{"id":9274,"date":"2019-04-22T21:34:52","date_gmt":"2019-04-22T20:34:52","guid":{"rendered":"https:\/\/www.n-able.com\/?p=9274"},"modified":"2021-04-30T10:43:39","modified_gmt":"2021-04-30T09:43:39","slug":"how-to-improve-network-security","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security","title":{"rendered":"How to improve network security"},"content":{"rendered":"<p class=\"p3\">Companies that face concerns about the electronic information they compile, analyze, and share to drive their business\u00a0need <b>comprehensive solutions for improving network security<\/b>.\u00a0With concerns about network security running at an all-time high, along with the limited number of IT personnel capable of addressing them, an increasing number of companies are realizing how outsourcing to managed services providers (MSPs) can strengthen their security posture, reduce hassles, and save money.<\/p>\n<p class=\"p3\">MSPs looking to cash in on these opportunities face their own challenges of how to provide premium offerings to the broadest markets and verticals without having to balance or customize offerings for each client\u2019s unique service and compliance requirements. They also need a way to differentiate themselves from peers and competitors who are also trying to gain customers.<\/p>\n<p class=\"p3\"><b>The key to improving network security is being prepared<\/b>. However, many companies lack the financial resources and in-house expertise necessary to purchase, install, and run all of the hardware and software required to achieve the desired level of network security. Joining forces with an MSP provides an affordable way for companies of all sizes and budgets to obtain cost-effective enterprise-grade security, along with the expertise to manage it all.<\/p>\n<h2 class=\"p5\">The ideal network performance management<\/h2>\n<p class=\"p3\">Successful MSPs operate as an extension of their clients\u2019 organization. To make this happen and become recognized as credible collaborators in their clients\u2019 business operations, MSPs require the right tools for improving their clients\u2019 network security.<\/p>\n<p class=\"p3\">The following checklist summarizes several key considerations that clients require from MSPs to raise their company\u2019s network security posture.<\/p>\n<ul class=\"ul1\">\n<li class=\"li6\"><span class=\"s2\"><a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/network-monitoring-software\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">24\/7\/365 network monitoring<\/span><\/a><\/span><\/li>\n<li class=\"li6\"><span class=\"s2\"><a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/centrally-managed-antivirus\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Up-to-date virus protection<\/span><\/a><\/span><\/li>\n<li class=\"li6\"><span class=\"s2\"><a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Regular patching of operating systems<\/span><\/a><\/span><span class=\"s4\"> and applications<\/span><\/li>\n<li class=\"li3\">Application monitoring and compliance<\/li>\n<li class=\"li3\">Securing wired and wireless networks<\/li>\n<li class=\"li6\"><span class=\"s2\"><a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/computer-security-vulnerabilities\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Scanning for vulnerabilities<\/span><\/a><\/span><\/li>\n<li class=\"li3\">Monitoring and controlling web activity<\/li>\n<li class=\"li3\">Securing downloads and web browsing<\/li>\n<li class=\"li3\">Managing bandwidth usage<\/li>\n<li class=\"li3\">Auditing networks, hardware, and software<\/li>\n<li class=\"li3\">Automated problem notifications<\/li>\n<li class=\"li3\">Compliance reports<\/li>\n<li class=\"li3\">Certified network staff<\/li>\n<li class=\"li3\">Working with auditors and certified third parties to help ensure client compliance with regulations such as the Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS), and Sarbanes-Oxley (SOX)<\/li>\n<\/ul>\n<p class=\"p3\">On top of these requirements, clients want an MSP point of contact with whom they can coordinate security efforts, correct any issues, and plan for future growth. Successful MSPs engage with clients to keep their network secure, streamlined and optimized every minute of every day.<\/p>\n<h2 class=\"p5\">Improving network security for clients<\/h2>\n<p class=\"p3\">The only certainty about IT management\u00a0is that it is in a constant state of flux. This can make it hard for businesses to keep up with emerging threats, trends, and technologies. As your clients\u2019 trusted advisor, they depend on you to ensure their networks remain secure and available.<\/p>\n<p class=\"p3\">SolarWinds MSP has an IT services pedigree, with a <b>proven track record of delivering solid solutions for strengthening and improving network security<\/b> for MSPs and their clients worldwide.\u00a0As experts in the field of security solutions, our collection of cloud-based network security tools are designed to offer unprecedented business value to support and protect client networks, while offering you opportunities to accelerate your own business.<\/p>\n<p class=\"p3\">The following solutions from SolarWinds MSP put IT research into practice with state-of-the-art tools specifically suited for today\u2019s network security challenges:<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\"><span class=\"s5\"><a href=\"\/products\/rmm\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\"><b>N&#8209;able Remote Monitoring and Management<\/b><\/span><\/a><\/span><br \/>\nThis platform consolidates every IT tool MSPs need into a multi-layered solution complete with the first-of-its-kind notification system using collective intelligence.<\/li>\n<li class=\"li3\"><span class=\"s5\"><a href=\"\/products\/backup\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\"><b>N&#8209;able Backup<\/b><\/span><\/a><\/span><br \/>\nFeatures like continuous and bare metal recovery, virtual and physical server restores, and VMware and Hyper-V backups can provide valuable insurance against hardware failures, acts of nature, and newly emerging malware. Features like file retention and data archiving allow you to retain and record files for long-term storage.<\/li>\n<li class=\"li3\"><a href=\"\/products\/mail-assure\"><span class=\"s7\"><b><span class=\"s5\"><span class=\"s6\">N&#8209;able<\/span><\/span> Mail Assure<\/b><\/span><\/a><br \/>\nSolarWinds<sup>\u00ae<\/sup> Mail Assure helps protect companies against email-borne malware and other threats to ensure clients retain the ability to send and receive emails at any time, even when the email server or service is offline.<\/li>\n<\/ul>\n<ul class=\"ul1\">\n<li class=\"li3\"><span class=\"s5\"><span class=\"s6\"><b>N&#8209;able Risk Intelligence<\/b><\/span><\/span><br \/>\nThis big-data-centric tool combines patented scanning technology with advanced analytics to predict and avert data breaches.<\/li>\n<\/ul>\n<p class=\"p3\">Each of these SolarWinds MSP network management solutions provide unparalleled visibility and control of client infrastructures\u2014from physical and virtual servers, computers, workstations, storage appliances, applications, mobile devices\u00a0and more\u2014all from a single, web-based dashboard that makes it easy for MSPs to deploy and manage network and data security.<\/p>\n<h2 class=\"p5\">Five ways SolarWinds MSP solutions enhance network security<\/h2>\n<h3>1. Complement current security policies<\/h3>\n<p>SolarWinds MSP solutions empower MSPs to offer high-value services that demonstrate to your clients you know something about them and their situation, and that you can deliver the right level of support before, during, and after the potential occurrence of a security incident.<\/p>\n<h3><b>2. Maintain client satisfaction and loyalty<\/b><\/h3>\n<p>One way to grow client relationships is by offering solutions that are proactive rather than reactive. Tools that operate in a reactive mode notify a client when a security incident occurs.<\/p>\n<h3>3. Help clients demonstrate compliance<\/h3>\n<p>Depending on their business, different companies face varying compliance mandates, with many required to align with multiple mandates at the same. For example, banks are mandated by GLBA to protect financial data, healthcare agencies are required by HIPAA to protect patient information, and retailers are obligated by PPCI to protect the personal information of their customers.<\/p>\n<p>In addition, each regulation has varying requirements for threat monitoring, vulnerability remediation, data retention timelines, and continuous reporting and documentation. Clients who are unsure about their compliance responsibilities often don\u2019t know what data to archive, the required time period to keep data active or in archives, and the types of reports required to generate for inquiries by auditors and other third parties.<\/p>\n<p>SolarWinds MSP solutions enable MSPs to collect and archive data from client devices, locate records within archives quickly and easily, and present the information in a suitable format for auditors. Reports are also available for measuring client compliance-related activities, enabling MSPs to offer guidance about which devices and data should be monitored based on a client\u2019s specific regulatory requirements.<\/p>\n<h3>4. Deliver highly differentiated services<\/h3>\n<p class=\"p7\">Threat-management solutions from SolarWinds MSP are automated and work in concert to predict what threats will be an issue on client networks. Layered security allows threats that would otherwise go unnoticed to be identified and repelled in real time. Automating threat management solutions lowers MSP costs by reducing the human intervention typically needed to handle these threats. Automation also allows MSPs to focus on their core business and high-priority issues.<\/p>\n<h3 class=\"p7\">5. Support scalability and MSP growth<\/h3>\n<p class=\"p7\">Successful MSPs look beyond their current portfolios and consider the need for future opportunities and growth. SolarWinds MSP allows IT services providers to add security management technologies into their current environment to create a seamless, well-integrated collection of services, without negatively impacting current product offerings.<\/p>\n<p class=\"p3\"><strong>Find out for yourself how the suite of products from SolarWinds MSP help improve network security and data management. <a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/trial\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\">Start a free trial of SolarWinds MSP Remote Monitoring and Management<\/span><\/a> and experience a\u00a0comprehensive network management solution you can depend on.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Improving network security can be made easier with the right information security strategy and network management tools. Learn how.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-9274","post","type-post","status-publish","format-standard","hentry","topic-backup-disaster-recovery","topic-email","topic-remote-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to improve network security - N-able<\/title>\n<meta name=\"description\" content=\"Improving network security can be made easier with the right information security strategy and network management tools. Learn how.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to improve network security - N-able\" \/>\n<meta property=\"og:description\" content=\"Improving network security can be made easier with the right information security strategy and network management tools. Learn how.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-22T20:34:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-30T09:43:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How to improve network security\",\"datePublished\":\"2019-04-22T21:34:52+01:00\",\"dateModified\":\"2021-04-30T09:43:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security\"},\"wordCount\":1157,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Backup &amp; Disaster Recovery\",\"Mail\",\"Remote Management\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security\",\"name\":\"How to improve network security - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2019-04-22T21:34:52+01:00\",\"dateModified\":\"2021-04-30T09:43:39+00:00\",\"description\":\"Improving network security can be made easier with the right information security strategy and network management tools. Learn how.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Backup &amp; Disaster Recovery\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/backup-disaster-recovery\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to improve network security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to improve network security - N-able","description":"Improving network security can be made easier with the right information security strategy and network management tools. Learn how.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security","og_locale":"es_ES","og_type":"article","og_title":"How to improve network security - N-able","og_description":"Improving network security can be made easier with the right information security strategy and network management tools. Learn how.","og_url":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-04-22T20:34:52+00:00","article_modified_time":"2021-04-30T09:43:39+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How to improve network security","datePublished":"2019-04-22T21:34:52+01:00","dateModified":"2021-04-30T09:43:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security"},"wordCount":1157,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Backup &amp; Disaster Recovery","Mail","Remote Management"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security","url":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security","name":"How to improve network security - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2019-04-22T21:34:52+01:00","dateModified":"2021-04-30T09:43:39+00:00","description":"Improving network security can be made easier with the right information security strategy and network management tools. Learn how.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-improve-network-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Backup &amp; Disaster Recovery","item":"https:\/\/www.n-able.com\/es\/blog\/category\/backup-disaster-recovery"},{"@type":"ListItem","position":2,"name":"How to improve network security"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/9274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=9274"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/9274\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=9274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}