{"id":14212,"date":"2023-03-23T12:55:20","date_gmt":"2023-03-23T12:55:20","guid":{"rendered":"https:\/\/www.esds.co.in\/blog\/?p=14212"},"modified":"2023-03-23T12:56:16","modified_gmt":"2023-03-23T12:56:16","slug":"managed-security-service-provider-mssp","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/","title":{"rendered":"Managed Security Service Provider (MSSP)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_Managed_Security_Service_Provider_MSSP\"><\/span><strong>What is Managed Security Service Provider (MSSP)?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.esds.co.in\/\"><strong>A managed security service provider<\/strong><\/a> is an IT service provider mainly delivering security services to different organizations. The MSSP expert team manages organizations&#8217; security, allowing organizations to focus on core business. An MSSP&#8217;s job is to assist in protecting businesses from security risks\/ threats, whether offering tools and services that safeguard corporate information or assembling a team of security specialists who can respond to intrusions as they happen.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#What_is_Managed_Security_Service_Provider_MSSP\" >What is Managed Security Service Provider (MSSP)?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#What_is_the_Difference_Between_MSP_and_MSSP\" >What is the Difference Between MSP and \u00a0MSSP?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#How_MSSPs_have_Evolved\" >How MSSPs have Evolved?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#Some_ways_that_MSSPs_have_evolved\" >Some ways that MSSPs have evolved:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#In_What_Ways_do_MSSPs_Help\" >In What Ways do MSSPs Help?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#Managed_security_services_are_divided_into_six_main_areas_including\" >Managed security services are divided into six main areas, including:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#Which_Security_Tools_Technologies_do_MSSPs_Typically_Deploy_and_Manage\" >Which Security Tools &amp; Technologies do MSSPs Typically Deploy and Manage?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#5_Reasons_Why_You_Should_Employ_MSSP\" >5 Reasons Why You Should Employ MSSP<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#How_to_evaluate_a_managed_security_services_Provider\" >How to evaluate a managed security services Provider?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#While_evaluating_an_MSSP_you_should_focus_on_these_factors\" >While evaluating an MSSP, you should focus on these factors:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#Managed_Security_Services_offered_by_ESDS\" >Managed Security Services offered by ESDS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/#To_Wrap_up\" >To Wrap up<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/Managed-Security-Service-Provider-MSSP-banner.jpg\" alt=\"Managed Security Service Provider\" class=\"wp-image-14213\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/Managed-Security-Service-Provider-MSSP-banner.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/Managed-Security-Service-Provider-MSSP-banner-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/Managed-Security-Service-Provider-MSSP-banner-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/Managed-Security-Service-Provider-MSSP-banner-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">Many MSSPs majorly offer <a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\"><strong>SOC services<\/strong><\/a> that take care of the overall <a href=\"https:\/\/www.esds.co.in\/security-insight-services\"><strong>IT security<\/strong><\/a> of businesses. MSSPs offer cybersecurity monitoring and management, including firewall management, virus and spam filtering, intrusion detection, and intrusion prevention systems. MSSPs also manage system updates, alterations, software patching, application security, and security of on-premises infra, data, applications, and the cloud.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_the_Difference_Between_MSP_and_MSSP\"><\/span><strong>What is the Difference Between MSP and \u00a0MSSP?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">MSP stands for Managed Service Provider, while MSSP stands for Managed Security Service Provider. Both are service providers offering a range of services to their clients, but there is a key difference between them.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"489\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/difference-between-msp-mssp.jpg\" alt=\"difference between MSP and MSSP\" class=\"wp-image-14214\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/difference-between-msp-mssp.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/difference-between-msp-mssp-300x122.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/difference-between-msp-mssp-1024x417.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/difference-between-msp-mssp-150x61.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">An MSP typically offers a broad range of IT services, such as hardware and software maintenance, network management, and helpdesk support. In addition, MSPs usually focus on ensuring that their clients&#8217; IT infrastructure is reliable, available, and performing optimally.<\/p>\n\n\n\n<p style=\"text-align: justify;\">On the other hand, an MSSP specializes in security-related services. This includes security assessments, threat monitoring, incident response, and security management. As a result, MSSPs typically offer more comprehensive security solutions than MSPs.<\/p>\n\n\n\n<p style=\"text-align: justify;\">MSP provides a broader range of IT services, while an <strong><em>MSSP<\/em><\/strong> specializes in security-related services. While some MSPs offer security services, they are typically less comprehensive than those provided by an MSSP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_MSSPs_have_Evolved\"><\/span><strong>How MSSPs have Evolved?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">Managed Security Service Providers (MSSPs) have evolved significantly over the years as cybersecurity threats have become increasingly sophisticated and widespread.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Some_ways_that_MSSPs_have_evolved\"><\/span><strong>Some ways that MSSPs have evolved:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\"><strong>Expansion of security services<\/strong>: MSSPs offer a wide range of security services, such as threat intelligence, vulnerability assessments, risk management, compliance management, and incident response.<\/p>\n\n\n\n<p style=\"text-align: justify;\"><strong>Emphasis on proactive security:<\/strong>\u00a0MSSPs focus on proactively identifying and mitigating security threats rather than just responding to them.<\/p>\n\n\n\n<p style=\"text-align: justify;\"><strong>Increased specialization:<\/strong>\u00a0MSSPs have become more specialized in specific security areas, such as cloud security, network security, application security, and endpoint security.<\/p>\n\n\n\n<p style=\"text-align: justify;\"><strong>Integration of technologies:<\/strong>\u00a0MSSPs have started integrating different security technologies to offer more comprehensive security solutions.<\/p>\n\n\n\n<p style=\"text-align: justify;\"><strong>Compliance and regulatory support:<\/strong>\u00a0Many MSSPs like ESDS now provide compliance and regulatory support services to help organizations meet the requirements of various regulations such as GDPR, HIPAA, and PCI-DSS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_What_Ways_do_MSSPs_Help\"><\/span><strong>In What Ways do MSSPs Help?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">Businesses may outsource all or a portion of their IT security operations to MSSPs. These businesses provide many services, including continuous security monitoring, vulnerability risk assessment, threat information and assessments, intrusion management, video surveillance, and access control. In addition, MSSPs create rules to assist in safeguarding a company&#8217;s infrastructure, offering security suggestions, some ongoing security, and some continuous security.<\/p>\n\n\n\n<p style=\"text-align: justify;\">MSSPs like <strong><em>ESDS<\/em><\/strong> effectively and affordably defend your network and data from threats while simplifying the procedure. Working with an MSSP may be less expensive than hiring an internal cybersecurity team. In addition, MSSPs can assist firms in making financial savings on hardware and software.<\/p>\n\n\n\n<p style=\"text-align: justify;\">Larger the business, larger the security risks. MSSP services are often advantageous for large companies because of rising security risks. Yet, as security threats change, many small and medium-sized organizations (SMBs) can gain from MSSPs. The global managed security services market is expected to reach $46.4 billion by 2025, reflecting the growing need for MSSPs.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"Managed_security_services_are_divided_into_six_main_areas_including\"><\/span><strong>Managed security services are divided into six main areas, including:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/Managed-Security-Service-Provider-MSSP_GIF-1.gif\" alt=\"main areas of managed security services\" class=\"wp-image-14219\"\/><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>On-site consultation,&nbsp;<\/li>\n\n\n\n<li>Client network&#8217;s perimeter management<\/li>\n\n\n\n<li>Managed security monitoring<\/li>\n\n\n\n<li>Penetration testing<\/li>\n\n\n\n<li>Vulnerability assessments<\/li>\n\n\n\n<li>Compliance monitoring<\/li>\n<\/ul>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"Which_Security_Tools_Technologies_do_MSSPs_Typically_Deploy_and_Manage\"><\/span><strong>Which Security Tools &amp; Technologies do MSSPs Typically Deploy and Manage?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"642\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/security-tools-and-technologies.jpg\" alt=\"security tools and technologies used by MSSP's\" class=\"wp-image-14215\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/security-tools-and-technologies.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/security-tools-and-technologies-300x161.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/security-tools-and-technologies-1024x548.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/03\/security-tools-and-technologies-150x80.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Intrusion prevention systems (IPS)<\/li>\n\n\n\n<li>Web content filtering<\/li>\n\n\n\n<li>Identity access management (IAM)<\/li>\n\n\n\n<li>Privileged access management (PAM)<\/li>\n\n\n\n<li>Vulnerability scanning<\/li>\n\n\n\n<li>Patch management<\/li>\n\n\n\n<li>Anti-virus (AV)<\/li>\n\n\n\n<li>Anti-spam<\/li>\n\n\n\n<li>Firewalls (UTMs, NGFWs, etc.)<\/li>\n\n\n\n<li>VPN<\/li>\n\n\n\n<li>Data loss prevention (DLP)<\/li>\n\n\n\n<li>Threat intelligence<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Reasons_Why_You_Should_Employ_MSSP\"><\/span><strong>5 Reasons Why You Should Employ MSSP<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Increase security.<\/li>\n\n\n\n<li>Add in the necessary expertise where needed.<\/li>\n\n\n\n<li>Recognize the best security solutions available.<\/li>\n\n\n\n<li>Use their expertise from dealing with comparable difficulties in various customer contexts.<\/li>\n\n\n\n<li>Boost threat awareness while hastening a security response (an attack on one customer can allow MSSP to adapt security to protect its other customers better)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_evaluate_a_managed_security_services_Provider\"><\/span><strong>How to evaluate a managed security services Provider?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"While_evaluating_an_MSSP_you_should_focus_on_these_factors\"><\/span><strong>While evaluating an MSSP, you should focus on these factors:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Expertise:<\/strong>&nbsp;Ensure an MSSP is staffed with industry pros, such as engineers and cybersecurity specialists.<\/li>\n\n\n\n<li><strong>Services:<\/strong>&nbsp;Analyze how well an organization&#8217;s needs can be satisfied by the MSSP&#8217;s services and how well they fit those needs.<\/li>\n\n\n\n<li><strong>Staff:<\/strong>&nbsp;To be accessible 24\/7 and react rapidly to requirements and crises, MSSPs need sufficient qualified staff members.<\/li>\n\n\n\n<li><strong>Security:<\/strong>&nbsp;Recognize how an MSSP manages and handles sensitive data for a company.<\/li>\n\n\n\n<li><strong>Budget:<\/strong>\u00a0To decide whether their budget can support an MSSP&#8217;s services, an organization must evaluate the pricing and service levels for that provider.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Managed_Security_Services_offered_by_ESDS\"><\/span><strong>Managed Security Services offered by ESDS<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOC as a Service<\/li>\n\n\n\n<li>Security Insight Service<\/li>\n\n\n\n<li>PAM<\/li>\n\n\n\n<li>VTMScan<\/li>\n\n\n\n<li>WAF<\/li>\n\n\n\n<li>Web VPN<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"To_Wrap_up\"><\/span><strong>To Wrap up<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\"><strong><a href=\"https:\/\/www.esds.co.in\/blog\/how-managed-security-services-keep-your-business-data-protected\/\" title=\"\">Managed Security Service Providers<\/a> (MSSPs)<\/strong> are an increasingly popular choice for organizations looking to improve their cybersecurity posture. MSSPs can help organizations save time and money by providing a dedicated team of security experts who can monitor their network 24\/7, identify and respond to threats in real time, and provide recommendations for improving security. Additionally, MSSPs can help organizations meet compliance requirements by providing regular reports and audits.<\/p>\n\n\n\n<p style=\"text-align: justify;\">Ultimately, working with an MSSP like <strong><em><a href=\"https:\/\/www.esds.co.in\/\" title=\"\">ESDS<\/a><\/em><\/strong> can be a valuable investment for organizations looking to strengthen their security posture and protect against the growing threat of cyber-attacks. By collaborating with a trusted provider, <strong>ESDS<\/strong>, organizations can gain peace of mind knowing their data and systems are secure and focus on their core business objectives.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Managed Security Service Provider (MSSP)? A managed security service provider is an IT service provider mainly delivering security services to different organizations. The MSSP expert team manages organizations&#8217; security, allowing organizations to focus on core business. An MSSP&#8217;s job is to assist in protecting businesses from security risks\/ threats, whether offering tools and&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/managed-security-service-provider-mssp\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":77,"featured_media":14223,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[1832,149,3191,1821,3190,3022,1816,2402],"class_list":["post-14212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-cybersecurity","tag-esds","tag-managed-security-service-provider","tag-managed-security-services","tag-mssp","tag-pam","tag-soc-as-a-service","tag-soc-services"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/14212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=14212"}],"version-history":[{"count":5,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/14212\/revisions"}],"predecessor-version":[{"id":14226,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/14212\/revisions\/14226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/14223"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=14212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=14212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=14212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}