{"id":15912,"date":"2024-11-04T06:03:09","date_gmt":"2024-11-04T06:03:09","guid":{"rendered":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security.png"},"modified":"2025-01-09T06:49:13","modified_gmt":"2025-01-09T06:49:13","slug":"critical-components-of-unified-security","status":"inherit","type":"attachment","link":"https:\/\/www.esds.co.in\/blog\/how-to-secure-cloud-and-on-prem-environments-with-unified-defense\/critical-components-of-unified-security\/","title":{"rendered":"Critical-components-of-unified-security"},"author":81,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"web_stories_base_color":"#0956ca","web_stories_blurhash":"UdFP]_%K9HWBN+WCt7oc9KM|xsxtxvt6j=Rk","web_stories_cropped_origin_id":0,"web_stories_muted_id":0,"web_stories_optimized_id":0,"web_stories_poster_id":0,"web_stories_trim_data":{"original":0},"web_stories_is_gif":false},"web_story_media_source":[],"class_list":["post-15912","attachment","type-attachment","status-inherit","hentry"],"aioseo_notices":[],"web_stories_media_source":"","web_stories_is_muted":null,"featured_media_src":[],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security.png'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"147\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-300x147.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-300x147.png 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-1024x502.png 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-150x74.png 150w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"","media_type":"image","mime_type":"image\/png","media_details":{"width":1280,"height":628,"file":"2024\/11\/Critical-components-of-unified-security.png","filesize":535978,"sizes":{"medium":{"file":"Critical-components-of-unified-security-300x147.png","width":300,"height":147,"filesize":36569,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-300x147.png"},"large":{"file":"Critical-components-of-unified-security-1024x502.png","width":1024,"height":502,"filesize":370976,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-1024x502.png"},"thumbnail":{"file":"Critical-components-of-unified-security-150x74.png","width":150,"height":74,"filesize":10852,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-150x74.png"},"post-thumbnail-size":{"file":"Critical-components-of-unified-security-750x330.png","width":750,"height":330,"filesize":186842,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-750x330.png"},"round-personnel-size":{"file":"Critical-components-of-unified-security-400x400.png","width":400,"height":400,"filesize":130131,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-400x400.png"},"small-grid-size":{"file":"Critical-components-of-unified-security-400x300.png","width":400,"height":300,"filesize":99752,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-400x300.png"},"portrait":{"file":"Critical-components-of-unified-security-440x550.png","width":440,"height":550,"filesize":191682,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-440x550.png"},"post-slider-side":{"file":"Critical-components-of-unified-security-750x480.png","width":750,"height":480,"filesize":272656,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-750x480.png"},"full-slider":{"file":"Critical-components-of-unified-security-980x380.png","width":980,"height":380,"filesize":278235,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-980x380.png"},"portfolio-portrait":{"file":"Critical-components-of-unified-security-500x550.png","width":500,"height":550,"filesize":211362,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-500x550.png"},"blog-grid":{"file":"Critical-components-of-unified-security-700x400.png","width":700,"height":400,"filesize":213045,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-700x400.png"},"yarpp-thumbnail":{"file":"Critical-components-of-unified-security-120x120.png","width":120,"height":120,"filesize":15992,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-120x120.png"},"web-stories-poster-portrait":{"file":"Critical-components-of-unified-security-640x628.png","width":640,"height":628,"filesize":255233,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-640x628.png"},"web-stories-publisher-logo":{"file":"Critical-components-of-unified-security-96x96.png","width":96,"height":96,"filesize":10814,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-96x96.png"},"web-stories-thumbnail":{"file":"Critical-components-of-unified-security-150x74.png","width":150,"height":74,"filesize":10852,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security-150x74.png"},"full":{"file":"Critical-components-of-unified-security.png","width":1280,"height":628,"mime_type":"image\/png","source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security.png"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":15910,"source_url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2024\/11\/Critical-components-of-unified-security.png","_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/15912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=15912"}],"wp:term":[{"taxonomy":"web_story_media_source","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/web_story_media_source?post=15912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}