{"id":6085,"date":"2018-02-21T23:54:09","date_gmt":"2018-02-21T23:54:09","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6085"},"modified":"2021-04-08T23:56:44","modified_gmt":"2021-04-08T22:56:44","slug":"security-sweet-spot-msps","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps","title":{"rendered":"The Security Sweet Spot for MSPs"},"content":{"rendered":"<p>Security is a big deal these days. But you\u2019ve got antivirus, so you\u2019re good, right? Maybe you know you need more, but you\u2019re not sure what. It\u2019s confusing when vendors pitch things like their singular product offer as your \u201ccomplete\u201d security solution. You know better than that! Is there a \u201ccomplete\u201d security solution out there? As a security pro, I would say, no, there is not.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg\" alt=\"carsecurity.jpg\" width=\"407\" height=\"201\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Security can be provided in many ways, and\u00a0<em>none<\/em>\u00a0of them are complete. Just as you don\u2019t expect locking your car doors alone is enough to prevent the theft of your car, multiple layers of defense are needed. You probably have an alarm that sets automatically when you lock the doors. You may also be careful to avoid parking lots where cars get stolen or broken into regularly. You know better than to leave your laptop in the front seat as it\u2019s an invitation for a smashed window. You buy car insurance, so if your car is smashed or stolen, it can be replaced. You take these multiple precautions because there is no one \u201ccomplete\u201d solution to securing your car.<\/p>\n<p>In the security world, we call the use of multiple precautions \u201cDefense in Depth.\u201d It\u2019s an integral part of any cybersecurity strategy. At SolarWinds MSP, we call this \u201cLayered Security.\u201d\u00a0 It begins with Security Essentials to defend against common attacks. This defensive approach is often sufficient to stop the opportunistic thief\u2014the one looking for an easy, unprotected target.<\/p>\n<p>However, to continue with our car analogy, you don\u2019t expect these precautions to protect you 100%. You realize that if a bad guy really wants your car, he can probably find a way to take it, even if by brute force of carjacking while you are driving. That would be an anomaly though, and you are confident in your defense against the more likely threats. However, if you are really into security, you may take things up a level and go on the offense, proactively hunting for vulnerabilities and threats to eliminate them before the bad guys can find and act upon them.<\/p>\n<h3><b>The Security Essentials<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/trustedadvisor.jpg\" alt=\"trustedadvisor.jpg\" width=\"407\" height=\"201\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>As a managed service provider (MSP), you are the trusted technology advisor for your customers. SolarWinds MSP is a leading technology provider for MSPs like you. Together, we can easily and affordably help you reduce your clients\u2019 risk from opportunistic attacks using simple and affordable layered security that \u2018just works\u2019 as part of your IT management capabilities. This is the security sweet spot for MSPs. For the price of a latte, your customers can help ensure the technology they rely on is protected using proven practices from their trusted advisor\u2014you!<\/p>\n<p>Every customer should have a layered security foundation with the Security Essentials that include the following:<\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/remote-management\/managed-antivirus\"><b>Managed Antivirus<\/b><\/a><\/p>\n<p>Helps protect from known and emerging malware using both signature-based protection and sophisticated heuristic checks and behavioral scanning.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/remote-management\/managed-antivirus\">Managed antivirus<\/a>\u00a0is a fundamental component to your layered security offering and is available with the\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\">SolarWinds<sup>\u00ae<\/sup>\u00a0RMM<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"http:\/\/pages.solarwindsmsp.com\/solarwinds-msp-ncentral-nable.html?utm_source=bing&amp;utm_medium=cpc&amp;utm_term=solarwinds%20n-central&amp;utm_campaign=NC_CPC-Goog_Brand&amp;utm_content=324658170&amp;adv=&amp;loc=&amp;ad_id=%7bcreative%7d&amp;targ=%7btarget%7d&amp;mtype=e&amp;kw=solarwinds%20n-central&amp;adpos=%7badposition%7d&amp;device=c&amp;pm=%7bplacement%7d\" target=\"_blank\" rel=\"noopener noreferrer\">SolarWinds N&#8209;central<\/a><sup>\u00ae<\/sup>solutions.<\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/resources\/FF-MSP-RMM-Patch-Management\"><b>Patch Management<\/b>\u00a0<\/a><\/p>\n<p>Many security incidents result from hackers exploiting unpatched systems. Leverage SolarWinds MSP patch automation, convenient scheduling, and comprehensive reporting to gain full visibility over patch status and potential vulnerabilities. Patch management is an integral part of\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/resources\/FF-MSP-RMM-Patch-Management\">SolarWinds RMM<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/patch-management\">SolarWinds N&#8209;central.<\/a><\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/web-filtering-software-business\"><b>Web Content Filtering<\/b><\/a><\/p>\n<p>SolarWinds MSP web protection goes beyond enterprise antivirus software and firewalls by letting you set your own web content-filtering policies, website blacklists, time- and content-based browsing policies, and much more. Web protection is an option within\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/remote-management\/web-protection\">SolarWinds RMM<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/patch-management\">SolarWinds N&#8209;central.<\/a><\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\"><b>Mail Filtering<\/b><\/a><\/p>\n<p>The majority of endpoint security threats arrive via email. The\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\">SolarWinds Mail Assure<\/a><sup>\u2122<\/sup>\u00a0solution gives you the power of an ultra reliable email protection and archiving platform that is designed with security at its heart and provides customers with best-in-class protection from spam, phishing, malware, and other email-borne threats.<\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup\"><b>Backup<\/b><\/a><\/p>\n<p>Whether an interruption is caused by user error, technology failure, ransomware, or natural disaster, SolarWinds Backup Documents helps business get back to work quickly by storing all work documents easily and reliably.<\/p>\n<p>Every customer should use every one of these capabilities to reduce their risk (and yours) from common opportunistic attacks. It simplifies the security conversation and provides a clear path of what they need next from you. At the same time, you can grow your account footprint and billable services without adding effort and expertise. Managed antivirus and web protection are enabled in RMM and N&#8209;central literally with the click of a button.<\/p>\n<p>Just as you must acknowledge the risk of foregoing rental car insurance, have your customers acknowledge the risk they are assuming if they are not using all of these basic security essentials.<\/p>\n<h3><b>The Next Step Beyond the Essentials<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/next%20steps.jpg\" alt=\"next steps.jpg\" width=\"409\" height=\"202\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Once you have these essentials, help your clients assess the cybersecurity risks that are not so obvious.\u00a0 For example, sensitive data left exposed on systems poses a great risk to your customers. Often, companies amass large amounts of sensitive personal data, including social security numbers, driver&#8217;s license numbers, credit card information, and more in dispersed persistent storage. Assess your customers\u2019 security risks and help them reduce exposure to attack and to regulatory violations.<\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/risk-intelligence\"><b>Security Assessment<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/risk-intelligence\">SolarWinds Risk Intelligence<\/a>\u00a0roots out sensitive data across networks and devices, revealing potential vulnerabilities and providing actionable insights for sensitive data protection, so you can mitigate the risk. When you are ready to tackle even more, Risk Intelligence is capable of further powerful and broad vulnerability and risk assessments.<\/p>\n<p>Find your security sweet spot with Security Essentials from SolarWinds MSP, a leader in MSP technology and a leading provider of security solutions to MSPs and their customers globally.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Cindy Blake is the security solutions lead at SolarWinds MSP.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><b>Talk to a SolarWinds MSP sales associate today and ask them to help you get started with Security Essentials. It\u2019s fast, easy and affordable.\u00a0<\/b><\/p>\n<p><b>Already a SolarWinds MSP customer? Talk to your customers about the Security Essentials.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You wouldn\u2019t expect locking your car to be the ultimate security deterrent for car thieves, so why are you leaving customers\u2019 networks without adequate protection?<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6085","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Security Sweet Spot for MSPs - N-able<\/title>\n<meta name=\"description\" content=\"You wouldn\u2019t expect locking your car to be the ultimate security deterrent for car thieves, so why are you leaving customers\u2019 networks without adequate protection?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Security Sweet Spot for MSPs - N-able\" \/>\n<meta property=\"og:description\" content=\"You wouldn\u2019t expect locking your car to be the ultimate security deterrent for car thieves, so why are you leaving customers\u2019 networks without adequate protection?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-21T23:54:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T22:56:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"The Security Sweet Spot for MSPs\",\"datePublished\":\"2018-02-21T23:54:09+00:00\",\"dateModified\":\"2021-04-08T22:56:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps\"},\"wordCount\":998,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps\",\"name\":\"The Security Sweet Spot for MSPs - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg\",\"datePublished\":\"2018-02-21T23:54:09+00:00\",\"dateModified\":\"2021-04-08T22:56:44+00:00\",\"description\":\"You wouldn\u2019t expect locking your car to be the ultimate security deterrent for car thieves, so why are you leaving customers\u2019 networks without adequate protection?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Security Sweet Spot for MSPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Security Sweet Spot for MSPs - N-able","description":"You wouldn\u2019t expect locking your car to be the ultimate security deterrent for car thieves, so why are you leaving customers\u2019 networks without adequate protection?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps","og_locale":"it_IT","og_type":"article","og_title":"The Security Sweet Spot for MSPs - N-able","og_description":"You wouldn\u2019t expect locking your car to be the ultimate security deterrent for car thieves, so why are you leaving customers\u2019 networks without adequate protection?","og_url":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2018-02-21T23:54:09+00:00","article_modified_time":"2021-04-08T22:56:44+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"The Security Sweet Spot for MSPs","datePublished":"2018-02-21T23:54:09+00:00","dateModified":"2021-04-08T22:56:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps"},"wordCount":998,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg","articleSection":["Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps","url":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps","name":"The Security Sweet Spot for MSPs - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg","datePublished":"2018-02-21T23:54:09+00:00","dateModified":"2021-04-08T22:56:44+00:00","description":"You wouldn\u2019t expect locking your car to be the ultimate security deterrent for car thieves, so why are you leaving customers\u2019 networks without adequate protection?","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/02\/carsecurity.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/security-sweet-spot-msps#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"The Security Sweet Spot for MSPs"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=6085"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6085\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=6085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}