{"id":41515,"date":"2021-03-02T12:18:25","date_gmt":"2021-03-02T12:18:25","guid":{"rendered":"https:\/\/www.n-able.com\/?p=41515"},"modified":"2023-03-22T08:58:56","modified_gmt":"2023-03-22T08:58:56","slug":"which-password-authentication-method-works-best-for-business","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business","title":{"rendered":"Which password authentication method works best for business?"},"content":{"rendered":"<p class=\"p6\"><span class=\"s1\">Every day, it seems another company falls victim to a data breach. Hackers are using increasingly sophisticated techniques, which is why it has become so crucial that businesses have\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/logical-security-controls\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">robust security measures<\/span><\/a> in place. The key aim of a secure system is to certify that only authorized users can gain access\u2014in other words, your security measures should allow legitimate users in and keep cybercriminals out.\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">Password authentication methods can assist with access management by providing MSPs with extra layers of protection. In order to choose the right password authentication methods for your MSP and your customers, it\u2019s important to understand the differences between them. This article will explain how each of the main methods work and compare the advantages of various password authentication methods to help you make an informed decision.\u00a0<\/span><\/p>\n<h2 class=\"p7\"><span class=\"s1\">Common password authentication methods<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">A diverse range of authentication methods have been developed in recent years, including two-factor authentication, biometrics, CAPTCHAs, and many more. Here is a list of the most common password authentication methods, with a brief explanation of how each one can work for your customers.\u00a0<\/span><\/p>\n<h3 class=\"p8\"><span class=\"s1\"><b>1. STANDARD PASSWORD AUTHENTICATION<\/b><\/span><\/h3>\n<p class=\"p6\"><span class=\"s1\">This is the most basic form of authentication that everyone will be familiar with. Standard password authentication involves a user entering their username, accompanied by a secret code or passphrase that allows them to gain access to a network, account, or application. In theory, if a password is kept private and secure, unauthorized access will be prevented. In practice, however, even securely stored passwords are vulnerable to hacking. Cybercriminals use programs that try thousands of potential passwords, allowing them to gain access when the correct password is attempted.\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">To reduce the risk of a password being compromised, users should choose passwords with a combination of both letters (uppercase and lowercase), numbers, and symbols. A strong password should not use words found in the dictionary and should be at least eight characters in length. Users should have a unique password for each of their accounts\u2014but this can often make remembering all their passwords a challenge. A secure password manager or\u00a0<a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">password management\u00a0<\/span><\/a>software can help with this, storing your passwords under a single master password for optimal security.\u00a0 \u00a0<\/span><\/p>\n<h3 class=\"p8\"><span class=\"s1\"><b>2. TWO-FACTOR AUTHENTICATION (2FA)<\/b><\/span><\/h3>\n<p class=\"p6\"><span class=\"s1\">Two-factor authentication, or a form of multi-factor authentication, builds on top of passwords to create a more robust security solution. Two-factor authentication requires you to authenticate yourself via something you know and something you have. A password serves as \u201csomething you know,\u201d and the possession of a specific physical object such as a smartphone serves as \u201csomething you have.\u201d ATMs were an early system to use two-factor authentication because they require both the insertion of a debit card and a PIN.<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">In computer security, two-factor authentication usually requires the user to enter their username, a password, and a one-time code that has been sent to a physical device. The device might be sent to your cell phone via text message or might be generated using a mobile application. Two-factor authentication is a great option for MSPs and other businesses because it adds an additional layer of security that is very difficult for hackers to crack. Even if a hacker were able to guess your password, it would be unlikely that they could also simultaneously gain access to the one-time code sent to your device.\u00a0<\/span><\/p>\n<h3 class=\"p8\"><span class=\"s1\"><b>3. TOKEN AUTHENTICATION<\/b><\/span><\/h3>\n<p class=\"p6\"><span class=\"s1\">If you prefer not to rely on mobile phones, you might instead use a token authentication system. Token systems use a purpose-built physical device to deliver two-factor authentication. This could be a dongle that is inserted into your device\u2019s USB port, or perhaps a smart card with radio frequency identification or near-field communication chip.\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">To keep a token system secure, it is crucial that you ensure that your physical authentication device (i.e., dongle or smart card) does not fall into the wrong hands. Token-based systems are generally more expensive than other password authentication methods because they require you to purchase purpose-built hardware for each of your users. They are, however, very secure, and more cost-effective options are entering the market as time goes on.\u00a0<\/span><\/p>\n<h3 class=\"p8\"><span class=\"s1\"><b>4. BIOMETRIC AUTHENTICATION<\/b><\/span><\/h3>\n<p class=\"p6\"><span class=\"s1\">Biometric authentication has become increasingly popular\u2014and you\u2019re likely already familiar with it, as it\u2019s commonly featured on smartphone devices as well as some laptops. Biometrics rely on a user\u2019s physical characteristics to identify them. For example, biometric authentication might make use of fingerprints, retinal or iris scans, or facial and voice recognition. This is a highly secure form of authentication because no two individuals will have the same physical characteristics. Biometric authentication is an effective way of knowing precisely who is logging into the system.\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">Another advantage of biometric authentication is that it doesn\u2019t require users to have a card, dongle, or cell phone to hand. They don\u2019t even necessarily need to remember their password. However, it is worth noting that biometric systems are more secure when paired with a password.\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">Unfortunately, there are some downsides to biometrics systems. Firstly, they are very expensive to install and require specialized equipment like retinal scanners or fingerprint readers. There are also concerns regarding the privacy of biometric systems. Some users balk at the prospect of sharing their biometric information with a company. As such, biometric authentication systems are most common in environments that require the highest level of security, like the intelligence and defense sectors.\u00a0<\/span><\/p>\n<h3 class=\"p8\"><span class=\"s1\"><b>5. COMPUTER RECOGNITION AUTHENTICATION\u00a0<\/b><\/span><\/h3>\n<p class=\"p6\"><span class=\"s1\">Computer recognition is a password authentication method that verifies a user\u2019s legitimacy by checking that they are on a particular device. These systems install a small software plug-in on the user\u2019s device the first time they successfully login. This plug-in contains a cryptographic device marker. When the user next logs in, the marker is checked to make sure they are on the same, trusted device.\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">This system is invisible to the user and doesn\u2019t require any additional authentication actions from them. They simply enter their username and password as usual, and verification happens automatically. The disadvantage of this authentication method is that it can be cumbersome when users switch devices. To maintain a high level of security, computer recognition authentication systems must enable logins from new devices using other forms of verification (i.e., two-factor authentication with a code delivered via SMS).<\/span><\/p>\n<h3 class=\"p8\"><span class=\"s1\"><b>6. CAPTCHAS<\/b><\/span><\/h3>\n<p class=\"p6\"><span class=\"s1\">CAPTCHAs do not focus on verifying a particular user, as the other methods listed in this article do. Instead, CAPTCHAs aim to determine whether a user is human, to prevent computer-driven attempts to break into accounts such as brute force attacks. The CAPTCHA system displays a distorted image of letters and numbers, or pictures, and asks the user to type in what they see. Because computers and bots struggle to identify these distortions correctly, CAPTCHAs enhance security by creating an additional barrier to automated hacking systems.\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">These systems can, however, still cause problems\u2014individuals with disabilities, such as blindness, may not be able to pass a CAPTCHA test. Even non-disabled individuals sometimes have trouble with CAPTCHA, which can cause frustration and delays. A study by the <a href=\"https:\/\/baymard.com\/blog\/captchas-in-checkout\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">Baynard Institute<\/span><\/a> found that only 66% of people in their survey entered the CAPTCHA correctly first time. \u00a0<\/span><\/p>\n<h2 class=\"p7\"><span class=\"s1\"><b>A password manager with built-in authentication methods<\/b><\/span><\/h2>\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\">N&#8209;able<span class=\"s6\"><sup>\u00ae<\/sup><\/span><span class=\"s7\">\u00a0Passportal<\/span><span class=\"s6\"><sup>\u2122<\/sup><\/span><\/a><\/span><span class=\"s1\">\u00a0is a Password Manager and Privileged Access Management solution built specifically for MSPs. This password management software helps you make the most of the advantages of password authentication, helping you achieve the following:\u00a0<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li6\"><span class=\"s1\">Manage risk around credentials<\/span><\/li>\n<li class=\"li6\"><span class=\"s1\">Shorten incident resolution times<\/span><\/li>\n<li class=\"li6\"><span class=\"s1\">Demonstrate compliance for the creation, usage, and storage of credentials<\/span><\/li>\n<li class=\"li6\"><span class=\"s1\">Share privileged\u00a0<\/span><span class=\"s4\">customer knowledge<\/span><span class=\"s1\">\u00a0across your technicians<\/span><\/li>\n<li class=\"li6\"><span class=\"s1\">Maintain consistent service delivery for your customers<\/span><\/li>\n<\/ul>\n<p class=\"p6\"><span class=\"s1\">Passportal is built with security in mind, and stores credentials and knowledge in an encrypted vault, protected by multi-factor authentication and Touch ID (biometric) authentication. The vault also utilizes role-based permissions to ensure that users have the correct permissions to access specific passwords.\u00a0<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">As this article has demonstrated, there are multiple factors to consider when selecting the right password authentication system for your customers. We recommend two-factor authentication for MSPs, because it achieves high security and cost-efficiency, without requiring too much effort from your customers.\u00a0<\/span><\/p>\n<p class=\"p6\"><strong><span class=\"s1\">The best way to take advantage of password authentication methods is to employ a password management tool with authentication methods built in for ease. Passportal delivers enterprise-grade password management software with support for two-factor authentication, self-service password resets, and Touch ID authentication. To learn more,\u00a0<a href=\"https:\/\/www.n-able.com\/products\/passportal\/demo\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">schedule a demo of Passportal today<\/span><\/a><\/span><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Password authentication methods can assist with access management by providing MSPs with extra layers of protection. This blog explains the main methods.\u00a0<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-41515","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Which password authentication method works best for business? - N-able<\/title>\n<meta name=\"description\" content=\"Password authentication can help MSPs with access management by providing extra layers of protection. This blog explains the main methods.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which password authentication method works best for business? - N-able\" \/>\n<meta property=\"og:description\" content=\"Password authentication can help MSPs with access management by providing extra layers of protection. This blog explains the main methods.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T12:18:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T08:58:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/Blog-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/Blog-1.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Which password authentication method works best for business?\",\"datePublished\":\"2021-03-02T12:18:25+00:00\",\"dateModified\":\"2023-03-22T08:58:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business\"},\"wordCount\":1397,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business\",\"name\":\"Which password authentication method works best for business? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2021-03-02T12:18:25+00:00\",\"dateModified\":\"2023-03-22T08:58:56+00:00\",\"description\":\"Password authentication can help MSPs with access management by providing extra layers of protection. This blog explains the main methods.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Which password authentication method works best for business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Which password authentication method works best for business? - N-able","description":"Password authentication can help MSPs with access management by providing extra layers of protection. This blog explains the main methods.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business","og_locale":"de_DE","og_type":"article","og_title":"Which password authentication method works best for business? - N-able","og_description":"Password authentication can help MSPs with access management by providing extra layers of protection. This blog explains the main methods.\u00a0","og_url":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-03-02T12:18:25+00:00","article_modified_time":"2023-03-22T08:58:56+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/Blog-1.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/Blog-1.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Which password authentication method works best for business?","datePublished":"2021-03-02T12:18:25+00:00","dateModified":"2023-03-22T08:58:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business"},"wordCount":1397,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business","url":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business","name":"Which password authentication method works best for business? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2021-03-02T12:18:25+00:00","dateModified":"2023-03-22T08:58:56+00:00","description":"Password authentication can help MSPs with access management by providing extra layers of protection. This blog explains the main methods.\u00a0","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/which-password-authentication-method-works-best-for-business#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Which password authentication method works best for business?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/41515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=41515"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/41515\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=41515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}