{"id":13794,"date":"2022-12-20T06:55:27","date_gmt":"2022-12-20T06:55:27","guid":{"rendered":"https:\/\/www.esds.co.in\/blog\/?p=13794"},"modified":"2023-06-01T10:44:55","modified_gmt":"2023-06-01T10:44:55","slug":"a-guide-to-understanding-the-difference-between-siem-and-soc-solution","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/","title":{"rendered":"A Guide to Understanding the Difference Between SIEM and SOC Solution"},"content":{"rendered":"\n<p style=\"text-align: justify;\">Do you feel overwhelmed with all the security acronyms floating around? SIEM and SOC are two of the most popular acronyms in the security world. But what do they mean and what is the difference between them? A SIEM (Security Information and Event Management) solution is a platform that collects, analyzes, and correlates security data from different sources. It helps organizations detect and respond to threats in a timely manner. On the other hand, a <strong><a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\" title=\"\">SOC (Security Operations Center)<\/a><\/strong> is a team of security professionals responsible for monitoring, analyzing, and responding to security incidents. In this guide, we&#8217;ll explain the main differences between a SIEM and SOC solution, so you can identify which one is the best fit for your organization.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/#What_is_a_SIEM_Solution\" >What is a SIEM Solution?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/#SIEMs_include_the_following_critical_information\" >SIEMs include the following critical information:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/#What_is_a_SOC_Solution\" >What is a SOC Solution?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/#A_SOC_performs_the_following_standard_functions\" >A SOC performs the following standard functions:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/#The_Main_Differences_Between_a_SIEM_and_SOC\" >The Main Differences Between a SIEM and SOC<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/#Do_You_Need_a_SOC_or_SIEM_for_Your_Business\" >Do You Need a SOC or SIEM for Your Business?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/#How_to_Choose_the_Right_SIEM_or_SOC_Solution_provider\" >How to Choose the Right SIEM or SOC Solution provider<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-1.jpg\" alt=\"Understanding Difference Between SIEM and SOC Solution\" class=\"wp-image-13795\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-1.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-1-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-1-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-1-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span class=\"ez-toc-section\" id=\"What_is_a_SIEM_Solution\"><\/span>What is a SIEM Solution?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">A SIEM solution collects, analyzes, and correlates different security data from different sources. It can collect data from network sensors, log management tools, <strong><a href=\"https:\/\/www.esds.co.in\/blog\/make-your-endpoint-security-a-reality\/\" title=\"\">endpoint security tools<\/a><\/strong>, etc. Once the data is collected, it\u2019s sent to the central SIEM server where it\u2019s stored and made available for analysis.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-3.jpg\" alt=\"What is a SIEM Solution?\" class=\"wp-image-13796\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-3.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-3-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-3-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-3-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">The SIEM solution provides a centralized view of all security events happening in your organization, regardless of the source of the data. The data collected by the SIEM includes security events like log data, network flow data, threat intelligence data, vulnerability data, etc. At the core of a SIEM solution is a security analytics engine. It\u2019s responsible for normalizing and correlating the data collected from different sources. It\u2019s an ideal solution for organizations with distributed IT environments. The SIEM solution allows security teams to centralize security data from different locations in the organization and correlate it with other data to identify threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"SIEMs_include_the_following_critical_information\"><\/span><strong>SIEMs include the following critical information:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Multi-source log aggregation<\/li>\n\n\n\n<li>Threat intelligence<\/li>\n\n\n\n<li>Organizing and correlating events to make analysis easier<\/li>\n\n\n\n<li>Advanced analytics visualization<\/li>\n\n\n\n<li>Customized dashboards for analytics<\/li>\n\n\n\n<li>A threat-hunting tool to identify currently compromised resources<\/li>\n\n\n\n<li>Investigation tools for cyber-incidents<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span class=\"ez-toc-section\" id=\"What_is_a_SOC_Solution\"><\/span>What is a SOC Solution?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">The term SOC refers to a Security Operations Center \u2014 an organization that manages security incidents. A <a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\"><strong>SOC solution<\/strong><\/a> is an on-premises solution that is designed to detect and respond to security incidents. The SOC solution collects security logs, network flow data, vulnerability data, threat intelligence data, etc. It sends this data to different sources like SIEM, ticketing, or collaboration tools, and other systems.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-2.jpg\" alt=\"What is a SOC Solution?\" class=\"wp-image-13797\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-2.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-2-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-2-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-2-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">The SOC solution provides a centralized view of security incidents and real-time alerts. It\u2019s a centralized tool that helps security teams, monitor, analyze, and respond to security incidents. The SOC solution is used by organizations that have their security operations in-house. It\u2019s also an ideal solution for organizations with distributed IT environments. The <strong><a href=\"https:\/\/www.esds.co.in\/blog\/a-comprehensive-business-guide-to-soc-services\/\" title=\"\">SOC solution<\/a><\/strong> can be implemented on-premises or on the cloud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"A_SOC_performs_the_following_standard_functions\"><\/span>A SOC performs the following standard functions:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network monitoring 24 hours a day, 7 days a week<\/li>\n\n\n\n<li>Maintaining cybersecurity appliances and deploying them<\/li>\n\n\n\n<li>Threat response during a cyber-event<\/li>\n\n\n\n<li>Threat containment and eradication<\/li>\n\n\n\n<li>Cyber-incident root-cause analysis<\/li>\n\n\n\n<li>Compliance assessment and management<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span class=\"ez-toc-section\" id=\"The_Main_Differences_Between_a_SIEM_and_SOC\"><\/span>The Main Differences Between a SIEM and SOC<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">The main difference between a SIEM and SOC is that a SIEM collects and correlates data from various sources, while a SOC collects data from various sources and sends it to a SIEM. Another difference between a SIEM and SOC solution is that a SIEM solution collects data from network sensors, log management tools, endpoint security tools, etc., while a SOC solution collects security logs, network flow data, vulnerability data, threat intelligence data, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span class=\"ez-toc-section\" id=\"Do_You_Need_a_SOC_or_SIEM_for_Your_Business\"><\/span>Do You Need a SOC or SIEM for Your Business?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-4.jpg\" alt=\"Need a SOC or SIEM for business?\" class=\"wp-image-13798\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-4.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-4-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-4-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/12\/A-Guide-To-Understanding-The-Difference-Between-SIEM-and-SOC-Solutions-SPOCHUB-Blog-4-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">Businesses can efficiently monitor their cybersecurity state with the use of SOCs and SIEMs, two instruments. Even if it all sounds great, there is undoubtedly a price to pay. Do SOC, SIEM, or both make sense as investments for any business?<\/p>\n\n\n\n<p style=\"text-align: justify;\">Only large companies can typically afford to build fully staffed SOCs with access to a powerful SIEM. However, it doesn&#8217;t follow that other, smaller businesses cannot use these two instruments. Through outsourcing, these <strong><a href=\"https:\/\/www.esds.co.in\/blog\/cybersecurity-mesh-how-does-it-impact-your-business\/\" title=\"\">cybersecurity technologies<\/a><\/strong> have helped a lot of other organizations. Organizations can establish a more robust security profile than they could if they tried to do everything internally by outsourcing SOC functions, SIEM management, or both.<\/p>\n\n\n\n<p style=\"text-align: justify;\">A company can boost its cybersecurity profile by outsourcing each of these parts, but doing so simultaneously is frequently a more efficient and successful approach. When a business outsources just one part, two distinct entities must collaborate, which can occasionally be difficult or ineffective. However, by outsourcing them simultaneously, a company can avoid potential communication problems, delays, and uneven levels of knowledge and experience. This is frequently a wise business decision.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span class=\"ez-toc-section\" id=\"How_to_Choose_the_Right_SIEM_or_SOC_Solution_provider\"><\/span>How to Choose the Right SIEM or SOC Solution provider<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">There are several factors to consider when choosing the right SIEM or SOC solution for your organization. These factors include the size of the organization, security needs, scalability, budget, and more. Here are some important factors to keep in mind while choosing a SIEM or SOC solution:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Security Solutions by ESDS\" width=\"960\" height=\"540\" src=\"https:\/\/www.youtube.com\/embed\/qLULUheIabc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Log sources<\/strong> &#8211; Before choosing a SIEM or <a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\"><strong>SOC solution<\/strong><\/a>, identify the log sources in your organization, and understand the types of events that are sent to the SIEM or SOC solution.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security requirements<\/strong> &#8211; Before choosing a SIEM or SOC solution, understand the security requirements of your organization. You should collect the data based on the security needs of your organization. Make sure the SIEM or SOC solution can collect the data that is required by your organization.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Scalability<\/strong> &#8211; Before choosing a SIEM or SOC solution, understand the scalability of the solution. The SIEM or SOC solution should be able to scale as your organization grows. It should be able to handle more data as the organization grows.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Budget<\/strong> &#8211; Before choosing a SIEM or SOC solution for your organization get an idea of how much the solution costs.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">In the end, SOCs and SIEMs are great tools to help any business up its cybersecurity game. Moreover, using these tools is possible even for small businesses through a SIEM service provider and <a href=\"https:\/\/www.esds.co.in\"><strong>SOC-as-a-Service provider<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you feel overwhelmed with all the security acronyms floating around? SIEM and SOC are two of the most popular acronyms in the security world. But what do they mean and what is the difference between them? A SIEM (Security Information and Event Management) solution is a platform that collects, analyzes, and correlates security data&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/a-guide-to-understanding-the-difference-between-siem-and-soc-solution\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":72,"featured_media":13799,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1815],"tags":[3176,2859,3174,3175,3177,3173],"class_list":["post-13794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soc-as-a-service","tag-cybersecurity-technologies","tag-endpoint-security","tag-siem","tag-siem-solution","tag-soc-service-provider","tag-soc-solution"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/13794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=13794"}],"version-history":[{"count":4,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/13794\/revisions"}],"predecessor-version":[{"id":14463,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/13794\/revisions\/14463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/13799"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=13794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=13794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=13794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}