{"id":44384,"date":"2023-03-29T11:36:41","date_gmt":"2023-03-29T10:36:41","guid":{"rendered":"https:\/\/www.n-able.com\/?p=44384"},"modified":"2023-03-29T11:36:41","modified_gmt":"2023-03-29T10:36:41","slug":"why-is-edr-important-a-business-case-for-msps","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps","title":{"rendered":"Why is EDR Important? A Business Case for MSPs"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">The security industry may not have been making a lot of noise about Endpoint Detection and Response (EDR) for long, but it\u2019s not actually a new technology. Despite having been around now for roughly 10 years, it\u2019s only recently that EDR has really come to the fore. This has been driven by the fact that <a href=\"https:\/\/www.n-able.com\/resources\/five-cyberthreats-that-slip-past-traditional-antivirus-ebook\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">traditional antivirus struggles to cope<\/span><\/a> with the increasing sophistication of modern malware, and is certainly unfit to handle new types of cyber threats. <\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">Why Do MSPs Need EDR?<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">Today, for many organizations, EDR is increasingly being seen as a critical line of defense in a company\u2019s security posture, and in some areas even mandatory. This is due to a few key factors in the marketplace, including:<\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">1. Compliance adherence and regulatory requirements<\/span><\/h3>\n<p class=\"p2\"><span class=\"s1\">MSPs and their customers are facing an increasingly tight regulatory landscape, and many of those regulations are requiring (either directly or by implication) the use of EDR. Although <a href=\"https:\/\/europa.eu\/youreurope\/business\/dealing-with-customers\/data-protection\/data-protection-gdpr\/index_en.htm\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">GDPR<\/span><\/a> doesn\u2019t go as far as to mandate the use of EDR, the ability to have such visibility is crucial to ensure protection of PII and setting systems and procedures in place to minimize the risk of a breach.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Equally the recent <a href=\"https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2021)689333\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">NIS2 Directive<\/span><\/a> doesn\u2019t mandate it. However, with its amended incident reporting requirements\u2014including initial notification within 24 hours of becoming aware of certain incidents or cyber threats\u2014companies that don\u2019t deploy EDR will struggle to get visibility over active threats in their environments. On top of this, companies without EDR may also find collecting the necessary details to properly report the incident is more complex and delay the process, putting them at risk of complying with the directive requirements. In the US, however, CISA\u2019s <a href=\"https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices\/executive-order-improving-nations-cybersecurity\"><span class=\"s2\">Executive Order on Improving the Nation\u2019s Cybersecurity<\/span><\/a> does actually stipulate a mandatory requirement for EDR solutions to be implemented.<\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">2. Cyber Insurance<\/span><\/h3>\n<p class=\"p2\"><span class=\"s3\"><a href=\"https:\/\/www.n-able.com\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\" target=\"_blank\" rel=\"noopener\">Cyber insurance is a growing focus<\/a><\/span><span class=\"s1\"> of attention for businesses, and for MSPs this extends to helping their customers not only manage the application process, but also to rolling out the systems and infrastructure to ensure they can comply with any specific insurance requirements. Increasingly, insurers are looking for EDR deployment as it offers them a guarantee around risk reduction control for the insured business.<\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">3. Supply chain security requirements<\/span><\/h3>\n<p class=\"p2\"><span class=\"s1\">Over the past few years, we\u2019ve seen a growing number of supply chain attacks, so this is yet another key area of focus for businesses. If your organization\u00a0supplies services to another organization, or your organization uses the services of other businesses, to continue to operate securely, then you need to have full visibility over your infrastructure and be able to spot and mitigate issues quickly. This helps ensure they don\u2019t populate across other companies\u2019 networks and products. <a href=\"https:\/\/www.n-able.com\/blog\/edr-vs-antivirus-three-reasons-to-step-up-your-game\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Traditional AV won\u2019t give you this<\/span><\/a>, so EDR is one of the natural core requirements in a good defense-in-depth strategy.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">It\u2019s more than just check-boxing<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">When it comes to thinking about the role and importance of EDR, I like to use the analogy of a castle; although it has high walls, it has loads of entry points, including those coming from within (insider threats). Yet it would be unusable from a functional point of view, to have a castle with no doors, windows, or bridges, and where no one would be allowed to enter or leave. Unfortunately, for many organizations this is what happens if they don\u2019t get the balance right between security, functionality, and business requirements.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Of course, it is also not possible to have every window, door, and person within the boundaries of a castle monitored by a soldier 24\/7\/365. And the same is true for businesses. This is why the security industry collectively, has evolved from the notion of assume breach and detect all attacks (when it\u2019s not possible to prevent them), to being able to predict attacks as they are either in process or where and when they might occur. This means working towards mitigation, or reduction of surface attack, and ultimately being able to resist attacks and effectively, and efficiently, recover from them (the principle of Cyber Resilience). This is essentially what EDR is about.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">However, monitoring and predicting threats 247\/7\/365 is a complex process, and one that can be hugely costly to build an infrastructure to support\u2014not just in terms of technology but also in terms of hiring the security analysts required to run it.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">This is where Managed Detection and Response (MDR) can really support businesses.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">How does MDR take security to the next level?<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">There are two simple scenarios where MDR really helps organizations take their security to the next level.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">1. Providing a fully fledged Security Operations Center (SOC) on tap<\/span><\/h3>\n<p class=\"p2\"><span class=\"s1\">The reality is that the vast majority of organizations won\u2019t have the resources (financial and human) to fully staff a mature SOC, that will be able to maintain and operate their full security stack (including EDR) 24\/7\/365.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Thanks to the cloud and economies of scale, MDR, like many other \u201cmanaged\u201d services, <a href=\"https:\/\/www.n-able.com\/blog\/using-soc-as-a-service-to-bridge-the-cybersecurity-talent-gap\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">allows MSPs to outsource their security operations<\/span><\/a> to a third-party security specialist. This way, MDR becomes a highly cost-effective service that can be crucial for organizations looking to secure their businesses and be compliant with whatever their business requires.<\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">2. Scaling your team\u2019s ability<\/span><\/h3>\n<p class=\"p2\"><span class=\"s1\">Even if an organization has a fully staffed and mature SOC, their focus will ultimately be narrower, as there will always be a need to align, on a daily-basis, to the business needs (new or existing ones).<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">By using an MDR service those teams can \u201cscale\u201d further, without putting pressure on budget, training, retention, etc. This allows them to focus on what matters most for them, whether that\u2019s business process improvements, infrastructure improvements, maintenance processes efficiency, or playbooks.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">A good example here is how the MDR provider can focus on triage and initial investigation, before handing over a curated set of recommendations\u00a0to the customer. <\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">How does MDR help MSPs tackle emerging threats?<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><span class=\"s1\">Overall MDR provides benefits that even smaller SOCs would struggle to achieve, including:<\/span><\/p>\n<ul>\n<li class=\"p3\"><span class=\"s1\">Proactive <a href=\"https:\/\/www.n-able.com\/products\/threat-hunting\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">threat hunting<\/span><\/a> with data at scale, that results in actionable insights<\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">Broader threat knowledge thanks to a bird\u2019s-eye view across hundreds or thousands of different organizations, industries, and geographies<\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">Access to economies of scale, allowing them to employ higher skill-level analysts and bleeding edge <a href=\"https:\/\/www.n-able.com\/solutions\/security\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">security tools<\/span><\/a>, thus helping to keep pace with the continually evolving adversarial tactics and techniques<\/span><span class=\"s1\">\u00a0<\/span><\/li>\n<\/ul>\n<p class=\"p2\"><span class=\"s1\">This is why we\u2019ve partnered with N&#8209;able to bring these core benefits to MSPs and MSSPs globally. <a href=\"https:\/\/www.n-able.com\/products\/managed-edr\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">N&#8209;able Managed EDR<\/span><\/a>\u00a0uses SentinelOne\u2019s Vigilance MDR security experts to provide managed security services designed for MSPs that have standardized on <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">N&#8209;able EDR<\/span><\/a> powered by SentinelOne. <\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p2\"><strong><span class=\"s1\">If you want to find out more, <a href=\"https:\/\/www.n-able.com\/products\/managed-edr\/contact\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">get in touch with N&#8209;able\u2019s security specialists<\/span><\/a> to discuss how N&#8209;able Managed EDR can help address your specific needs.<\/span><\/strong><\/p>\n<p class=\"p2\"><em><span class=\"s1\">Ant\u00f3nio Vasconcelos is EMEA Field CISO Director at <a href=\"https:\/\/www.sentinelone.com\/\" target=\"_blank\" rel=\"noopener\">SentinelOne<\/a><\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>EDR has become essential for MSPs and their customers to manage the challenges of evolving security threats. SentinelOne\u2019s Antonio Vasconcelos explains.<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-44384","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why is EDR Important? A Business Case for MSPs - N-able<\/title>\n<meta name=\"description\" content=\"EDR has become essential for MSPs and their customers to manage the challenges of evolving security threats. Read this blog to find out more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why is EDR Important? A Business Case for MSPs - N-able\" \/>\n<meta property=\"og:description\" content=\"EDR has become essential for MSPs and their customers to manage the challenges of evolving security threats. Read this blog to find out more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-29T10:36:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/230327_blocgbanner_WhyDoCompaniesNeed_EDR_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/230327_blocgbanner_WhyDoCompaniesNeed_EDR_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"Why is EDR Important? A Business Case for MSPs\",\"datePublished\":\"2023-03-29T11:36:41+01:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps\"},\"wordCount\":1152,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps\",\"name\":\"Why is EDR Important? A Business Case for MSPs - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2023-03-29T11:36:41+01:00\",\"description\":\"EDR has become essential for MSPs and their customers to manage the challenges of evolving security threats. Read this blog to find out more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why is EDR Important? A Business Case for MSPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why is EDR Important? A Business Case for MSPs - N-able","description":"EDR has become essential for MSPs and their customers to manage the challenges of evolving security threats. Read this blog to find out more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps","og_locale":"fr_FR","og_type":"article","og_title":"Why is EDR Important? A Business Case for MSPs - N-able","og_description":"EDR has become essential for MSPs and their customers to manage the challenges of evolving security threats. Read this blog to find out more.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-03-29T10:36:41+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/230327_blocgbanner_WhyDoCompaniesNeed_EDR_ss.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/230327_blocgbanner_WhyDoCompaniesNeed_EDR_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Guest","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"Why is EDR Important? A Business Case for MSPs","datePublished":"2023-03-29T11:36:41+01:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps"},"wordCount":1152,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps","url":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps","name":"Why is EDR Important? A Business Case for MSPs - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2023-03-29T11:36:41+01:00","description":"EDR has become essential for MSPs and their customers to manage the challenges of evolving security threats. Read this blog to find out more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/why-is-edr-important-a-business-case-for-msps#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Why is EDR Important? A Business Case for MSPs"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/44384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=44384"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/44384\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=44384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}