{"id":47513,"date":"2023-08-09T14:41:11","date_gmt":"2023-08-09T13:41:11","guid":{"rendered":"https:\/\/www.n-able.com\/?p=47513"},"modified":"2023-08-10T15:06:54","modified_gmt":"2023-08-10T14:06:54","slug":"the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp","title":{"rendered":"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">As someone deeply immersed in the cybersecurity field for over 20 years, I have witnessed firsthand the impact of the Gartner\u00ae Magic Quadrant\u2122 analysis on technology vendors, service providers, and their customers. Throughout my career, I have held various roles, including Global Head of Security Engineering at Warner Bros. Discovery, CTO and Co-Founder of Trapezoid, Inc., and currently, Field CISO Americas at SentinelOne. Throughout these experiences, Gartner and its renowned research reports have consistently provided invaluable insights for evaluating and selecting reliable cybersecurity solutions, particularly in Endpoint Protection Platforms (EPP). Gartner is a tremendous resource that has assisted me in understanding current partnerships and competitive differentiation, ultimately allowing me to leverage their analysis to align organizational priorities with vendor solutions. In this article, I aim to share my expertise and insights gained, shedding light on what goes into the creation of a Gartner Magic Quadrant and the effect that it has had on my decision-making process.<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Endpoint Protection Platforms (EPP)<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">Perimeters no longer exist, they haven\u2019t for a long time now. From laptops and mobile devices to servers and containers, any system can become a target. Therefore, EPP\u2019s primary objective is to prevent and protect against both known and unknown attacks by running a security agent on every endpoint and detecting malicious activity in real-time. With features like file-based and fileless exploits, living off the land, stealthy ransomware, and AI-based training, malware has become supercharged, giving attackers unprecedented capabilities. As defenders we need to understand which tools and vendors can help us keep up and how to best leverage them in our unique environments. Script and process control, behavioral analysis for threat detection, AI-powered detection mechanisms, automated remediation responses, and incident investigation capabilities are just some of the features that most EPPs must develop for us to have a fighting chance. Leaders in the EPP market have evolved to deliver a comprehensive security framework by <a href=\"https:\/\/www.n-able.com\/blog\/why-is-edr-important-a-business-case-for-msps\" target=\"_blank\" rel=\"noopener\">incorporating next-gen EDR<\/a>, AV, and XDR capabilities helping address these cutting-edge security threats.<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Power of the Magic Quadrants<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">The Gartner Magic Quadrant has become a trusted compass for organizations in selecting the right solution in almost every aspect of security. By evaluating vendors based on their ability to execute and completeness of vision, the Magic Quadrant provides valuable insights into a vendor&#8217;s capabilities, market understanding, product strategy, and innovation. As someone deeply involved in the industry, I have relied on the Magic Quadrant to make informed decisions and align my strategies with industry leading EPP vendors. Let&#8217;s break down the categories within the Magic Quadrant to provide a concise summary.<\/span><\/p>\n<h3 class=\"p6\"><span class=\"s1\">Leaders<\/span><\/h3>\n<ul>\n<li class=\"p7\"><span class=\"s1\">Demonstrate balanced progress in the ability to execute and completeness of vision.<\/span><\/li>\n<li class=\"p7\"><span class=\"s1\">Offers holistic XDR platforms to streamline and consolidate security tools.<\/span><\/li>\n<li class=\"p7\"><span class=\"s1\">Strong capabilities in advanced malware protection, detection, and response.<\/span><\/li>\n<li class=\"p7\"><span class=\"s1\">Proven track record supporting large customers with complex environments.<\/span><\/li>\n<\/ul>\n<h3 class=\"p8\"><span class=\"s1\">Challengers <\/span><\/h3>\n<ul>\n<li class=\"p7\"><span class=\"s1\">Solid anti-malware products with detection and response capabilities.<\/span><\/li>\n<li class=\"p7\"><span class=\"s1\">May be slower in introducing new features or lack a fully converged platform strategy.<\/span><\/li>\n<\/ul>\n<h3 class=\"p6\"><span class=\"s1\">Visionaries<\/span><\/h3>\n<ul>\n<li class=\"p7\"><span class=\"s1\">Bring innovative features to enhance security and management.<\/span><\/li>\n<li class=\"p7\"><span class=\"s1\">Execution and market share may vary and lack consistency.<\/span><\/li>\n<\/ul>\n<h3 class=\"p6\"><span class=\"s1\">Niche Players<\/span><\/h3>\n<ul>\n<li class=\"p7\"><span class=\"s1\">Offer solid products in specific areas often targeting specific markets.<\/span><\/li>\n<li class=\"p7\"><span class=\"s1\">May not lead in terms of features and functionality.<\/span><span class=\"s1\">\u00a0<\/span><\/li>\n<\/ul>\n<p class=\"p2\"><span class=\"s1\">Evaluating vendors across these categories allows organizations to identify unique strengths and choose the most suitable solution for their cybersecurity needs. By considering capabilities, agility, and specialization, organizations can make informed decisions and align their security strategies with the right vendor.<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Choose Wisely, Don&#8217;t Compromise <\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">Gartner\u2019s evaluation criteria and vendor analysis provides insights into their vision, innovation, operations, ability to deliver, and alignment with the market, but does it fit your organization? Understanding your own risk, exposure, and priorities is critical\u2014only then can you properly align those considerations with the findings delivered by Gartner\u2019s recommendations. To even be considered for inclusion by Gartner in the Magic Quadrant for EPP there are certain criteria that must be met. This is particularly important because it saves customers tons of time researching and evaluating capabilities to come up with a few possible solutions. It is vital to consider the following core competencies when selecting an EPP vendor:<\/span><\/p>\n<ol class=\"ol1\">\n<li class=\"li2\"><span class=\"s1\">How well did they perform during independent testing such as those performed by AV-TEST, AV-Comparatives, <a href=\"https:\/\/www.n-able.com\/resources\/mitre-engenuity-attck-evaluation\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">MITRE<\/span><\/a>, MRG Effitas and SE Labs?<\/span><\/li>\n<li class=\"li2\"><span class=\"s1\">What is the vendor&#8217;s track record of innovation and does their long-term vision align with the changing landscape of cybersecurity threats to your organization?<\/span><\/li>\n<li class=\"li2\"><span class=\"s1\">Does the pricing and scalability of the solution fit within your budget and growth plans?<\/span><\/li>\n<\/ol>\n<h2 class=\"p5\"><span class=\"s1\">Conclusion<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">The Gartner Magic Quadrant for EPP is a guiding light for organizations seeking robust and reliable cybersecurity solutions. Time and again it has served as a starting point for me personally when taking steps towards selecting vendors for an evaluation of their technology. By comprehensively evaluating technology vendors, it empowers customers and managed service providers to make informed decisions. Drawing on my experiences in the field, I recognize the immense value of the Gartner Magic Quadrant as a decision support system and tremendous time saver for cybersecurity professionals. <\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><b>SentinelOne has been\u00a0recognized\u00a0as a <\/b><a href=\"https:\/\/www.sentinelone.com\/lp\/gartnermq\/\"><span class=\"s4\"><b>Leader in Magic Quadrant for Endpoint Protection Platforms<\/b><\/span><\/a><b> and ranks highest across all Gartner Critical Capabilities Use Cases. To experience the power of SentinelOne for yourself, check out <\/b><a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\"><span class=\"s4\"><b>N\u2011able Endpoint Detection &amp; Response<\/b><\/span><\/a><b> and <\/b><a href=\"https:\/\/www.n-able.com\/products\/managed-edr\"><span class=\"s4\"><b>N\u2011able Managed EDR<\/b><\/span><\/a><b> both powered by SentinelOne.<\/b><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><i>Albert Caballero is Field CISO Americas, SentinelOne<\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SentinelOne&#8217;s Albert Caballero, looks at why the Gartner\u00ae Magic Quadrant\u2122 is an important resource to help MSPs make informed decisions about EPPs.<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-47513","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) - N-able<\/title>\n<meta name=\"description\" content=\"This blog looks at why the Gartner Magic Quadrant is an important resource to help MSPs make informed decisions about EPPs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) - N-able\" \/>\n<meta property=\"og:description\" content=\"This blog looks at why the Gartner Magic Quadrant is an important resource to help MSPs make informed decisions about EPPs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-09T13:41:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-10T14:06:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/08\/230726_blogbanner_GartnerEPP_MQ_ss.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)\",\"datePublished\":\"2023-08-09T14:41:11+01:00\",\"dateModified\":\"2023-08-10T14:06:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp\"},\"wordCount\":906,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp\",\"name\":\"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2023-08-09T14:41:11+01:00\",\"dateModified\":\"2023-08-10T14:06:54+00:00\",\"description\":\"This blog looks at why the Gartner Magic Quadrant is an important resource to help MSPs make informed decisions about EPPs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) - N-able","description":"This blog looks at why the Gartner Magic Quadrant is an important resource to help MSPs make informed decisions about EPPs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp","og_locale":"it_IT","og_type":"article","og_title":"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) - N-able","og_description":"This blog looks at why the Gartner Magic Quadrant is an important resource to help MSPs make informed decisions about EPPs.","og_url":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-08-09T13:41:11+00:00","article_modified_time":"2023-08-10T14:06:54+00:00","og_image":[{"width":2500,"height":1310,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/08\/230726_blogbanner_GartnerEPP_MQ_ss.png","type":"image\/png"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Guest","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)","datePublished":"2023-08-09T14:41:11+01:00","dateModified":"2023-08-10T14:06:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp"},"wordCount":906,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp","url":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp","name":"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2023-08-09T14:41:11+01:00","dateModified":"2023-08-10T14:06:54+00:00","description":"This blog looks at why the Gartner Magic Quadrant is an important resource to help MSPs make informed decisions about EPPs.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/the-power-of-gartner-magic-quadrant-for-endpoint-protection-platforms-epp#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"The Power of Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/47513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=47513"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/47513\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=47513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}