{"id":6278,"date":"2020-10-01T20:16:27","date_gmt":"2020-10-01T19:16:27","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6278"},"modified":"2024-08-07T17:42:29","modified_gmt":"2024-08-07T16:42:29","slug":"how-to-perform-network-audit","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit","title":{"rendered":"How to Perform a Network Audit: A Step-By-Step Guide"},"content":{"rendered":"<p>As businesses grow, they usually need to scale up their IT networks to accommodate new requirements and deliver a more extensive range of capabilities. Unfortunately, many businesses overlook appropriate management activities, performance optimization needs, and security measures.<\/p>\n<p>As a managed services provider (MSP), it\u2019s part of your job to ensure these things don\u2019t fall through the cracks. This guide will help you explain the importance of network audits to your customers, in addition to providing step-by-step instructions on how to perform them successfully.<\/p>\n<h2 class=\"h3\">What Is network auditing?<\/h2>\n<p>Network auditing refers to the process of gathering, analyzing, and studying network data, with the purpose of assessing the network\u2019s health. Network auditing gives businesses insight into how successful their network control and management operations are, particularly regarding both internal and external compliance regulations.<\/p>\n<p>Network auditing typically involves analyzing the following network components:<\/p>\n<ul>\n<li>Control implementation<\/li>\n<li>Availability<\/li>\n<li>Security<\/li>\n<li>Management<\/li>\n<li>Performance<\/li>\n<\/ul>\n<hr \/>\n<p><strong>Set your sights on the future of the MSP industry with the first ever <a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\">MSP Horizons Report<\/a>, jointly produced by N\u2011able and international MSP-focused research firm, Canalys\u2026<\/strong><br \/>\n<a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" alt=\"\" width=\"1049\" height=\"443\" class=\"alignnone size-full wp-image-52700\" srcset=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg 1049w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-300x127.jpg 300w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-1024x432.jpg 1024w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-768x324.jpg 768w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-700x296.jpg 700w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/a><\/p>\n<hr \/>\n<h2 class=\"h3\">Why Is network auditing important?<\/h2>\n<p>A network audit helps you gain visibility into any potential network issues, allowing them to be rectified before causing downtime or impacting business performance. Network audits and assessments also allow you to achieve the following:<\/p>\n<ul>\n<li>Minimize unknown variables within a client network<\/li>\n<li>Uncover new revenue opportunities by identifying new potential for selling managed IT services<\/li>\n<li>Help compliance with regulatory requirements and industry standards<\/li>\n<li>Produce concrete and informed plans so you can take action<\/li>\n<\/ul>\n<p>Undertaking other types of complex audits can help MSPs be more proactive in their efforts to maintain business continuity for their customers. These audits also open the opportunity for MSP companies to propose changes for customers that are likely to improve performance\u2014which can provide added value and increase customer satisfaction.<\/p>\n<h2 class=\"h3\">How to perform a network audit<\/h2>\n<p>A network audit entails collecting data, identifying threats and areas of weakness, and compiling a formal audit report. This report is then sent on to network administrators and other relevant parties. A network audit is usually performed by a network analyst, information system auditor, or another individual with a professional background in IT security and network management.<\/p>\n<p>The following steps are typical of a comprehensive network audit:<\/p>\n<ol>\n<li>Record the details of the audit<\/li>\n<li>Document all procedures and processes associated with the audit<\/li>\n<li>Review the procedure management system<\/li>\n<li>Assess the training logs and operations<\/li>\n<li>Confirm the security patches for network software are up-to-date<\/li>\n<li>Confirm the penetration testing policy and process is sufficient<\/li>\n<li>Test the software\u2019s components as comprehensively as possible<\/li>\n<li>Identify any firewall holes<\/li>\n<li>Ensure all sensitive or confidential data is stored separately and securely<\/li>\n<li>Encrypt the hard disks on any company laptops<\/li>\n<li>Check the security of your wireless networks<\/li>\n<li>Scan for and identify any unauthorized access points<\/li>\n<li>Review the event log monitoring process<\/li>\n<li>Compile a comprehensive report<\/li>\n<li>Send the final report to appropriate stakeholders and other key parties<\/li>\n<\/ol>\n<p>Keep in mind that while a network audit focuses on\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/types-of-network-security\" target=\"_blank\" rel=\"noopener\">network security<\/a>\u00a0and management, it also reviews the measures and operations that impact network quality of service, network availability, and network performance.<\/p>\n<h2 class=\"h3\">Important network audit parameters<\/h2>\n<p>Conducting a network audit is a crucial part of helping ensure the functionality and reliability of the enterprise network. If the network isn\u2019t treated as a priority, it is likely to underperform\u2014which will almost certainly result in unsatisfied customers. The following list guides you through the most important parameters of a network audit. When creating your network audit template, it is key that you include the following processes.<\/p>\n<h3 class=\"h4\">REVIEW YOUR BRING-YOUR-OWN-DEVICE (BYOD) POLICY<\/h3>\n<p>In a modern business environment, your employees will almost certainly bring their personal devices into work with them and connect to the network. This can lead to slower speeds, <a href=\"https:\/\/www.n-able.com\/blog\/how-to-check-bandwidth-usage\" target=\"_blank\" rel=\"noopener\">increased demand on\u00a0bandwidth<\/a>, and increased vulnerability to potential security threats. As such, managing this practice carefully is essential. That begins with creating clear and informed policies.<\/p>\n<p>Key challenges associated with creating a robust BYOD policy include exposure to unsecured networks, the presence of unknown hardware, and the use of unauthorized third-party programs. By reviewing your BYOD policy, you\u2019ll gain crucial insight into which devices are connecting to your network, the weaknesses associated with each of them, and who\u2019s responsible for each device. This awareness will help you control and reduce network exposure as much as you can.<\/p>\n<h3 class=\"h4\">REVIEW NETWORK CYBERSECURITY VULNERABILITIES<\/h3>\n<p><a href=\"https:\/\/www.n-able.com\/blog\/25-cybersecurity-bad-practices\" target=\"_blank\" rel=\"noopener\">Cybersecurity gaps<\/a> are vulnerabilities that are prone to exploitation by cybercriminals trying to access your network. These gaps can exist in several places, including your physical surroundings, software, and hardware. Some vulnerabilities can be rectified with minimal effort and time, but detecting and solving most weaknesses will require a professional network audit. Common vulnerabilities include poor password management, personal devices unknowingly connecting to your business network, and outdated patches.<\/p>\n<h3 class=\"h4\">REVIEW BANDWIDTH DEMANDS<\/h3>\n<p>Bandwidth is limited, so the way it\u2019s shared among your users should always be carefully considered. Bandwidth usage and distribution monitoring can help you determine whether you need to expand your network. It can also help you determine whether any individual applications or devices are experiencing bandwidth problems that need to be addressed.<\/p>\n<p>When you have a clear understanding of bandwidth usage, you\u2019ll have insight into which applications should and should not be prioritized, as well as where congestion is occurring. Managing your network traffic flow effectively can even help you boost the performance of your network.<\/p>\n<p>To correctly assess bandwidth demand, compare wired and wireless connections, as this will help you spot any bottlenecks. Network security scanning software or network monitoring software can help you gain a full understanding of which network elements you should prioritize.<\/p>\n<h2 class=\"h3\">Getting started with network monitoring software<\/h2>\n<p>If your customers are experiencing regular network failure, or you believe the network isn\u2019t performing as it should be, then there\u2019s no better time to undertake a network audit.\u00a0<a href=\"\/products\/rmm?promo=blog\" target=\"_blank\" rel=\"noopener\">N&#8209;able<sup>\u00ae<\/sup> N&#8209;sight RMM<\/a>\u00a0is an all-in-one solution that offers network monitoring software to help you efficiently secure, maintain, and improve your customers\u2019\u00a0IT systems. The centralized dashboard gives you access to out-of-the-box monitoring templates, patch management, managed antivirus, web protection, data-breach intelligence, and backup and recovery capabilities.<\/p>\n<p>The network security scanning software included in N&#8209;sight RMM supports and augments network audits by giving your MSP access to the tools necessary to monitor and report on the state of your enterprise network. A <a href=\"\/products\/rmm\/trial?promo=blog\" target=\"_blank\" rel=\"noopener\">30-day free trial is available here<\/a>\u00a0for MSPs interested in learning more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out how to perform a network audit and why auditing your network is so important for managed services providers (MSP).<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6278","post","type-post","status-publish","format-standard","hentry","topic-remote-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Perform a Network Audit: A Step-By-Step Guide - N-able<\/title>\n<meta name=\"description\" content=\"Find out how to perform a network audit and why auditing your network is so important for managed services providers (MSP).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Perform a Network Audit: A Step-By-Step Guide - N-able\" \/>\n<meta property=\"og:description\" content=\"Find out how to perform a network audit and why auditing your network is so important for managed services providers (MSP).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-01T19:16:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T16:42:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How to Perform a Network Audit: A Step-By-Step Guide\",\"datePublished\":\"2020-10-01T20:16:27+01:00\",\"dateModified\":\"2024-08-07T16:42:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit\"},\"wordCount\":1086,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"articleSection\":[\"Networking\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit\",\"name\":\"How to Perform a Network Audit: A Step-By-Step Guide - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"datePublished\":\"2020-10-01T20:16:27+01:00\",\"dateModified\":\"2024-08-07T16:42:29+00:00\",\"description\":\"Find out how to perform a network audit and why auditing your network is so important for managed services providers (MSP).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Networking\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/networking\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Perform a Network Audit: A Step-By-Step Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Perform a Network Audit: A Step-By-Step Guide - N-able","description":"Find out how to perform a network audit and why auditing your network is so important for managed services providers (MSP).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit","og_locale":"it_IT","og_type":"article","og_title":"How to Perform a Network Audit: A Step-By-Step Guide - N-able","og_description":"Find out how to perform a network audit and why auditing your network is so important for managed services providers (MSP).","og_url":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-10-01T19:16:27+00:00","article_modified_time":"2024-08-07T16:42:29+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How to Perform a Network Audit: A Step-By-Step Guide","datePublished":"2020-10-01T20:16:27+01:00","dateModified":"2024-08-07T16:42:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit"},"wordCount":1086,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","articleSection":["Networking"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit","url":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit","name":"How to Perform a Network Audit: A Step-By-Step Guide - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","datePublished":"2020-10-01T20:16:27+01:00","dateModified":"2024-08-07T16:42:29+00:00","description":"Find out how to perform a network audit and why auditing your network is so important for managed services providers (MSP).","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/how-to-perform-network-audit#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Networking","item":"https:\/\/www.n-able.com\/it\/blog\/category\/networking"},{"@type":"ListItem","position":2,"name":"How to Perform a Network Audit: A Step-By-Step Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=6278"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6278\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=6278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}