{"id":69365,"date":"2025-07-31T10:02:35","date_gmt":"2025-07-31T09:02:35","guid":{"rendered":"https:\/\/www.n-able.com\/?p=69365"},"modified":"2025-11-20T13:35:18","modified_gmt":"2025-11-20T13:35:18","slug":"edr-vs-xdr","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr","title":{"rendered":"EDR vs XDR: Why Endpoint Detection Alone Isn&#8217;t Enough Anymore"},"content":{"rendered":"<p><span>In the ever-evolving world of cybersecurity, the debate of\u00a0EDR vs. XDR\u00a0is no longer academic \u2013 it\u2019s strategic. Endpoint Detection and Response (EDR) was once the gold standard for threat detection. But as cyberattacks grow more sophisticated, targeting identities, cloud workloads, and supply chains, EDR alone is no longer enough. Organizations now face a critical decision: stick with endpoint-centric tools or evolve toward Extended Detection and Response (XDR), a model built for today\u2019s multi-vector threats.<\/span><\/p>\n<h2><strong>EDR vs. XDR: Understanding the Shift in Cyber Defense<\/strong><\/h2>\n<p><span>EDR was designed for a time when threats were simpler and environments more contained. It excels at detecting malicious activity on endpoints like laptops and servers. But modern attackers don\u2019t stop at the endpoint. They exploit stolen credentials, move laterally across hybrid networks, and infiltrate cloud environments \u2013 often without ever triggering an endpoint alert. This shift in tactics demands a broader, more integrated approach to detection and response.<\/span><\/p>\n<p><span>Recent data underscores this evolution:<\/span><\/p>\n<ul>\n<li><span>The <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">2025 Verizon Data Breach Investigations Report<\/a> found that 22% of breaches began with stolen credentials, and 88% of basic web app attacks involved credential theft.<\/span><\/li>\n<li><span><a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/report\/2025-threat-intelligence-index\" target=\"_blank\" rel=\"noopener\">IBM\u2019s X-Force<\/a> reports that valid account abuse now accounts for 30% of incidents.<\/span><\/li>\n<li><span><a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024\" target=\"_blank\" rel=\"noopener\">The 2024 ENISA Threat Landscape<\/a> highlights the rise of fileless malware and supply chain attacks, many of which bypass traditional endpoint defenses entirely.<\/span><\/li>\n<\/ul>\n<p><span>At the same time, the IT environment itself is becoming more complex. BetterCloud\u2019s <a href=\"https:\/\/www.bettercloud.com\/resources\/state-of-saas\/\" target=\"_blank\" rel=\"noopener\">2025\u00a0State of SaaS\u00a0Report<\/a> reveals that organizations now use an average of 106 software-as-a-service (SaaS) apps. <\/span>Alongside security, SaaS sprawl emerges as a great concern for IT professionals. <span>The rapid integration of AI into SaaS is fueling the growth of <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-shadow-it\" target=\"_blank\" rel=\"noopener\">Shadow IT<\/a> and Shadow AI, which means more scattered and unsanctioned tools that only amplify security and compliance challenges.<\/span><\/p>\n<p><span>This is where the distinction between EDR and Extended Detection and Response (XDR) becomes critical.<\/span><\/p>\n<ul>\n<li><strong><span>EDR<\/span><\/strong><span>\u00a0offers\u00a0<strong>deep visibility<\/strong>\u00a0into endpoint activity.<\/span><\/li>\n<li><strong><span>XDR<\/span><\/strong><span>, on the other hand, delivers\u00a0<strong>broad visibility<\/strong>\u00a0across endpoints, networks, cloud services, and SaaS applications \u2013 enabling security teams to detect and respond to threats wherever they emerge.<\/span><\/li>\n<\/ul>\n<h2><strong>The Difference Between EDR and XDR: Depth vs. Breadth<\/strong><\/h2>\n<p><span>Let\u2019s break down the\u00a0difference between EDR and XDR:<\/span><\/p>\n<table style=\"border: black 1px solid;\">\n<thead>\n<tr>\n<td width=\"20%\" style=\"border: black 1px solid; background-color: purple; padding-left: 5px; padding-right: 5px;\"><strong style=\"color: white;\">Feature<\/strong><\/td>\n<td width=\"40%\" style=\"border: black 1px solid; background-color: purple; padding-left: 5px; padding-right: 5px;\"><strong style=\"color: white;\">EDR<\/strong><\/td>\n<td width=\"40%\" style=\"border: black 1px solid; background-color: purple; padding-left: 5px; padding-right: 5px;\"><strong style=\"color: white;\">XDR<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Focus<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Endpoint-centric<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Cross-domain (endpoint, cloud, identity, email, network)<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Visibility<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Device-level<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Environment-wide<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Correlation<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Manual or limited<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Automated, AI-driven<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Response<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Endpoint-specific<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Coordinated across systems<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Use Case<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Detecting and responding to malware or suspicious behavior on devices<\/span><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><span>Detecting and responding to complex, multi-stage attacks<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span>While EDR remains essential for detecting endpoint threats, it lacks the context to understand how those threats connect to broader attack campaigns. XDR fills that gap by integrating telemetry from multiple sources and automating correlation and response.<\/span><\/p>\n<h2><strong>Why Fragmented Security Fails<\/strong><\/h2>\n<p><span>Security teams today are overwhelmed by siloed tools (e.g., EDR, SIEM, email gateways), identity platforms, and cloud logs. Each generates alerts, but none provides the full picture. This fragmentation delays response and increases risk.<\/span><\/p>\n<p><span>Without unified visibility, attackers slip through the cracks. Consider this scenario: A phishing email leads to credential theft. That credential is used to access a cloud workload. Sensitive data is exfiltrated \u2013 all before the EDR tool even raises a flag.<\/span><\/p>\n<p><span>This is where XDR shines \u2013 it addresses this by:<\/span><\/p>\n<ul>\n<li><span>Ingesting telemetry\u00a0from endpoints, cloud, identity, and network.<\/span><\/li>\n<li><span>Correlating signals\u00a0using AI and behavioral analytics.<\/span><\/li>\n<li><span>Automating response\u00a0across domains to reduce dwell time.<\/span><\/li>\n<\/ul>\n<p><span>But here\u2019s where EDR still plays a critical role:\u00a0after the breach.<\/span><\/p>\n<p><span>When an incident occurs, EDR becomes indispensable for\u00a0post-incident forensics. It provides detailed visibility into what happened on the endpoint \u2013 how the threat entered, what it executed, how it moved, and what systems were affected. This level of granularity is essential for root cause analysis, understanding the full scope of the breach, and applying lessons learned to prevent recurrence.<\/span><\/p>\n<p>This isn\u2019t just about more data \u2013 it\u2019s about better context. And context is what enables faster, smarter decisions.<\/p>\n<h2><strong>EDR vs. XDR in Practice<\/strong><\/h2>\n<h3><strong><span>What Security Leaders Must Ask<\/span><\/strong><\/h3>\n<p><span>Instead of asking, \u201cDo we need XDR?\u201d, security professionals should ask:<\/span><\/p>\n<ul>\n<li><span>Do we have real-time visibility across endpoints, identity, email, and cloud?<\/span><\/li>\n<li><span>Can we detect lateral movement or account compromise early?<\/span><\/li>\n<li><span>Are our tools integrated \u2013 or are we still operating in silos?<\/span><\/li>\n<li><span>Is our response workflow automated \u2013 or are we still routing incidents manually?<\/span><\/li>\n<li><span>And crucially:\u00a0Can we investigate and learn from incidents effectively?<\/span><\/li>\n<\/ul>\n<p><span>This last question is where EDR continues to prove its value. Even in an XDR-enabled environment, EDR provides the\u00a0granular endpoint telemetry\u00a0needed to reconstruct the attack timeline, identify patient zero, and understand how the threat propagated. These insights are vital not only for recovery but for strengthening defenses going forward.<\/span><\/p>\n<p><span>Ultimately, your answers to these questions define your cyber resilience posture \u2013 not just your tool stack.<\/span><\/p>\n<h3><strong><span>Actionable Steps for MSPs and Internal IT Teams<\/span><\/strong><\/h3>\n<p><span>It\u2019s important to keep in mind that not every organization has a dedicated SOC or a massive security budget. But that doesn\u2019t mean they\u2019re powerless. They can start building cyber resilience by: <\/span><\/p>\n<ul>\n<li><span>Unifying existing tools: Even basic integrations between EDR, email security, and identity providers can yield major visibility gains.<\/span><\/li>\n<li><span>Prioritizing identity: MFA, conditional access, and behavioral monitoring are high-impact, low-cost defenses.<\/span><\/li>\n<li><span>Automating playbooks: For common attacks, speed is everything.<\/span><\/li>\n<li><span>Outsourcing strategically: using MDR or managed XDR services to fill gaps without hiring a full team.<\/span><\/li>\n<\/ul>\n<p><span>For MSPs, this shift is both a challenge and an opportunity. Clients no longer want just antivirus and patching \u2013 they want real-time threat detection, identity protection, and cloud security. The MSPs that succeed will be those that deliver outcomes, not just tools.<\/span><\/p>\n<h2><strong>EDR Is the Foundation, XDR Is the Strategy<\/strong><\/h2>\n<p><span>EDR still has an important place in the modern security stack \u2013 but it\u2019s no longer enough to win the war on its own.<\/span><\/p>\n<p><span>If you\u2019re still treating EDR as your frontline defense, you\u2019re playing yesterday\u2019s game. The organizations that thrive will be those that treat security not as a stack of tools, but as a <a href=\"https:\/\/www.n-able.com\/blog\/key-components-every-sme-and-enterprise-needs-for-robust-cyber-defense\" target=\"_blank\" rel=\"noopener\">system of systems<\/a> \u2013 connected, contextual, and continuously evolving. The next wave of cybersecurity will be defined by\u00a0intelligence, integration, and identity-first design:<\/span><\/p>\n<ul>\n<li><span>AI-powered detection\u00a0will become table stakes.<\/span><\/li>\n<li><span>Behavioral analytics\u00a0will replace static rules, especially in identity and access management.<\/span><\/li>\n<li><span>Unified platforms\u00a0will replace fragmented toolsets.<\/span><\/li>\n<li><span>Resilience \u2013 not just prevention \u2013 will define success.<\/span><\/li>\n<\/ul>\n<p><span>The future belongs to those who think bigger \u2013 who build layered defenses, orchestrate response, and design for resilience.<\/span><\/p>\n<p><strong><span>EDR is the foundation. XDR is the strategy. Cyber resilience is the outcome.<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span>Would you like to discuss potential gaps you might have in your security portfolio? <\/span><\/strong><span><a href=\"https:\/\/www.n-able.com\/products\/adlumin-xdr\/contact\" target=\"_blank\" rel=\"noopener\"><strong>Speak to one of our security specialists<\/strong><\/a><strong>.<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><em><span>Emma Nistor is Senior Product Marketing Manager at N&#8209;able<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn the difference between EDR and XDR and why a layered security strategy is essential for lasting cyber resilience.<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-69365","post","type-post","status-publish","format-standard","hentry","topic-endpoint-detection-and-response","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EDR vs XDR: Why Endpoint Detection Alone Isn&#039;t Enough Anymore - N-able<\/title>\n<meta name=\"description\" content=\"Learn the difference between EDR and XDR and why a layered security strategy is essential for lasting cyber resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR vs XDR: Why Endpoint Detection Alone Isn&#039;t Enough Anymore - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn the difference between EDR and XDR and why a layered security strategy is essential for lasting cyber resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-31T09:02:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T13:35:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/07\/073025_BB_EDRvsXDR_Final_1200x628.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emma Nistor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Nistor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr\"},\"author\":{\"name\":\"Emma Nistor\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\"},\"headline\":\"EDR vs XDR: Why Endpoint Detection Alone Isn&#8217;t Enough Anymore\",\"datePublished\":\"2025-07-31T10:02:35+01:00\",\"dateModified\":\"2025-11-20T13:35:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr\"},\"wordCount\":1117,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr\",\"name\":\"EDR vs XDR: Why Endpoint Detection Alone Isn't Enough Anymore - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2025-07-31T10:02:35+01:00\",\"dateModified\":\"2025-11-20T13:35:18+00:00\",\"description\":\"Learn the difference between EDR and XDR and why a layered security strategy is essential for lasting cyber resilience.\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\",\"name\":\"Emma Nistor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"caption\":\"Emma Nistor\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EDR vs XDR: Why Endpoint Detection Alone Isn't Enough Anymore - N-able","description":"Learn the difference between EDR and XDR and why a layered security strategy is essential for lasting cyber resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr","og_locale":"it_IT","og_type":"article","og_title":"EDR vs XDR: Why Endpoint Detection Alone Isn't Enough Anymore - N-able","og_description":"Learn the difference between EDR and XDR and why a layered security strategy is essential for lasting cyber resilience.","og_url":"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-07-31T09:02:35+00:00","article_modified_time":"2025-11-20T13:35:18+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/07\/073025_BB_EDRvsXDR_Final_1200x628.jpg","type":"image\/jpeg"}],"author":"Emma Nistor","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Emma Nistor","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr"},"author":{"name":"Emma Nistor","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58"},"headline":"EDR vs XDR: Why Endpoint Detection Alone Isn&#8217;t Enough Anymore","datePublished":"2025-07-31T10:02:35+01:00","dateModified":"2025-11-20T13:35:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr"},"wordCount":1117,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr","url":"https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr","name":"EDR vs XDR: Why Endpoint Detection Alone Isn't Enough Anymore - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2025-07-31T10:02:35+01:00","dateModified":"2025-11-20T13:35:18+00:00","description":"Learn the difference between EDR and XDR and why a layered security strategy is essential for lasting cyber resilience.","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/edr-vs-xdr"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58","name":"Emma Nistor","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","caption":"Emma Nistor"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/69365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=69365"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/69365\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=69365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}