{"id":5223,"date":"2019-09-25T00:14:45","date_gmt":"2019-09-24T23:14:45","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5223"},"modified":"2021-04-02T00:16:41","modified_gmt":"2021-04-01T23:16:41","slug":"itil-best-practices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices","title":{"rendered":"ITIL Best Practices"},"content":{"rendered":"<p>The Information Technology Infrastructure Library, commonly abbreviated as ITIL, is a framework of best practices that helps to bring\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/differences-between-itsm-itil\" target=\"_blank\" rel=\"noopener\">IT service management<\/a>\u00a0(ITSM) into alignment with what businesses and organizations require in order to function and grow.<\/p>\n<p>The ITIL model is one of the most widely accepted approaches to ITSM around the world. The framework is currently in the process of transitioning from ITIL v3 to ITIL 4, which has been revamped to help support a world undergoing rapid developments in technology and innovation.<\/p>\n<p>Structural changes can be hard to implement, but it\u2019s important for managed services providers (MSPs) to be familiar with ITIL best practices and methodologies in order to provide a consistent customer experience. This experience should allow for business improvement that keeps pace with the accelerating pace of technology and developmental breakthroughs. In this article, we\u2019ll provide a crash course in ITIL basics to serve as a guideline for keeping your services ITIL compliant.<\/p>\n<h3><b>What are the five stages of ITIL?<\/b><\/h3>\n<p>ITIL v3 is centered on five stages of a \u201cservice lifecycle\u201d that, when implemented correctly, ensure that IT service providers are delivering the proper technological capabilities and support to allow the business to thrive. The stages of the service lifecycle are: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement.<\/p>\n<ul>\n<li><strong>Service Strategy<\/strong>The first stage of the lifecycle is focused on how to design, develop, and establish an IT service management framework that can support the aims, operations, and ambitions of the business. This step includes applying the knowledge of how the business works in order to design service strategies that can actually give the organization advantages over competitors.\n<p>This phase has to do with the organization\u2019s mission and sense of identity, including the target audience and how the organization plans to differentiate itself in the market. This will affect\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/operational-success-best-practices\" target=\"_blank\" rel=\"noopener\">operational planning<\/a>\u00a0and decision-making across the entire company, including the IT department, so establishing the right strategies, contingencies, and frameworks can streamline business operations in a number of productive ways.<\/li>\n<li><strong>Service Design<\/strong>The next phase of the ITIL methodology lifecycle focuses on designing how services will be provided. This includes not only the specific technologies that the department plans to use, but also the structural aspects that will allow the technological services to be delivered across the organization. This involves planning how technological solutions and services interact with other departments, processes, and environments within the organization\u2014as well as with the various structural elements required to support the service.\n<p>Other factors like cost management of services, supply chain management, availability management, and capacity management must also be considered. All of these factors will eventually work together to ensure reliable services that are cost-effective and able to meet the demands of the organization.<\/li>\n<li><strong>Service Transition<\/strong>The Service Transition phase refers to the building and deployment of technological services for the business. In order to execute this in a coordinated and controlled way, this phase involves a number of planning stages so that deployments do not disrupt normal business operations\u2014or if a disruption cannot be avoided, that it only causes\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/real-cost-field-service\" target=\"_blank\" rel=\"noopener\">minimal downtime<\/a>.\n<p>Other elements that require planning and management are the actual deployment of the service, testing to confirm that the service was deployed successfully, evaluating the difference between pre- and post-deployment operations, troubleshooting issues that may have arisen during the deployment rollout, and gathering what knowledge can be learned from the process. Throughout every stage of the process, IT teams must also consider the most effective use of resources along the way.<\/li>\n<li><strong>Service Operation<\/strong>This phase of the service lifecycle includes the ITIL best practices for the direct delivery of services to end users or customers. This includes monitoring and managing the day-to-day functions across the company, such as staying up-to-date on application licensing and technology usage. Many of these functions are often performed through a technology services help desk.\n<p>Having a service desk is something that many employees may take for granted, but this is actually a major part of ITIL compliance. An IT help desk centralizes the management of service by giving end users a single point of contact to report incidents or make requests. This helps streamline communication, but also provides a channel of communication between the IT department and the other departments within an organization.<\/p>\n<p>The help desk also functions as the site of problem management. The goal is for the technology services department to ensure that the business operations are functioning reliably, on a reasonable budget, and at agreed upon levels or thresholds of service\u2014all with minimal disruptions or downtime.<\/li>\n<li><strong>Continual Service Improvement<\/strong>The last phase of the service lifecycle involves keeping abreast of any changes in the organization\u2019s needs, as well as adjusting or improving the provision of IT services to support those changes. In order to define and thereby manage what constitutes \u201cimprovement,\u201d this phase asks that service providers determine which metrics to control and measure.\n<p>These determined metrics will then be used to identify what constitutes \u201csuccess\u201d or \u201cimprovement.\u201d These metrics can be updated as needed\u2014the continual service improvement phase requires ongoing planning, training, and monitoring of activities in order to maintain technological services that support the company\u2019s needs.<\/li>\n<\/ul>\n<h3><b>What are the processes of ITIL?<\/b><\/h3>\n<p>Within each phase of the lifecycle there are several granular processes and subframeworks. Some of these more specific processes have been mentioned above but are further detailed below.<\/p>\n<ul>\n<li><strong>Service Strategy<\/strong>\n<ul>\n<li><em>Service Portfolio Management<\/em>\u00a0focuses on the portfolio of IT services that the department provides and whether these services align with the broader Service Strategy goals.<\/li>\n<li><em>Financial Management<\/em>\u00a0ensures that the portfolio of services provided is cost-effective and allows the IT services department to provide maximum support with minimal costs.<\/li>\n<li><em>Strategy Management<\/em>\u00a0assesses where IT services fit into the big picture regarding the overall market, and can include analyses of the market, user, or customer needs, and future plans for expansion.<\/li>\n<li><em>Demand Management\u00a0<\/em>compares customers\u2019 demands against the services provided and attempts to balance or mitigate any differences between the two.<\/li>\n<li><em>Business Relationship Management\u00a0<\/em>establishes and maintains relationships with customers in order to understand their needs\u2014both current and projected\u2014to meet and predict them as best as possible.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Service Design<\/strong>\n<ul>\n<li><em>Service Level Management\u00a0<\/em>plans for service deployment targets and measures actual performance against those targets, which often include\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/what-is-sla-service-level-agreement-for-msp\">service level agreements (SLAs)<\/a>\u00a0for preset benchmarks and comparisons.<\/li>\n<li><em>Service Catalog Management<\/em>\u00a0ensures that there is an up-to-date, easily accessible catalog of all the services that are available to end users so that teams can perform required tasks.<\/li>\n<li><em>Capacity Management\u00a0<\/em>monitors system performance to make sure there is sufficient capacity to match the organization\u2019s needs.<\/li>\n<li><em>Availability Management\u00a0<\/em>ensures that the services provided are always available to the customer with minimal downtime.<\/li>\n<li><a href=\"https:\/\/www.solarwindsmsp.com\/products\/use-cases\/business-continuity-software\"><em>IT Service Continuity Management\u00a0<\/em><\/a>examines the processes involved in enacting service delivery plans with the goal of ensuring that services are continually available or can recover following a serious IT risk or incident.<\/li>\n<li><em>Information Security Management\u00a0<\/em>works to protect systems, data, and the customers who access services through the use of firewalls, SIEM applications, or other security countermeasures.<\/li>\n<li><em>Supplier Management\u00a0<\/em>identifies and evaluates suppliers and supplier relationships to ensure that contracts are adhered to and support the organization\u2019s goals overall.<\/li>\n<li><em>Design Coordination<\/em>\u00a0takes a bird\u2019s-eye view of how the individual steps of the design phase work together, with the goal of improving efficiency and optimization.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Service Transition<\/strong>\n<ul>\n<li><em>Change Management\u00a0<\/em>endeavors to keep the portfolio of provided services scalable and reliable as the needs of the organization change or expand.<\/li>\n<li><em>Change Evaluation\u00a0<\/em>determines which of the proposed changes align with business needs, then prepares for and manages those changes.<\/li>\n<li><em>Release and Deployment Management\u00a0<\/em>delivers software deployments or changes with a minimal amount of disruption to active environments.<\/li>\n<li><em>Service Validation and Testing\u00a0<\/em>tests and measures the result of deployments and continues to make service changes as needed.<\/li>\n<li><em>Service Asset and Configuration Management\u00a0<\/em>manages the configuration of each service item\u2019s attributes, which include its status, owner, activity history, and more.<\/li>\n<li><em>Knowledge Management\u00a0<\/em>collects and retains a bank of relevant knowledge that technicians and users can draw upon when attempting to resolve issues that arise.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Service Operation<\/strong>\n<ul>\n<li><em>Incident Management\u00a0<\/em>seeks to quickly restore systems to proper functionality in the event of incidents that may interrupt service\u2014which can range from small events like a password reset to large events like a network failure.<\/li>\n<li><em>Problem Management\u00a0<\/em>seeks to prevent recurring problems by identifying the root cause of a given issue and resolving it.<\/li>\n<li><em>Event Management<\/em>\u00a0monitors service events and logs files to establish baselines and identify if and when action needs to be taken to ensure reliable service.<\/li>\n<li><em>Access Management\u00a0<\/em>restricts user privileges to various systems to prevent unauthorized access, which can cut down on hacking attempts and cyberattacks.<\/li>\n<li><em>Request Fulfillment\u00a0<\/em>facilitates all aspects of customers engaging with service desk requests, ranging from receiving a request to determining the priority of requests.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Continual Service Improvement<\/strong>\n<ul>\n<li><em>Process Evaluation<\/em>\u00a0regularly analyzes processes to look for ways to improve, streamline, or make them more efficient.<\/li>\n<li><em>Definition of CSI Initiatives<\/em>\u00a0uses analysis, review, and future planning to select new and ongoing Continual Service Improvements to implement.<\/li>\n<li><em>Monitoring CSI Initiatives<\/em>\u00a0tracks the progress of current Continual Service Improvement initiatives to ensure that goals are being met regarding the completion of each project and alignment with the organization\u2019s needs.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><b>What is the ITIL framework and processes?<\/b><\/h3>\n<p>The five stages of the ITIL service lifecycle represent a broad framework that provides IT departments and MSPs with guidelines for providing proper technological service to their organizations. This framework also helps ensure that IT departments and MSPs are in compliance of established service benchmarks.<\/p>\n<p>The ITIL framework is also flexible to allow organizations to create service environments and processes tailored to its specific needs. The broader strokes that ITIL best practices are trying to provide essentially boil down to three key factors: managing change, incidents, and recurring problems. By keeping each of those three aspects in mind, MSPs will be able to provide proper services and support to help your customers meet their needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about ITIL methodology basics and best practices for ITIL compliance within your organization.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5223","post","type-post","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ITIL Best Practices - N-able<\/title>\n<meta name=\"description\" content=\"Learn about ITIL methodology basics and best practices for ITIL compliance within your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ITIL Best Practices - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn about ITIL methodology basics and best practices for ITIL compliance within your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-24T23:14:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-01T23:16:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"ITIL Best Practices\",\"datePublished\":\"2019-09-25T00:14:45+01:00\",\"dateModified\":\"2021-04-01T23:16:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices\"},\"wordCount\":1678,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"IT Support\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices\",\"name\":\"ITIL Best Practices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2019-09-25T00:14:45+01:00\",\"dateModified\":\"2021-04-01T23:16:41+00:00\",\"description\":\"Learn about ITIL methodology basics and best practices for ITIL compliance within your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IT Support\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/it-support-it\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ITIL Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ITIL Best Practices - N-able","description":"Learn about ITIL methodology basics and best practices for ITIL compliance within your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices","og_locale":"it_IT","og_type":"article","og_title":"ITIL Best Practices - N-able","og_description":"Learn about ITIL methodology basics and best practices for ITIL compliance within your organization.","og_url":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-09-24T23:14:45+00:00","article_modified_time":"2021-04-01T23:16:41+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"8 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"ITIL Best Practices","datePublished":"2019-09-25T00:14:45+01:00","dateModified":"2021-04-01T23:16:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices"},"wordCount":1678,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["IT Support"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices","url":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices","name":"ITIL Best Practices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2019-09-25T00:14:45+01:00","dateModified":"2021-04-01T23:16:41+00:00","description":"Learn about ITIL methodology basics and best practices for ITIL compliance within your organization.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/itil-best-practices"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/itil-best-practices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IT Support","item":"https:\/\/www.n-able.com\/it\/blog\/category\/it-support-it"},{"@type":"ListItem","position":2,"name":"ITIL Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=5223"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5223\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=5223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}