC Vendor Overview and Insight"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<p><strong><em>See our complete list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/grc-tools\/\">top GRC vendors<\/a><\/em><\/strong><\/p>\n<h2><em><\/em>Company Description<\/h2>\n<p>LogicManager began in 2005. Its SaaS software and advisory service helps businesses integrate GRC activities, so they can protect their employees, customers, and shareholders. With offices in the U.S. and Europe, LogicManager is privately held.<\/p>\n<h2>Product Description<\/h2>\n<p>LogicManager uses the term Enterprise Risk Management, in line with Gartner&#8217;s IRM concept. It features integrated GRC tools that enable organizations to make decisions based on comparable data and established goals. Applications include enterprise risk management, IT governance and security, compliance management, third-party risk management, audit management, incident management, policy management, business continuity, and financial reporting compliance. The core functionalities of the software that extend across solution areas are identifying, assessing, mitigating, monitoring and reporting on risk.<\/p>\n<p>LogicManager has a central governance structure that shares information where necessary and makes relationships explicit. This approach to GRC enables users to reach out to stakeholders across departments and levels and uncover common root causes and dependencies. A built-in business intelligence reporting engine is included, as well as automated workflow capabilities.<\/p>\n<p>&#8220;Traditionally, approaches to GRC entail responding to published, well-established and legally binding regulations,&#8221; said LogicManager CEO Steven Minsky. &#8220;However, the social and technological climate is changing at a rate that regulators can&#8217;t keep up with. Approaches to governance, risk management, and compliance must now consider the company&#8217;s consumer and investor base view of reputation and ethical conduct.&#8221;<\/p>\n<h2>New Features<\/h2>\n<p>Integrations and Time Savers: LogicManager released an initial set of native APIs that allow customers to integrate with other systems internally to streamline data and reduce manual processes. Common API examples include collecting and categorizing vulnerability data from scanning tools such as Nessus, Qualys and Rapid7, or connecting with Oracle Accounts Payable systems to make sure the vendor management solution captures how much each vendor has been paid over the course of a year.<\/p>\n<p>Workflow Updates: The LogicManager workflow engine now incorporates a more robust set of tasks. The workflow that drives the approval of a new vendor, incident, or other organizational resource can now be configured with information gathering profile tasks and risk assessment tasks.<\/p>\n<p>Automation Rules Engine: In early 2018, LogicManager released its Automation Rules Engine, an initial step into the world of artificial intelligence. Automation rules allow users to define rules within the system that prompt various types of actions once triggered.<\/p>\n<p>Use Cases: A GDPR compliance suite includes a GDPR audit readiness checklist, a data library assessment, and a security incident form.<\/p>\n<h2>Markets and Use Cases<\/h2>\n<p>LogicManager serves many industries and use cases.<\/p>\n<h2>Analyst View<\/h2>\n<p>Forrester classifies LogicManager as a Leader in this market, its top rating signaling a strong product and strategy. It was also named 2017 GRC Company of the Year by Quadrant Knowledge Solutions, one of Insight Success&#8217; 50 Most Valuable Technology Companies, and was awarded GRC 20\/20&#8217;s GRC Value Award in Risk Management.<\/p>\n<h2>Metrics<\/h2>\n<p>On average, risk managers spend 62% of their time on tactical activities. In a 40-hour work week, that&#8217;s more than 24 hours spent aggregating and mining data, building reports, and tending to spreadsheets and SharePoint files. Users of LogicManager are said to spend about 6 hours per week.<\/p>\n<h2>Delivery<\/h2>\n<p>LogicManager is a multi-tenant SaaS solution, which enables deployment within five business days.<\/p>\n<h2>Pricing<\/h2>\n<p>LogicManager is offered as an annual subscription with two costs: the annual licensing subscription and a one-time getting started fee. The annual licensing subscription is based primarily on usage, for which there are <a href=\"https:\/\/www.logicmanager.com\/erm-software\/editions-pricing\/\" target=\"_blank\" rel=\"noopener noreferrer\">several packages available<\/a>. The start fee covers all implementation, training, on-boarding, maintenance, and unlimited training for the lifetime of a subscription.<\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6f5e99d91e-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f5e99d91e\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f5e99d91e\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f5e99d91e\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f5e99d91e\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f5e99d91e\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f5e99d91e\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>See our complete list of top GRC vendors Company Description LogicManager began in 2005. Its SaaS software and advisory service helps businesses integrate GRC activities, so they can protect their employees, customers, and shareholders. With offices in the U.S. and Europe, LogicManager is privately held. Product Description LogicManager uses the term Enterprise Risk Management, in [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[30744,27742],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[380,392],"class_list":["post-7546","post","type-post","status-publish","format-standard","hentry","category-products","tag-governance-risk-and-compliance","tag-grc","b2b_audience-evaluation-and-selection","b2b_product-policy-compliance","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LogicManager: GRC Vendor Overview and Insight<\/title>\n<meta name=\"description\" content=\"We review LogicManager&#039;s GRC solution, which speeds the process of aggregating &amp; mining data, building reports, and managing spreadsheets and SharePoint files.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LogicManager: GRC Vendor Overview and Insight\" \/>\n<meta property=\"og:description\" content=\"We review LogicManager&#039;s GRC solution, which speeds the process of aggregating &amp; mining data, building reports, and managing spreadsheets and SharePoint files.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-03T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:22:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"LogicManager: GRC Vendor Overview and Insight\",\"datePublished\":\"2018-05-03T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:22:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/\"},\"wordCount\":597,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"Governance Risk and Compliance\",\"GRC\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/\",\"name\":\"LogicManager: GRC Vendor Overview and Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2018-05-03T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:22:06+00:00\",\"description\":\"We review LogicManager's GRC solution, which speeds the process of aggregating & mining data, building reports, and managing spreadsheets and SharePoint files.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LogicManager: GRC Vendor Overview and Insight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LogicManager: GRC Vendor Overview and Insight","description":"We review LogicManager's GRC solution, which speeds the process of aggregating & mining data, building reports, and managing spreadsheets and SharePoint files.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/","og_locale":"en_US","og_type":"article","og_title":"LogicManager: GRC Vendor Overview and Insight","og_description":"We review LogicManager's GRC solution, which speeds the process of aggregating & mining data, building reports, and managing spreadsheets and SharePoint files.","og_url":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/","og_site_name":"eSecurity Planet","article_published_time":"2018-05-03T00:00:00+00:00","article_modified_time":"2021-01-28T16:22:06+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"LogicManager: GRC Vendor Overview and Insight","datePublished":"2018-05-03T00:00:00+00:00","dateModified":"2021-01-28T16:22:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/"},"wordCount":597,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["Governance Risk and Compliance","GRC"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/logicmanager\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/","url":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/","name":"LogicManager: GRC Vendor Overview and Insight","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2018-05-03T00:00:00+00:00","dateModified":"2021-01-28T16:22:06+00:00","description":"We review LogicManager's GRC solution, which speeds the process of aggregating & mining data, building reports, and managing spreadsheets and SharePoint files.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/logicmanager\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"LogicManager: GRC Vendor Overview and Insight"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7546"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7546"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7546\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7546"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7546"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7546"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}