{"id":67098,"date":"2025-05-28T10:25:19","date_gmt":"2025-05-28T09:25:19","guid":{"rendered":"https:\/\/www.n-able.com\/?p=67098"},"modified":"2025-11-20T13:56:19","modified_gmt":"2025-11-20T13:56:19","slug":"building-a-scalable-security-program-for-msps-balancing-standardization-and-customization","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization","title":{"rendered":"Building a Scalable Security Program for MSPs: Balancing Standardization and Customization"},"content":{"rendered":"<p style=\"text-align: center;\"><em>These insights are drawn from a recent podcast, <\/em><a href=\"https:\/\/www.youtube.com\/watch?v=WnrOjMwhhVg\" target=\"_blank\" rel=\"noopener\"><em>Selling Security: How MSPs Can Drive Cybersecurity Revenue and Protect Their Customers.<\/em><\/a><\/p>\n<p>One big challenge facing MSPs when offering cybersecurity solutions to customers is balancing standardization with customization. Every customer has unique business needs, budgets, and risk tolerance, yet a completely bespoke approach can be unmanageable at scale and lead to inefficiencies, security gaps, and profit erosion.<\/p>\n<p>A standardized, layered security approach provides consistency, scalability, and, most importantly, enhanced security for both the MSP and its customers. However, standardization alone is not enough. Successfully selling and marketing security services requires a structured go-to-market strategy that educates customers on their risk exposure and presents security as a business necessity rather than an optional add-on.<\/p>\n<p>This blog will outline how MSPs can build a scalable security program and implement a proven sales strategy to drive customer adoption and recurring revenue growth.<\/p>\n<h2><strong>The Importance of Standardization in Security<\/strong><\/h2>\n<p>For many MSPs, the temptation to customize security offerings for each customer is understandable. Every business operates differently, and it\u2019s natural to want to tailor solutions to specific needs. However, bespoke security programs introduce several risks:<\/p>\n<ul>\n<li>Operational inefficiencies \u2013 Managing multiple different security stacks for various customers increases complexity and makes support and troubleshooting more difficult.<\/li>\n<li>Inconsistent protection levels \u2013 Customers who opt out of certain security services may introduce vulnerabilities that put both themselves and the MSP at risk.<\/li>\n<li>Lower profitability \u2013 A la carte security services often lead to inconsistent revenue streams and pricing challenges.<\/li>\n<\/ul>\n<p>By contrast, a standardized security stack ensures that every customer receives a minimum baseline of protection. This approach enables MSPs to:<\/p>\n<ul>\n<li>Streamline service delivery, reducing the cost and time required for management.<\/li>\n<li>Improve security outcomes by ensuring all customers have essential cybersecurity protections.<\/li>\n<li>Establish predictable recurring revenue models by selling security as a mandatory component of service offerings.<\/li>\n<\/ul>\n<h2><strong>How to Build a Scalable Security Program<\/strong><\/h2>\n<p>A well-structured security program should follow a layered approach that aligns with established frameworks such as the <a href=\"https:\/\/www.n-able.com\/blog\/nist-framework-cybersecurity\" target=\"_blank\" rel=\"noopener\">NIST Cybersecurity Framework<\/a>. Here\u2019s how MSPs can design their security offerings:<\/p>\n<p><strong>1. Establish a Baseline Security Package<\/strong><\/p>\n<p>Every customer should receive a minimum level of protection. A baseline Essentials Security Package should include:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">Endpoint detection and response (EDR)<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">Multi-factor authentication (MFA)<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/products\/dns-filtering\" target=\"_blank\" rel=\"noopener\">DNS filtering<\/a> and web security<\/li>\n<li><a href=\"https:\/\/www.n-able.com\/products\/mail-assure\" target=\"_blank\" rel=\"noopener\">Email security<\/a> (anti-phishing, spam filtering)<\/li>\n<li><a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection\" target=\"_blank\" rel=\"noopener\">Backup and disaster recovery<\/a> (BDR)<\/li>\n<li>Basic security awareness training<\/li>\n<li>Regular vulnerability assessments<\/li>\n<\/ul>\n<p><strong>2. Offer an Advanced Security Tier<\/strong><\/p>\n<p>For customers requiring more comprehensive protection \u2013 such as those in regulated industries \u2013 a premium security package should include:<\/p>\n<ul>\n<li>24\/7 security operations center (SOC) monitoring<\/li>\n<li>Managed detection and response (MDR)<\/li>\n<li>Threat intelligence and proactive threat hunting<\/li>\n<li>Compliance reporting (HIPAA, PCI-DSS, NIST, etc.)<\/li>\n<li>Security policy development and enforcement<\/li>\n<\/ul>\n<p><strong>3. Avoid Selling Security as an Option<\/strong><\/p>\n<p>Security should be bundled into standard managed services packages rather than sold as an optional add-on. Positioning security as an indispensable component of IT services helps:<\/p>\n<ul>\n<li>Reduce customer pushback on pricing.<\/li>\n<li>Increase overall adoption and cybersecurity resilience.<\/li>\n<li>Enhance trust by positioning the MSP as a proactive security partner.<\/li>\n<\/ul>\n<p><strong>4. Selling Security: A Step-by-Step Go-To-Market Strategy<\/strong><\/p>\n<p>Even with a strong security program in place, many MSPs struggle with the sales and marketing side of cybersecurity. Customers may not fully understand the risks they face or may perceive cybersecurity as an unnecessary expense; until it\u2019s too late.<\/p>\n<p>To address this, MSPs must implement a structured sales process that educates customers and clearly communicates the value of cybersecurity services.<\/p>\n<h2>Implement a structured sales process<\/h2>\n<h3><strong>Step 1: Define Your Target Audience<\/strong><\/h3>\n<p>Segment your customer base into:<\/p>\n<ul>\n<li>High-risk industries (financial services, healthcare, legal, etc.)<\/li>\n<li>Existing managed services customers who have minimal security coverage<\/li>\n<li>Prospective customers who rely on break\/fix IT support<\/li>\n<\/ul>\n<p>By understanding where your best opportunities exist, you can tailor your messaging accordingly.<\/p>\n<h3><strong>Step 2: Identify Pain Points and Security Gaps<\/strong><\/h3>\n<p>Instead of leading with technical features, focus on business risks and compliance needs:<\/p>\n<ul>\n<li>\u201cHow would your business recover from a ransomware attack?\u201d<\/li>\n<li>\u201cAre you confident you\u2019d pass a cybersecurity audit?\u201d<\/li>\n<li>\u201cIf an employee clicks on a phishing email, how quickly can you respond?\u201d<\/li>\n<\/ul>\n<p>Using real-world scenarios helps customers understand the impact of security vulnerabilities.<\/p>\n<h3><strong>Step 3: Create Marketing and Awareness Campaigns<\/strong><\/h3>\n<p>To generate interest and build a sales pipeline, leverage multiple marketing channels:<\/p>\n<ul>\n<li>Educational content: Blog posts, whitepapers, and webinars on cybersecurity trends.<\/li>\n<li>Email campaigns: Targeted messaging that highlights security gaps and solutions.<\/li>\n<li>Social media engagement: Share cybersecurity tips and customer success stories.<\/li>\n<li>In-person or virtual events: \u201cLunch and Learn\u201d sessions or cybersecurity workshops.<\/li>\n<\/ul>\n<p>N&#8209;able\u2019s <a href=\"https:\/\/your.marketbuilder.n-able.com\/#\/page\/nme-sso-login\" target=\"_blank\" rel=\"noopener\">MarketBuilder<\/a> provides MSPs with ready-to-use marketing materials, including customizable campaigns, email templates, and social media posts.<\/p>\n<p><strong>MarketBuilder is a resource that is included as part of your N\u2011able product subscription and contains content and campaigns that can help you attract new customers, and retain your existing ones. If you\u2019re an N\u2011able customer, you can <\/strong><a href=\"https:\/\/your.marketbuilder.n-able.com\/?_gl=1*17arx65*_gcl_au*MTM0NTExMzk3MS4xNzI0MDc3OTQ1&amp;_ga=2.174616484.782221172.1731340297-1413747435.1684775263#\/page\/nme-sso-login\" target=\"_blank\" rel=\"noopener\"><strong>sign up for MarketBuilder now<\/strong><\/a><strong>.<\/strong><\/p>\n<h3><strong>Step 4: Conduct Security Assessments and Risk Reports<\/strong><\/h3>\n<p>One of the most effective sales strategies is offering a free or low-cost cybersecurity risk assessment. This helps:<\/p>\n<ul>\n<li>Demonstrate expertise and uncover vulnerabilities.<\/li>\n<li>Provide tangible data that supports security recommendations.<\/li>\n<li>Create a sense of urgency for customers to act.<\/li>\n<\/ul>\n<p>Use reports and visuals to show risk scores, potential financial impacts, and compliance gaps.<\/p>\n<h2><strong>Step 5: Overcome Objections and Close the Sale<\/strong><\/h2>\n<p>Common objections include cost concerns, lack of perceived risk, and fear of change. Combat these by:<\/p>\n<ul>\n<li>Positioning <a href=\"https:\/\/www.n-able.com\/blog\/building-a-resilient-business-why-cybersecurity-is-key-to-long-term-success\" target=\"_blank\" rel=\"noopener\">cybersecurity as a business continuity investment<\/a> \u2013 A cyberattack\u2019s cost far exceeds proactive security measures.<\/li>\n<li>Highlighting compliance and insurance requirements \u2013 Many industries mandate security protections, and cyber liability insurance providers require baseline security controls.<\/li>\n<li>Providing flexible pricing models \u2013 Offer tiered security packages and financing options.<\/li>\n<\/ul>\n<h2><strong>Secure, Standardize, and Sell<\/strong><\/h2>\n<p>A scalable security program is not just about technology, it\u2019s about building trust and demonstrating value. Standardizing security offerings helps MSPs streamline service delivery while ensuring consistent protection across all customers. At the same time, implementing a structured sales and marketing strategy ensures that customers understand the <a href=\"https:\/\/www.n-able.com\/blog\/how-msps-can-communicate-the-value-of-cybersecurity-to-their-clients\" target=\"_blank\" rel=\"noopener\">importance of cybersecurity<\/a> and are willing to invest in it.<\/p>\n<p>By following these best practices, MSPs can create a profitable, scalable security business that delivers both protection and peace of mind to their customers.<\/p>\n<p>For more insights on selling security services, watch the full episode of Beyond the Horizon podcast: Selling Security Effectively as an MSP <a href=\"https:\/\/www.youtube.com\/watch?v=WnrOjMwhhVg&amp;list=PLbQNWS_ICkw2D7kCOA5lXFptKmwNZYjpY&amp;index=10&amp;t=35s\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><em>Stefanie Hammond is Head Sales and Marketing Nerd at N\u2011able. You can follow her on <\/em><a href=\"https:\/\/www.linkedin.com\/in\/stefanie-hammond\" target=\"_blank\" rel=\"noopener\"><em>LinkedIn<\/em><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how MSPs can balance standardization and customization to build scalable security programs and drive customer adoption.<\/p>\n","protected":false},"author":64,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-67098","post","type-post","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Building a Scalable Security Program for MSPs: Balancing Standardization and Customization - N-able<\/title>\n<meta name=\"description\" content=\"Learn how MSPs can balance standardization and customization to build scalable security programs and drive customer adoption.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building a Scalable Security Program for MSPs: Balancing Standardization and Customization - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn how MSPs can balance standardization and customization to build scalable security programs and drive customer adoption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-28T09:25:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T13:56:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/05\/040125_BB_Scalable-Security-Program_PD_Final_1200x628-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefanie Hammond\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefanie Hammond\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization\"},\"author\":{\"name\":\"Stefanie Hammond\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/5dd562750a462fbf021a62a3347250c8\"},\"headline\":\"Building a Scalable Security Program for MSPs: Balancing Standardization and Customization\",\"datePublished\":\"2025-05-28T10:25:19+01:00\",\"dateModified\":\"2025-11-20T13:56:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization\"},\"wordCount\":1070,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization\",\"name\":\"Building a Scalable Security Program for MSPs: Balancing Standardization and Customization - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2025-05-28T10:25:19+01:00\",\"dateModified\":\"2025-11-20T13:56:19+00:00\",\"description\":\"Learn how MSPs can balance standardization and customization to build scalable security programs and drive customer adoption.\",\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/5dd562750a462fbf021a62a3347250c8\",\"name\":\"Stefanie Hammond\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"caption\":\"Stefanie Hammond\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Building a Scalable Security Program for MSPs: Balancing Standardization and Customization - N-able","description":"Learn how MSPs can balance standardization and customization to build scalable security programs and drive customer adoption.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization","og_locale":"pt_BR","og_type":"article","og_title":"Building a Scalable Security Program for MSPs: Balancing Standardization and Customization - N-able","og_description":"Learn how MSPs can balance standardization and customization to build scalable security programs and drive customer adoption.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-05-28T09:25:19+00:00","article_modified_time":"2025-11-20T13:56:19+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/05\/040125_BB_Scalable-Security-Program_PD_Final_1200x628-scaled.jpg","type":"image\/jpeg"}],"author":"Stefanie Hammond","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Stefanie Hammond","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization"},"author":{"name":"Stefanie Hammond","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/5dd562750a462fbf021a62a3347250c8"},"headline":"Building a Scalable Security Program for MSPs: Balancing Standardization and Customization","datePublished":"2025-05-28T10:25:19+01:00","dateModified":"2025-11-20T13:56:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization"},"wordCount":1070,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization","url":"https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization","name":"Building a Scalable Security Program for MSPs: Balancing Standardization and Customization - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2025-05-28T10:25:19+01:00","dateModified":"2025-11-20T13:56:19+00:00","description":"Learn how MSPs can balance standardization and customization to build scalable security programs and drive customer adoption.","inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/building-a-scalable-security-program-for-msps-balancing-standardization-and-customization"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/5dd562750a462fbf021a62a3347250c8","name":"Stefanie Hammond","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","caption":"Stefanie Hammond"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/67098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=67098"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/67098\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=67098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}