{"id":37518,"date":"2022-09-14T10:52:54","date_gmt":"2022-09-14T09:52:54","guid":{"rendered":"https:\/\/www.n-able.com\/?p=37518"},"modified":"2022-09-14T10:52:54","modified_gmt":"2022-09-14T09:52:54","slug":"using-automation-deliver-reliable-managed-security-services","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services","title":{"rendered":"Using automation to deliver reliable managed security services"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">As a Cloud Service Provider (CSP), Managed Service Provider (MSP), or Managed Security Service Provider (MSSP) you are instrumental in delivering effective and reliable managed security services<\/span><span class=\"s1\">\u00a0to your clients.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">With cybercriminals taking advantage of less secure environments and becoming more advanced with their security breaches, this is becoming increasingly complex. This is making<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">security a hot topic in the media, but the benefit here is that it\u2019s helping potential customers understand the importance of protecting their data. As a result, we are seeing security services turn from a \u2018nice to have\u2019, to an essential service for our partners.<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\"><b>Getting on top of your security game<\/b><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">If you\u2019re not already on top of your security offering, there is a big opportunity to level up your service. There are five steps you should consider to start this process:<\/span><\/p>\n<ol>\n<li class=\"p2\"><span class=\"s1\">Define a comprehensive security offering<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\">Provide ongoing work to maintain compliance<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\">Gain more customers and increase revenue<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\">Become the \u2018go-to\u2019 CSP\/MSP\/MSSP for security<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\">Support your long-term success<\/span><\/li>\n<\/ol>\n<h2 class=\"p1\"><span class=\"s1\"><b>Security without automation is challenging<\/b><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Keeping organizations \u2018threat free\u2019 is impossible to do without the right <a href=\"https:\/\/www.n-able.com\/solutions\/security?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">security solutions<\/span><\/a>.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Today, security management is still largely manual: teams invest hours configuring security policies and applying sufficient protection to users and groups. In our fast-moving world, this isn\u2019t sustainable and will lead to service providers failing to stop cyberattacks.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Why? Because cyberattacks are too sophisticated, meaning that criminals can easily identify the weak links in an organization\u2019s network and gain access. On top of this, new threats are emerging constantly, and attack timings are unpredictable so they can hit any network at any time. This makes it almost impossible for service providers to keep up without the help of the right tools and software.<\/span><\/p>\n<p class=\"p3\"><span class=\"s5\"><a href=\"https:\/\/www.n-able.com\/products\/cloud-user-hub?promo=blog\" target=\"_blank\" rel=\"noopener\"><b>Cloud User Hub<\/b><\/a><\/span><span class=\"s1\"><b> helps CSPs improve their security processes. Allowing them to manage all their customers and users from one platform, and service multiple tenants with one user account. Teams no longer need to use complex PowerShell scripts, but can easily build Command Blocks and Sets into security processes and use triggers to help manage clients\u2019 security needs. CSPs can have confidence that their customers are better protected and more secure when they use Cloud User Hub.<\/b><\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">The benefits of automated security<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">For efficient results, CSPS, MSPs, and MSSPs should depend less on their security teams and analysts, and instead lean on security software <\/span><span class=\"s1\">solutions to accomplish the following:<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<h3 class=\"p1\"><span class=\"s1\">1. Fully automate the tenant security setup<\/span><\/h3>\n<p class=\"p1\"><span class=\"s1\">You need to keep tight control of your customers\u2019 workspace environments. Sophisticated solutions allow you to assign any security policy to tenant setups using <span class=\"s5\">pre-defined commands and triggers.<\/span><\/span><span class=\"s1\">\u00a0These rules and workflows can be deployed widely across multiple or specific users and groups.<\/span><\/p>\n<h3 class=\"p1\"><span class=\"s1\">2. Control user access and roles<br \/>\n<\/span><\/h3>\n<p class=\"p1\"><span class=\"s1\">There could be hundreds of users connected to an organization\u2019s OneDrive. The likelihood is that sensitive information should only be accessed by certain groups or users. Automation lets you easily set up and manage specific Role Based Access Control (RBAC) to help with this.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Service Providers can build RBAC Commands into workflows and deploy as widely or selectively as needs be. This effective method is more reliable than PowerShell scripts, which can contain errors and need frequent updates. These\u00a0<span class=\"s5\">workflows can be triggered<\/span><\/span><span class=\"s3\">\u00a0<\/span><span class=\"s1\">\u00a0each time a user is added to a particular security group, without the need for manual configuration.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This process is an efficient and more accurate way to manage and deploy permissions, protections, and passwords.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<h3 class=\"p1\"><span class=\"s1\">3. Respond to breaches faster<br \/>\n<\/span><\/h3>\n<p class=\"p1\"><span class=\"s1\">The need for human intervention can be heavily reduced when you automate your security operations. You can prioritize threats and handle certain attacks automatically with instructions created by Command Blocks and Sets. This can reduce response times and address security issues without the need for manual effort. Most importantly, automation will allow you to respond to breaches much more quickly.<\/span><\/p>\n<h3 class=\"p1\"><span class=\"s1\">4. Be the \u2018eyes and ears\u2019 of your team<br \/>\n<\/span><\/h3>\n<p class=\"p1\"><span class=\"s1\">The amount of security notifications that come through to response teams is vast. When controlled manually, this can cause more harm than good. Imagine constantly looking at a screen to prioritize each alert\u2014you\u2019d never have a day off!<\/span><\/p>\n<p class=\"p4\"><span class=\"s7\"><a href=\"https:\/\/www.n-able.com\/products\/cloud-user-hub?promo=blog\" target=\"_blank\" rel=\"noopener\">Cloud User Hub<\/a><\/span><span class=\"s8\"> allows you to easily automate the management of all of your Microsoft tenants, users, and licenses from a single hub. Helping you to <\/span><span class=\"s9\">lower response times, and increase the quality and speed of investigation.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In short, security automation maximizes the efficiencies of your security team and helps take the pressure of their workloads by letting technicians focus on the work that requires judgement, planning, and other skills. <\/span><span class=\"s3\">\u00a0<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<h3 class=\"p1\"><span class=\"s1\">5. Improved costs<br \/>\n<\/span><\/h3>\n<p class=\"p1\"><span class=\"s1\">It\u2019s been well documented over the past couple of years that service providers are finding it hard to hire technicians. The IT talent shortage doesn\u2019t just make it hard to employ the right people, it also means you\u2019re paying top dollar for talent. Security automation covers the low-skill and repetitive tasks, meaning leaders can reallocate people to complete more challenging projects.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<h3 class=\"p1\"><span class=\"s1\">6. Improved efficiencies<br \/>\n<\/span><\/h3>\n<p class=\"p1\"><span class=\"s1\">The sheer amount of security threats each day means help desk teams can easily become inundated with ticket requests. Teams can use their solutions alongside automated commands to handle the most basic troubleshooting tickets, without needing to lift a finger.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Tickets that contain real security issues can then be flagged and put it in front of the eyes of a skilled worker to investigate further. Automated solutions can send pre-arranged messaging to companies that explain their security has been compromised, and containing clear instructions on next steps.<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\"><b>Ready to automate your security processes?<\/b><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">To stay secure, service providers need to automate their security processes. Automation solutions enable stronger, more reliable security controls than manual management. Even the most cyber resilient companies should assess their automation tools to see if it covers their every need.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p><span class=\"s5\"><a href=\"https:\/\/www.n-able.com\/products\/cloud-user-hub?promo=blog\" target=\"_blank\" rel=\"noopener\"><b>Cloud User Hub<\/b><\/a><\/span><span class=\"s1\"><b> brings in a new era of control for Microsoft CSPs. <\/b><a href=\"https:\/\/www.n-able.com\/products\/cloud-user-hub\/trial?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\"><b>Click here to try it for free<\/b><\/span><\/a><\/span><\/p>\n<p><span class=\"s1\"><b><i>Laura Moise is Sr. Product Marketing Manager at N&#8209;able<\/i><\/b><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To ensure their customer stay secure, CSPs need to automate their security processes. Laura Moise looks at how N-able Cloud User Hub gets you started.<\/p>\n","protected":false},"author":98,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-37518","post","type-post","status-publish","format-standard","hentry","topic-cloud-computing","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using automation to deliver reliable managed security services - N-able<\/title>\n<meta name=\"description\" content=\"To ensure customers stay secure, CSPs need to automate security processes. This blog looks at how N-able Cloud User Hub gets you started.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using automation to deliver reliable managed security services - N-able\" \/>\n<meta property=\"og:description\" content=\"To ensure customers stay secure, CSPs need to automate security processes. This blog looks at how N-able Cloud User Hub gets you started.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-14T09:52:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/09\/220912_blogbanner_BenefitsSecurityManagement_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laura Moise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/09\/220912_blogbanner_BenefitsSecurityManagement_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Moise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services\"},\"author\":{\"name\":\"Laura Moise\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/cbd800fd35490a85f7fff8af75189990\"},\"headline\":\"Using automation to deliver reliable managed security services\",\"datePublished\":\"2022-09-14T10:52:54+01:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services\"},\"wordCount\":993,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Cloud Computing\",\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services\",\"name\":\"Using automation to deliver reliable managed security services - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2022-09-14T10:52:54+01:00\",\"description\":\"To ensure customers stay secure, CSPs need to automate security processes. This blog looks at how N-able Cloud User Hub gets you started.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Cloud Computing\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/cloud-computing\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using automation to deliver reliable managed security services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/cbd800fd35490a85f7fff8af75189990\",\"name\":\"Laura Moise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6f8068e35c34c4abd564a3677fa58470fa921828e1c36ad34c388ced1f4cbf57?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f8068e35c34c4abd564a3677fa58470fa921828e1c36ad34c388ced1f4cbf57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f8068e35c34c4abd564a3677fa58470fa921828e1c36ad34c388ced1f4cbf57?s=96&d=mm&r=g\",\"caption\":\"Laura Moise\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using automation to deliver reliable managed security services - N-able","description":"To ensure customers stay secure, CSPs need to automate security processes. This blog looks at how N-able Cloud User Hub gets you started.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services","og_locale":"es_ES","og_type":"article","og_title":"Using automation to deliver reliable managed security services - N-able","og_description":"To ensure customers stay secure, CSPs need to automate security processes. This blog looks at how N-able Cloud User Hub gets you started.","og_url":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-09-14T09:52:54+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/09\/220912_blogbanner_BenefitsSecurityManagement_ss.jpg","type":"image\/jpeg"}],"author":"Laura Moise","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/09\/220912_blogbanner_BenefitsSecurityManagement_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Laura Moise","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services"},"author":{"name":"Laura Moise","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/cbd800fd35490a85f7fff8af75189990"},"headline":"Using automation to deliver reliable managed security services","datePublished":"2022-09-14T10:52:54+01:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services"},"wordCount":993,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Cloud Computing","Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services","url":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services","name":"Using automation to deliver reliable managed security services - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2022-09-14T10:52:54+01:00","description":"To ensure customers stay secure, CSPs need to automate security processes. This blog looks at how N-able Cloud User Hub gets you started.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/using-automation-deliver-reliable-managed-security-services#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Cloud Computing","item":"https:\/\/www.n-able.com\/es\/blog\/category\/cloud-computing"},{"@type":"ListItem","position":2,"name":"Using automation to deliver reliable managed security services"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/cbd800fd35490a85f7fff8af75189990","name":"Laura Moise","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/6f8068e35c34c4abd564a3677fa58470fa921828e1c36ad34c388ced1f4cbf57?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6f8068e35c34c4abd564a3677fa58470fa921828e1c36ad34c388ced1f4cbf57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f8068e35c34c4abd564a3677fa58470fa921828e1c36ad34c388ced1f4cbf57?s=96&d=mm&r=g","caption":"Laura Moise"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/37518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/98"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=37518"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/37518\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=37518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}