{"id":6395,"date":"2019-04-15T22:36:34","date_gmt":"2019-04-15T21:36:34","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6395"},"modified":"2024-03-04T16:18:22","modified_gmt":"2024-03-04T16:18:22","slug":"ipsec-vs-ssl","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl","title":{"rendered":"Difference Between IPsec and SSL"},"content":{"rendered":"<p>In recent decades, remote work has become a central part of America\u2019s business landscape. Being able to complete tasks outside the office leads to greater productivity and flexibility, which is why working remotely has been embraced by more employers each year. For remote work to be effective, employees must have access to their company\u2019s network wherever they travel. A virtual private network (VPN) serves this function.\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-vpn-works\" target=\"_blank\" rel=\"noopener\">Using a VPN<\/a>, remote team members can connect directly to the network, performing tasks just as they would while in the office. VPNs also encrypt data to ensure remote access is secure. Clearly, setting up a VPN is a common request from businesses that managed services provider (MSPs) should know how to address.<\/p>\n<p>But there\u2019s more to the story. There are two main types of VPN security protocols, IPsec and SSL, and it\u2019s essential to know the differences between them in order to ensure your customer\u2019s security. In this article, we\u2019ll explain the difference between<b>\u00a0<\/b>IPsec and SSL VPN protocols and how to choose the right one to meet your clients\u2019 needs.<\/p>\n<hr \/>\n<p><strong>Set your sights on the future of the MSP industry with the first ever <a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\">MSP Horizons Report<\/a>, jointly produced by N\u2011able and international MSP-focused research firm, Canalys\u2026<\/strong><br \/>\n<a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" alt=\"\" width=\"1049\" height=\"443\" class=\"alignnone size-full wp-image-52700\" srcset=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg 1049w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-300x127.jpg 300w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-1024x432.jpg 1024w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-768x324.jpg 768w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-700x296.jpg 700w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/a><\/p>\n<hr \/>\n<h2><b>What is IPsec?<\/b><\/h2>\n<p>Internet Protocol Security (IPsec) is the traditional VPN method. Introduced in the 1990s, it is well established, regularly updated, and continues to be widely used. IPsec requires third-party client software on the user\u2019s device to access the VPN\u2014it is not implemented through the web browser. Companies need to purchase client software, install it on each user\u2019s computer, keep it updated, and sometimes pay to maintain their license. This makes IPsec rather complicated to implement and configure.<\/p>\n<h2><b>What is the purpose of IPsec?<\/b><\/h2>\n<p>The purpose of IPsec is to give the remote computer direct access to the central network, making it a full member. Remote users have access to any file storage locations, programs, printers, and backups, exactly as if they were in the office. IPsec is therefore a robust system that gives users whatever resources they need, wherever they are located.<\/p>\n<h2><b>What does IPsec protect against?<\/b><\/h2>\n<p>Security is<a href=\"https:\/\/www.n-able.com\/blog\/securing-your-remote-access-are-you-managing-logins-effectively\" target=\"_blank\" rel=\"noopener\">\u00a0<\/a>a key factor to consider when\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/securing-your-remote-access-are-you-managing-logins-effectively\">implementing remote access<\/a>. The more outside connections there are to a network, the more opportunities arise for nefarious parties to intercept data being transmitted. That\u2019s why IPsec protocols use encryption. IPsec encryption works by scrambling data in transit so it cannot be deciphered if intercepted. Data can only be read if the user has the correct key to mathematically unscramble it. VPNs also mask a user\u2019s Internet Protocol (IP) address for further security. The VPN assigns a new IP address, hiding the user\u2019s original address and making it harder for an internet service provider to track them.<\/p>\n<p>VPN access is protected by a password. It\u2019s essential for users to select strong passwords with combinations of letters and numbers, upper- and lowercase, special characters, and no dictionary words. The most locked-down systems won\u2019t let users choose a weak password. Two-factor authentication (2FA) makes VPNs even more secure. This method requires a one-time code\u2014sent via text message or generated by a mobile app\u2014in addition to the password to log in. Even if a hacker discovers the password, he or she won\u2019t be able to access the VPN without the second code.<\/p>\n<p>Yet IPsec has additional security advantages besides encryption. Since it requires special client software, it is more difficult to break into. Potential hackers would need to know the right software to use\u00a0<em>and<\/em>\u00a0configure it with the correct settings in order to access an IPsec VPN.<\/p>\n<p>IPsec has two modes of securing data: transport and tunnel. In transport mode, only the payload of an IP packet (that is, the data itself) is encrypted; the header remains intact. In tunnel mode, on the other hand, the entire packet is encrypted and then encapsulated in a new IP packet with a new header. The choice of which mode to use is complicated. Tunnel mode is typically used between gateways whereas transport mode is used between end-stations.<a href=\"https:\/\/www.solarwindsmsp.com\/contact\" target=\"_blank\" rel=\"noopener\">\u00a0<\/a><\/p>\n<h2><b>What is SSL?<\/b><\/h2>\n<p><a href=\"https:\/\/www.n-able.com\/blog\/tls-vs-ssl-whats-difference\">Secure Sockets Layer (SSL)<\/a>\u00a0is IPsec\u2019s major rival as a VPN protocol. Though its origins also trace to the 1990s, SSL is a more recent method for implementing VPNs, and it is becoming increasingly popular. The SSL protocol was replaced by a successor technology, Transport Layer Security (TLS), in 2015, but the terms are interchangeable in common parlance and \u201cSSL\u201d is still widely used.<\/p>\n<p>SSL VPNs are implemented through the remote user\u2019s web browser and do not require the installation of special software. All major web browsers\u2014including Chrome, Firefox, Internet Explorer, and Safari\u2014come with SSL support. This makes SSL easy to set up and use, especially when a team member is installing it without help from tech support.<\/p>\n<h2><b>How secure is SSL?<\/b><\/h2>\n<p>SSL gives users more specific access than IPsec. Rather than becoming a full member of the network, remote team members are granted access to particular applications. This makes it simple to provide different levels of access to different users. Security is maintained by restricting access to only what\u2019s needed.<\/p>\n<p>Like IPsec, SSL has two modes. In portal mode, users access the VPN through a page in their web browser (the portal). This mode can only be used for web-based programs. It\u2019s ideal for email, chat, file sharing, and other browser-based applications. In tunnel mode, by contrast, users can access any applications on the network, including ones that are not web based. Browser-based applications are becoming the industry standard, but older, offline programs can only be accessed using tunnel mode.<\/p>\n<h2><b>What is the difference between IPsec and SSL VPNs?<\/b><\/h2>\n<p>Choosing between IPsec vs SSL is an important decision when implementing a client\u2019s VPN. As you can see, each type has its own advantages and disadvantages. Security and convenience are two key factors to consider. Because IPsec requires third-party client software, it is more complicated and expensive to set up and maintain. However, this also makes it more secure. It\u2019s tough for a hacker to penetrate an IPsec system without knowing which client it uses and the exact settings to get that client to work properly. SSL is already supported by the remote user\u2019s browser, so it needs no extra software and is simpler to configure. This simplicity, however, comes at the cost of being more vulnerable to security threats.<\/p>\n<p>Once a user is logged into the network, SSL takes the upper hand in security. SSL VPNs work by accessing specific applications whereas IPsec users are treated as full members of the network. It\u2019s therefore easier to restrict user access with SSL. If one of your clients works with a freelance employee, for example, they can give that person limited access to the programs they need without letting them see sensitive or proprietary company data. Restricting access in IPsec is possible with network user permissions, but that adds an extra step to the process.<\/p>\n<p>Beyond security concerns, it\u2019s also crucial to think about what services VPN users will need to access. If they will only be using web-based applications like email and cloud storage, SSL may be the right choice. Remote users can quickly connect to the applications they use without being confused by the ones they don\u2019t. This makes SSL ideal for clients and freelance employees. But if users require full access\u2014such as central office team members who are traveling\u2014IPsec is the way to go. IPsec VPNs give users the ability to do whatever they can normally do while sitting in the main office from wherever they are.<\/p>\n<p>Don\u2019t forget that even a user on an IPsec or SSL VPN with ironclad encryption is still vulnerable to other security threats. Email phishing or phone-based social engineering attacks can strike a secure system at any time. That\u2019s why it\u2019s essential your clients provide their employees with mandatory, regular, and up-to-date security training. Knowing not to click on a suspicious link in an email or reveal a password over the phone is the first line of defense for maintaining a secure environment.<\/p>\n<p>These are only some of the factors to consider when thinking about SSL vs. IPsec VPNs. IPsec is a time-tested system, while SSL is growing increasingly common. Each protocol has its strengths and weaknesses. MSPs will need to decide which solution is right for each client\u2019s individual needs.<\/p>\n<p><b>SolarWinds MSP is here to help. Interested in learning more about IPsec vs. SSL?\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/contact\" target=\"_blank\" rel=\"noopener\">Contact our team<\/a>\u00a0to get additional ITSM resources.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent decades, remote work has become a central part of America\u2019s business landscape. Being able to complete tasks outside the office leads to greater productivity and flexibility, which is&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6395","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IPsec vs. SSL: What&#039;s the Difference? - N-able<\/title>\n<meta name=\"description\" content=\"Curious about the difference between IPsec and SSL VPN protocols? Here\u2019s how these protocols work to protect customer data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPsec vs. SSL: What&#039;s the Difference? - N-able\" \/>\n<meta property=\"og:description\" content=\"Curious about the difference between IPsec and SSL VPN protocols? Here\u2019s how these protocols work to protect customer data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-15T21:36:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-04T16:18:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Difference Between IPsec and SSL\",\"datePublished\":\"2019-04-15T22:36:34+01:00\",\"dateModified\":\"2024-03-04T16:18:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl\"},\"wordCount\":1449,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl\",\"name\":\"IPsec vs. SSL: What's the Difference? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"datePublished\":\"2019-04-15T22:36:34+01:00\",\"dateModified\":\"2024-03-04T16:18:22+00:00\",\"description\":\"Curious about the difference between IPsec and SSL VPN protocols? Here\u2019s how these protocols work to protect customer data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Difference Between IPsec and SSL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IPsec vs. SSL: What's the Difference? - N-able","description":"Curious about the difference between IPsec and SSL VPN protocols? Here\u2019s how these protocols work to protect customer data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl","og_locale":"it_IT","og_type":"article","og_title":"IPsec vs. SSL: What's the Difference? - N-able","og_description":"Curious about the difference between IPsec and SSL VPN protocols? Here\u2019s how these protocols work to protect customer data.","og_url":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-04-15T21:36:34+00:00","article_modified_time":"2024-03-04T16:18:22+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Difference Between IPsec and SSL","datePublished":"2019-04-15T22:36:34+01:00","dateModified":"2024-03-04T16:18:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl"},"wordCount":1449,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","articleSection":["Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl","url":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl","name":"IPsec vs. SSL: What's the Difference? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","datePublished":"2019-04-15T22:36:34+01:00","dateModified":"2024-03-04T16:18:22+00:00","description":"Curious about the difference between IPsec and SSL VPN protocols? Here\u2019s how these protocols work to protect customer data.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/ipsec-vs-ssl#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Difference Between IPsec and SSL"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=6395"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6395\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=6395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}