{"id":177,"date":"2018-01-07T11:19:49","date_gmt":"2018-01-07T11:19:49","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=177"},"modified":"2021-09-23T06:30:19","modified_gmt":"2021-09-23T06:30:19","slug":"why-cloud-providers-should-partner-with-third-parties-to-offer-secaas","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/","title":{"rendered":"Why Cloud Providers Should Partner with Third Parties to Offer SECaaS"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Today\u2019s businesses face an IT environment where proprietary information and confidential client data must be secured against ever-escalating attacks and evolving vulnerabilities. At the same time, employees can now work from anywhere using mobile devices that access company data and malicious threats (from device theft to hacking to ransomware) loom large with their potential to expose that sensitive information. These threats are concerning for businesses of all sizes and across all industries \u2014 <\/span><a href=\"https:\/\/www.varinsights.com\/doc\/cloud-based-security-services-every-msp-needs-offer-0001\"><span style=\"font-weight: 400;\">especially in healthcare and finance where laws and regulations like HIPAA and FINRA require data security diligence<\/span><\/a><span style=\"font-weight: 400;\"> backed by requirements with substantial fines and penalties.<\/span><\/p>\n<p><!--more--><\/p>\n<p><i><span style=\"font-weight: 400;\">Demand &amp; Expectations from Clients<\/span><\/i><i><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">As a consequence more and more <a href=\"https:\/\/www.tsfactory.com\/forums\/technicalservice\/\">managed service providers, cloud providers and other technical services are partnering with third parties to offer security as a service to their clients<\/a> &#8212; often because existing clients are clamoring for security offerings that go beyond firewalls and antivirus software. In many cases, <\/span><a href=\"http:\/\/searchcloudprovider.techtarget.com\/feature\/Managed-IT-security-services-firms-resell-cloud-based-offerings\"><span style=\"font-weight: 400;\">these partnerships are helping Cloud Providers and others in the channel stay relevant<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Businesses that have faced the devastating harm of a data breach or ransomware know data security is no place to cut corners and all possible measures should be taken to avoid such an outcome. Cloud-based security services, as delivered by Cloud Providers, are increasingly providing essential value to clients with sensitive data and the need for more flexibility than is available with on-premises security solutions.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">For Cloud Providers, this means implementing services that extend security protection when data is distributed and under conditions that make it vulnerable. This strategy, therefore, must be holistic and provide protection against emerging threats to ensure data is robustly defended.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Lucrative Opportunities<\/span><\/i><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">There are huge opportunities for channel partners to capitalize on security services. The global managed security services market is expected to reach $29.9 billion by 2020, <\/span><a href=\"http:\/\/searchcloudprovider.techtarget.com\/feature\/Managed-IT-security-services-firms-resell-cloud-based-offerings\"><span style=\"font-weight: 400;\">according to Allied Market Research<\/span><\/a><span style=\"font-weight: 400;\">. &#8220;Lack of capital and skilled IT resources needed to manage the data security are the major hindrances in protecting the information,&#8221; the firm noted. &#8220;Managed security services have emerged as [a] lucrative option for delivering security asset monitoring and management, threat intelligence research, detection and remediation, and risk and compliance management solutions on a shared basis to multiple clients.&#8221;<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The firm anticipates small and midsize businesses will lead the adoption of cloud-based managed IT security services due to cost constraints.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Employee Monitoring Software<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Many organizations think that just providing login credentials and limiting access permissions will ensure protection. Without a monitoring system in place, unauthorized access to internal data can easily occur. Many industries have data and employee monitoring requirements, requiring log collection and monitoring systems that provide an audit trail of all access and activity to sensitive business information. In addition, there are many other industry-specific regulations that cover fields from education to the US federal government.<\/span><\/p>\n<p><b>Why RecordTS?<\/b><b><br \/>\n<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.tsfactory.com\/forums\/technicalservice\/\">RecordTS captures remote desktop sessions for employee and contractor activity auditing<\/a>, allowing you to monitor access to published applications that contain sensitive or confidential information; for example medical patient records, customer information, or financial data.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Features include:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><b>Data Buffering:<\/b><span style=\"font-weight: 400;\"> Prepared for system failures by buffering session video when database connectivity becomes intermittent or goes offline.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Session Reliability:<\/b><span style=\"font-weight: 400;\"> Users see no session latency and experience downtime due to periods of high usage.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Security:<\/b><span style=\"font-weight: 400;\"> Man-in-the-middle design, it&#8217;s very hard for users to circumvent the recording process or know they are being recorded.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Native Storage Server:<\/b><span style=\"font-weight: 400;\"> up to 40x faster than SQL databases<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Export Stored Sessions: <\/b><span style=\"font-weight: 400;\">to a common video format for portability<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Universal Recorder: <\/b><span style=\"font-weight: 400;\">capable of recording multiple protocols concurrently<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<p><b>Why Partner With Us?<\/b><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Offer award-winning products designed for business users and IT professionals.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Easily scale up or down according to demand.<\/span><\/li>\n<li style=\"font-weight: 400;\">Generous discounts are available to MSPs &amp; Cloud Providers who purchase multiple licences.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you\u2019d like to know more, please get in touch with us today at <\/span><span style=\"font-weight: 400;\">sales@tsfactory.com\u00a0or visit us <a href=\"https:\/\/www.tsfactory.com\/forums\/technicalservice\/\">at our website<\/a>.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s businesses face an IT environment where proprietary information and confidential client data must be secured against ever-escalating attacks and evolving vulnerabilities. At the same time, employees can now work from anywhere using mobile devices that access company data and malicious threats (from device theft to hacking to ransomware) loom large with their potential to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":178,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[31,32],"class_list":["post-177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-cloud-providers","tag-secaas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Cloud Providers Should Partner with Third Parties to Offer SECaaS - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Cloud Providers Should Partner with Third Parties to Offer SECaaS - Blogs\" \/>\n<meta property=\"og:description\" content=\"Today\u2019s businesses face an IT environment where proprietary information and confidential client data must be secured against ever-escalating attacks and evolving vulnerabilities. At the same time, employees can now work from anywhere using mobile devices that access company data and malicious threats (from device theft to hacking to ransomware) loom large with their potential to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-07T11:19:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-23T06:30:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/air-atmosphere-beautiful-blue-531767-e1632378611901.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/\",\"name\":\"Why Cloud Providers Should Partner with Third Parties to Offer SECaaS - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/air-atmosphere-beautiful-blue-531767-e1632378611901.jpg\",\"datePublished\":\"2018-01-07T11:19:49+00:00\",\"dateModified\":\"2021-09-23T06:30:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/air-atmosphere-beautiful-blue-531767-e1632378611901.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/air-atmosphere-beautiful-blue-531767-e1632378611901.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Cloud Providers Should Partner with Third Parties to Offer SECaaS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Cloud Providers Should Partner with Third Parties to Offer SECaaS - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/","og_locale":"en_US","og_type":"article","og_title":"Why Cloud Providers Should Partner with Third Parties to Offer SECaaS - Blogs","og_description":"Today\u2019s businesses face an IT environment where proprietary information and confidential client data must be secured against ever-escalating attacks and evolving vulnerabilities. At the same time, employees can now work from anywhere using mobile devices that access company data and malicious threats (from device theft to hacking to ransomware) loom large with their potential to [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2018-01-07T11:19:49+00:00","article_modified_time":"2021-09-23T06:30:19+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/air-atmosphere-beautiful-blue-531767-e1632378611901.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/","name":"Why Cloud Providers Should Partner with Third Parties to Offer SECaaS - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/air-atmosphere-beautiful-blue-531767-e1632378611901.jpg","datePublished":"2018-01-07T11:19:49+00:00","dateModified":"2021-09-23T06:30:19+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/air-atmosphere-beautiful-blue-531767-e1632378611901.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/air-atmosphere-beautiful-blue-531767-e1632378611901.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-cloud-providers-should-partner-with-third-parties-to-offer-secaas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Why Cloud Providers Should Partner with Third Parties to Offer SECaaS"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=177"}],"version-history":[{"count":5,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/177\/revisions"}],"predecessor-version":[{"id":521,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/177\/revisions\/521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/178"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}