{"id":41709,"date":"2023-02-07T14:29:49","date_gmt":"2023-02-07T14:29:49","guid":{"rendered":"https:\/\/www.n-able.com\/?p=41709"},"modified":"2023-03-02T15:12:12","modified_gmt":"2023-03-02T15:12:12","slug":"using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap","title":{"rendered":"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap"},"content":{"rendered":"<p class=\"p2\"><i><\/i><span class=\"s1\">As the cyberthreat landscape is getting more sophisticated, the need for skilled cybersecurity professionals is also rising. The <a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2022-WorkForce-Study\/ISC2-Cybersecurity-Workforce-Study.ashx\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">recent 2022 (ISC)<\/span><span class=\"s3\"><sup>2<\/sup><\/span><span class=\"s2\"> Cybersecurity Workforce Study<\/span><\/a> revealed that, in the past year, the cybersecurity workforce gap (the difference between the number of security professionals required and the number of suitably qualified people in the marketplace) has grown more than twice as much as the number of actual cybersecurity workforce hired, with a 26.2% year-on-year increase. Moreover, 70% of respondents considered that their organizations did not have enough cybersecurity staff, and more than 50% felt that this staff deficit was putting their organization at risk of cyberattacks. \u00a0<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">In this context, more organizations, especially small medium businesses (SMBs), are relying on MSPs and MSSPs to manage their IT security operations. In fact, the global <a href=\"https:\/\/www.msspalert.com\/cybersecurity-news\/managed-security-services-market-to-reach-53-2-billion-by-2031-researcher-estimates\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">managed security services market<\/span><\/a> is predicted to grow to around $53.2bn by 2031\u2014up from its 2021 level of $14.6bn. As a result, service providers are looking to expand their security practices to keep pace with this growing demand. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">However, this growth opportunity for MSPs also comes with challenges. Managing security operations for more customers can add to the daily operational workload of IT technicians and increase the chances of alert fatigue (where technicians miss things because of the sheer number of alerts they\u2019re receiving). Alleviating this burden by hiring additional staff is also made more difficult by the security labor shortage. And even for MSPs that operate their own Security Operations Centers (SOCs), expanding their security practice can be challenging for the same reasons. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">So how can MSPs address these challenges? Partnering with a SOC-as-a-Service or managed SOC provider can be an ideal solution, regardless of whether the MSP already runs a SOC or not. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">What is SOC-as-a-Service?<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">A SOC, security operations center, is a team of IT security experts that monitors an organization\u2019s IT infrastructure to identify and mitigate security incidents. The SOC team is typically comprised of a SOC manager who oversees the SOC operations, security engineers who build and maintain the security architecture, security analysts who investigate and respond to threat incidents, and threat hunters who proactively search for any threats that may have evaded other defenses and contain them. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">A SOC\u2019s key responsibilities include managing and maintaining IT security systems and technologies (e.g., SIEM, SOAR, EDR, XDR etc.), deriving insights from threat data that helps improve the organization\u2019s security stance, coordinating the organization\u2019s <a href=\"https:\/\/www.n-able.com\/solutions\/security\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">security tools<\/span><\/a>, practices, and incident response processes, and ensuring compliance with data privacy regulations.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">SOC-as-a-Service, also known as managed SOC, is a managed security service that allows organizations to outsource threat detection and incident response to an external SOC. Through this subscription-based offering, organizations can access a team of cybersecurity experts who can act as an extension of their IT teams and take on the operational tasks of monitoring the entire infrastructure 24\/7, identifying, investigating, and responding to threat events.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Why SOC-as-a-Service?<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Partnering with a managed SOC services provider helps eliminate the challenge of having to hire additional security professionals. Outsourcing security operations to a managed SOC can give you instant access to the cybersecurity expertise and experience needed to efficiently operate security tools and technologies, as well as knowledgeably deal with a variety of threats; it can also help ensure the 24\/7 availability of experts to mitigate threats as soon as they\u2019re detected.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">This means that using SOC-as-a-Service can help you to rapidly expand your security practice. You don\u2019t need to allocate time and resources to building an internal IT security team, to layer on new tools and technologies, or to achieve compliance with the growing number of data privacy regulations. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Partnering with a managed security operations center is essentially a shortcut to getting everything in place as soon as you close the deal. So, regardless of the size of your MSP\/MSSP or how advanced your security offering is\u2014some MSPs only have an <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">endpoint detection and response (EDR) solution<\/span><\/a> in place\u2014a managed SOC can help you to easily scale your business. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">How partnering with a managed SOC provider can help you<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Partnering with a managed SOC provider can help MSPs\/MSSPs to:<\/span><\/p>\n<ul>\n<li class=\"p5\"><span class=\"s1\">Add advanced security services to their offering and drive new revenue streams<\/span><\/li>\n<li class=\"p5\"><span class=\"s1\">Divert costs of expanding their security practice or building their own SOC<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Transfer the operational burden and rapidly increase customer resolutions <\/span><\/li>\n<\/ul>\n<p class=\"p2\"><span class=\"s1\">Even MSPs\/MSSPs that already own a SOC can use a managed SOC to augment their own. This approach can help:<\/span><\/p>\n<ul>\n<li class=\"p6\"><span class=\"s1\">Accelerate revenue growth from offering more advanced security services<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Manage more customers with varying degrees of project complexity<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Improve their own IT security staff\u2019s satisfaction by allowing them to focus on more strategic projects<\/span><\/li>\n<\/ul>\n<h2 class=\"p2\"><span class=\"s1\">What to consider when choosing a managed SOC<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">When choosing a managed SOC partner, taking into consideration the following aspects may help you develop an effective partnership in the long run: <\/span><\/p>\n<ul>\n<li class=\"p6\"><span class=\"s1\"><strong>24\/7, global coverage.<\/strong> Are they able to provide global coverage? If you plan to expand to other geographies anytime in the future, SOC services that can cover several time zones will help quickly scale your business internationally.<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\"><strong>Deep cybersecurity expertise.<\/strong> What level of expertise and how many years of experience do their security experts have? For example, a SOC team that has managed enterprise-level security operations for several years may have dealt with a greater variety of threat events and seen how threats have evolved over time. All of this is curated knowledge they can leverage to investigate and resolve future threat events at greater speed.<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\"><strong>Access to the right data.<\/strong> What endpoint telemetry do they rely on for investigating threats? Contextualized endpoint telemetry (including benign data) can provide more accurate insights that help SOC analysts to better understand a threat event and its root cause. This, in turn, helps take the correct mitigation actions, faster.<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\"><strong>Fast time to resolution.<\/strong> What\u2019s their average time to resolution in case of a threat incident? The lower the average mean-time-to-resolution (MTTR) they can demonstrate, the better. This metric also depends on the tools the SOC experts are using, so looking into the systems and technologies they rely on can provide additional useful insights.<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\"><strong>Experience with the tools used.<\/strong> Are they using proprietary tools? Using proprietary tools means they have in-house knowledge and expertise, with no involvement from third parties. This typically translates to greater speed and accuracy in both incident response and <a href=\"https:\/\/www.n-able.com\/products\/threat-hunting\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">threat hunting<\/span><\/a> activities.<\/span><\/li>\n<\/ul>\n<p class=\"p2\"><span class=\"s1\">There\u2019s no better time to act on an opportunity than now. As cybersecurity attacks are getting more frequent and sophisticated, the security labor shortage is leaving many organizations no choice but to outsource their security operations. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">This is a great growth opportunity for MSPs. But many are not currently equipped to take on more customers, and acquiring that equipment will require time and money. Partnering with a managed SOC, however, can help you not only grow your customer base, but also scale your business at a much faster pace.<\/span><\/p>\n<p class=\"p2\"><strong><span class=\"s6\"><a href=\"https:\/\/www.n-able.com\/products\/managed-edr\/\" target=\"_blank\" rel=\"noopener\">N&#8209;able Managed EDR<\/a><\/span><span class=\"s1\"> uses SentinelOne\u2019s SOC and Vigilance security experts to provide managed security services designed for MSPs that have standardized on N&#8209;able EDR powered by SentinelOne. Get in touch with our security specialists to discuss how N&#8209;able Managed EDR can help address your specific needs.<\/span><\/strong><\/p>\n<p class=\"p9\"><span class=\"s7\"><i>Emma Nistor is senior product marketing manager, N&#8209;able EDR<\/i><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re looking to expand your security offering, even in a restricted labor market, Emma Nistor explains how using SOC-as-a-Service can help you get there.<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-41709","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap - N-able<\/title>\n<meta name=\"description\" content=\"If you\u2019re looking to expand your MSP\/MSSP security offering, even in a restricted labor market, find out how using SOC-as-a-Service can help.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap - N-able\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re looking to expand your MSP\/MSSP security offering, even in a restricted labor market, find out how using SOC-as-a-Service can help.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-07T14:29:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-02T15:12:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/230131_blogbanner_HowMSPsCanBridge_SybersecurityTalentGap_SOC_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emma Nistor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/230131_blogbanner_HowMSPsCanBridge_SybersecurityTalentGap_SOC_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Nistor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap\"},\"author\":{\"name\":\"Emma Nistor\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\"},\"headline\":\"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap\",\"datePublished\":\"2023-02-07T14:29:49+00:00\",\"dateModified\":\"2023-03-02T15:12:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap\"},\"wordCount\":1210,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap\",\"name\":\"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2023-02-07T14:29:49+00:00\",\"dateModified\":\"2023-03-02T15:12:12+00:00\",\"description\":\"If you\u2019re looking to expand your MSP\/MSSP security offering, even in a restricted labor market, find out how using SOC-as-a-Service can help.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\",\"name\":\"Emma Nistor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"caption\":\"Emma Nistor\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap - N-able","description":"If you\u2019re looking to expand your MSP\/MSSP security offering, even in a restricted labor market, find out how using SOC-as-a-Service can help.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap","og_locale":"de_DE","og_type":"article","og_title":"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap - N-able","og_description":"If you\u2019re looking to expand your MSP\/MSSP security offering, even in a restricted labor market, find out how using SOC-as-a-Service can help.","og_url":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-02-07T14:29:49+00:00","article_modified_time":"2023-03-02T15:12:12+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/230131_blogbanner_HowMSPsCanBridge_SybersecurityTalentGap_SOC_ss.jpg","type":"image\/jpeg"}],"author":"Emma Nistor","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/230131_blogbanner_HowMSPsCanBridge_SybersecurityTalentGap_SOC_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Emma Nistor","Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap"},"author":{"name":"Emma Nistor","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58"},"headline":"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap","datePublished":"2023-02-07T14:29:49+00:00","dateModified":"2023-03-02T15:12:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap"},"wordCount":1210,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap","url":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap","name":"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2023-02-07T14:29:49+00:00","dateModified":"2023-03-02T15:12:12+00:00","description":"If you\u2019re looking to expand your MSP\/MSSP security offering, even in a restricted labor market, find out how using SOC-as-a-Service can help.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58","name":"Emma Nistor","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","caption":"Emma Nistor"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/41709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=41709"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/41709\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=41709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}