{"id":5546,"date":"2017-06-20T21:05:51","date_gmt":"2017-06-20T20:05:51","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5546"},"modified":"2021-04-06T21:08:54","modified_gmt":"2021-04-06T20:08:54","slug":"moving-cloud-cloud-based-antivirus","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus","title":{"rendered":"Moving to the Cloud &#8211; Cloud-Based Antivirus"},"content":{"rendered":"<p>The move from on-premises endpoints to hosted endpoints in the cloud is one many organizations are embracing. Why? Because it offers benefits like better availability, lower cost, and none of the hardware headaches. Cloud options like Amazon Web Services<sup>\u2122<\/sup>, VMware<sup>\u00ae<\/sup>\u00a0Cloud Air, Azure<sup>\u00ae<\/sup>, Rackspace<sup>\u00ae<\/sup>\u00a0(to name a few) all provide IT with an ability to quickly create, manage, and remove virtual machines (VMs) as business needs change.<\/p>\n<h3>Staying Vigilant Against Malware and Ransomware<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg\" alt=\"stayaware.jpg\" width=\"419\" height=\"207\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Once you move the endpoints into the cloud with a trusted vendor, you can\u2019t (and shouldn\u2019t) assume the endpoints are secure. The fact is,\u00a0<em>they\u2019re not<\/em>. The threat of malware is on the rise, and cloud-based systems are often seen as opportunistic, low-hanging fruit by cyber attackers. Employing a simple\u00a0<a class=\"ext\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/war-dialer\" target=\"_blank\" rel=\"noopener noreferrer\">war dialer-type<\/a>\u00a0scan of a cloud infrastructure vendor\u2019s IP addresses can highlight a number of potential unsecured targets for an attacker. According to the\u00a0<a class=\"ext\" href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon<sup>\u00ae<\/sup>\u00a0Data Breach Investigations Report<\/a>, most attacks involve some type of malware, so having some level of antivirus protection is a mandatory part of your layered defensive security strategy to safeguard your cloud-based endpoints from the latest viruses, malware, and spam.<\/p>\n<h3>Is Antivirus in the Cloud Different Than On-Premises?<\/h3>\n<p>In a word,\u00a0<em>absolutely<\/em>.<\/p>\n<p>Cloud-based antivirus, of course, has the same function as its on-premises counterpart. But the cloud adds one major design requirement to antivirus that on-premises is not as concerned with:\u00a0<em>performance<\/em>. Given your cloud-based endpoints are likely virtual machines (VMs), there\u2019s a big push to ensure the levels of disk and processor required are MUCH lighter in the cloud from that of on-premises antivirus\u2014if not offloaded entirely. Traditional antivirus uses a number of operating system intercepts (memory, or file for example) to scan using various methods (such as signatures, heuristics, or sandboxing), which only kills a machine\u2019s performance. Cloud-based antivirus is laser-focused on security\u00a0<em>and<\/em>\u00a0performance.<\/p>\n<p>If you were to use that kind of solution within a cloud-based server hosting a number of VMs, you&#8217;d need to multiply the performance problem by the number of VMs\u2014with each one slowing down the others (remember VMs are a shared resource system!).<\/p>\n<h3>How Do You Select the Right Cloud-based Antivirus Solution?<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/rightav.jpg\" alt=\"rightav.jpg\" width=\"415\" height=\"205\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Choosing the right antivirus for the cloud<\/p>\n<p>The choice of a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/cloud-based-antivirus-solutions\">cloud-based antivirus solution<\/a>\u00a0comes down to three basic issues, all of which intersect:<\/p>\n<ol>\n<li>The antivirus feature set and the security value it brings<\/li>\n<li>The endpoint (read: guest VM) resources required<\/li>\n<li>The individual endpoint workloads<\/li>\n<\/ol>\n<p>If you choose a powerful, comprehensive antivirus solution, but it taxes the living daylights out of your most critical workloads, you\u2019re in trouble. The same goes for an extremely light version of antivirus that leaves your endpoint\u2019s resources relatively untouched. You need to find the perfect balance of powerful and light.<\/p>\n<h3>Which Antivirus Features Should You Be Looking For?<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/scanningfiles.jpg\" alt=\"scanningfiles.jpg\" width=\"416\" height=\"205\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>It\u2019s important to look beyond marketing claims and focus on the technical capabilities of each solution. Depending on the vendor you select, you\u2019ll want to make sure whatever antivirus you put in place has\u00a0<b><i>one or more<\/i><\/b><i>\u00a0<\/i>of the following features:<\/p>\n<ul>\n<li><b>Agentless Scanning<\/b>\u2014In some solutions, there is no agent running within the endpoint VM itself. Instead, scans are performed by the host. This offloads the work to the host, eliminating resource bottlenecks and avoids the potential for simultaneous system scans. It also, in theory, provides for a higher VM density per host given the lower resource needed for each VM.<\/li>\n<li><b>Network Traffic Scanning<\/b>\u2014Because the endpoints will most likely become infected as a result of downloading some bit of nasty code from the internet, intercepting and scanning the network traffic itself is another way of offloading the burden of scanning from the endpoint.<\/li>\n<li><b>Lightweight Agents<\/b>\u2014In this model, each endpoint does have a very small agent that has a far more limited set of responsibilities. Unlike an on-premises agent, a lightweight agent likely does no scanning of files. Instead, it collects relevant information about downloaded files\u2014such as the file\u2019s hash, its fuzzy hash (used to identify polymorphic malware), details on how the file was downloaded and from where, and other information\u2014and passes all this to an external scanning engine.<\/li>\n<li><b>Cloud-based Analysis<\/b>\u2014This server-side processing is accomplished by servers hosted by the antivirus provider. Normally used in conjunction with lightweight agents, this methodology successfully offloads any taxing of endpoint resources while utilizing a central, up-to-date engine. There are a few benefits of this model. First, the engine and its malware definitions are the culmination of every customer using it\u2014so the moment a new piece of malware is identified, every customer benefits. Second, the engine itself isn\u2019t accessible to malware creators, giving the antivirus vendor an upper hand in the battle.<\/li>\n<\/ul>\n<p>Depending on the vendor, there are likely other features that add value, so the preceding list is by no means comprehensive. It does, however, provide a base level of functionality you should be looking for. Each vendor takes a slightly different approach, based on the way they see the problem and how it should be solved.<\/p>\n<p>Regardless of which method is used, keep a watchful eye on the claims of what a vendor\u2019s solution specifically addresses. Some will only scan downloaded files, others focus on scans of file system changes, while others schedule scans of an endpoint. Assuming you are taking a layered approach to your cloud security, you\u2019ll need to identify the weaknesses in your strategy and select a cloud-based antivirus solution that fills in the gaps.<\/p>\n<h3>Ensuring a Secure Cloud<\/h3>\n<p>The right cloud-based antivirus solution will have more than one of these features, but not necessarily all of them. What\u2019s important is: first, have\u00a0<i>something<\/i>\u00a0in place (don\u2019t wait just because you can\u2019t find the right feature set\u2014cyber criminals aren\u2019t going to give you the needed time before they attack); second, consider how the security features you implement will impact performance; and third, select a solution that fits in the context of your overall security strategy.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Nick Cavalancia has over 20 years of enterprise IT experience and is an accomplished executive, consultant, trainer, speaker, and columnist. He has authored, co-authored and contributed to over a dozen books on Windows<sup>\u00ae<\/sup>, Active Directory<sup>\u00ae<\/sup>, Exchange<sup>\u2122<\/sup>\u00a0and other Microsoft<sup>\u00ae<\/sup>\u00a0technologies. Nick has also held executive positions at ScriptLogic<sup>\u00ae<\/sup>, SpectorSoft<sup>\u00ae<\/sup>\u00a0and Netwrix<sup>\u00ae<\/sup>\u00a0and now focuses on the evangelism of technology solutions.<\/em><\/p>\n<p><em>Follow Nick on Twitter<sup>\u00ae<\/sup>\u00a0at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/nickcavalancia\" target=\"_blank\" rel=\"noopener noreferrer\">@nickcavalancia<\/a><\/em><\/p>\n<p><b>Click here to find out more about our Layered Security offering and how it can help you secure your clients\u2019 business.<\/b><\/p>\n<p>\u00a9 2017 SolarWinds MSP UK Ltd. All rights reserved.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The move from on-premises endpoints to hosted endpoints in the cloud is one many organizations are embracing. Why? Because it offers benefits like better availability, lower cost, and none of&#8230;<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5546","post","type-post","status-publish","format-standard","hentry","topic-cloud-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Moving to the Cloud - Antivirus Considerations - N-able<\/title>\n<meta name=\"description\" content=\"Antivirus is one of the many things you need to consider when moving to the cloud. Here&#039;s what to think about.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Moving to the Cloud - Antivirus Considerations - N-able\" \/>\n<meta property=\"og:description\" content=\"Antivirus is one of the many things you need to consider when moving to the cloud. Here&#039;s what to think about.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-20T20:05:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-06T20:08:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"Moving to the Cloud &#8211; Cloud-Based Antivirus\",\"datePublished\":\"2017-06-20T21:05:51+01:00\",\"dateModified\":\"2021-04-06T20:08:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus\"},\"wordCount\":1105,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg\",\"articleSection\":[\"Cloud Computing\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus\",\"name\":\"Moving to the Cloud - Antivirus Considerations - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg\",\"datePublished\":\"2017-06-20T21:05:51+01:00\",\"dateModified\":\"2021-04-06T20:08:54+00:00\",\"description\":\"Antivirus is one of the many things you need to consider when moving to the cloud. Here's what to think about.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#primaryimage\",\"url\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg\",\"contentUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Cloud Computing\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/cloud-computing\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Moving to the Cloud &#8211; Cloud-Based Antivirus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Moving to the Cloud - Antivirus Considerations - N-able","description":"Antivirus is one of the many things you need to consider when moving to the cloud. Here's what to think about.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus","og_locale":"it_IT","og_type":"article","og_title":"Moving to the Cloud - Antivirus Considerations - N-able","og_description":"Antivirus is one of the many things you need to consider when moving to the cloud. Here's what to think about.","og_url":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2017-06-20T20:05:51+00:00","article_modified_time":"2021-04-06T20:08:54+00:00","og_image":[{"url":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg","type":"","width":"","height":""}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Guest","Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"Moving to the Cloud &#8211; Cloud-Based Antivirus","datePublished":"2017-06-20T21:05:51+01:00","dateModified":"2021-04-06T20:08:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus"},"wordCount":1105,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#primaryimage"},"thumbnailUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg","articleSection":["Cloud Computing"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus","url":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus","name":"Moving to the Cloud - Antivirus Considerations - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#primaryimage"},"thumbnailUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg","datePublished":"2017-06-20T21:05:51+01:00","dateModified":"2021-04-06T20:08:54+00:00","description":"Antivirus is one of the many things you need to consider when moving to the cloud. Here's what to think about.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#primaryimage","url":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg","contentUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/2017-06\/stayaware.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/moving-cloud-cloud-based-antivirus#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Cloud Computing","item":"https:\/\/www.n-able.com\/it\/blog\/category\/cloud-computing"},{"@type":"ListItem","position":2,"name":"Moving to the Cloud &#8211; Cloud-Based Antivirus"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=5546"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5546\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=5546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}