{"id":16234,"date":"2025-07-29T07:29:33","date_gmt":"2025-07-29T07:29:33","guid":{"rendered":"https:\/\/www.esds.co.in\/blog\/?p=16234"},"modified":"2025-10-07T10:32:23","modified_gmt":"2025-10-07T10:32:23","slug":"soc-as-a-service-scalable-security-for-enterprises","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/","title":{"rendered":"SOC as a Service Enabling Best Security for Smarter Enterprises"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/SOC-as-a-service-5.jpg\" alt=\"SOC as a Service \" class=\"wp-image-16253\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/SOC-as-a-service-5.jpg 1280w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/SOC-as-a-service-5-300x147.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/SOC-as-a-service-5-1024x502.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/SOC-as-a-service-5-150x74.jpg 150w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>As digital adoption accelerates and hybrid work becomes the norm, businesses are more vulnerable than ever. <strong><a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\">SOC as a Service<\/a><\/strong> is emerging as a vital solution to address these growing cybersecurity threats efficiently and affordably. According to an IMF report, cybercrime is project to cost the world $23 trillion by 2027 \u2013 a 175% increase from 2022. From phishing to <a href=\"https:\/\/www.esds.co.in\/blog\/how-to-choose-a-ddos-solution-fit-for-your-business\/\"><strong>DDoS attacks<\/strong><\/a>, the threat landscape is evolving rapidly.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/#What_Is_SOC_as_a_Service_How_It_Works\" >What Is SOC as a Service &amp; How It Works<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/#How_does_SOC_as_a_Service_apply_to_your_business\" >How&nbsp;does&nbsp;SOC as a Service&nbsp;apply&nbsp;to&nbsp;your&nbsp; business?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/#What_kinds_of_threats_fall_under_SOC_as_a_Service\" >What kinds of threats fall under SOC as a Service?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/#Key_Threat_Vectors_Mitigated_by_SOC_as_a_Service\" >Key Threat Vectors Mitigated by SOC as a Service<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/#Key_Roles_in_a_Managed_SOC_Team\" >Key Roles in a Managed SOC Team<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/#Top_4_SOC_as_a_Service_Benefits\" >Top 4 SOC as a Service Benefits<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/#What_Next\" >What Next?<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p>A key weapon in defending against these threats is the Security Operations Center (SOC). But building an in-house SOC can be costly and complex especially with the global cybersecurity talent shortage. That\u2019s why businesses are turning to SOC as a Service for scalable, expert-led protection.<\/p>\n\n\n\n<p>In this blog, you will understand what <strong>SOC as Service really means, why it\u2019s becoming essential for modern enterprises<\/strong>, how it can strengthen your cybersecurity posture without the overhead of an in-house SOC.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Is_SOC_as_a_Service_How_It_Works\"><\/span><strong>What Is SOC as a Service &amp; How It Works<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Without having to hire a team of security experts or pay out thousands of dollars for tools, Security Operations Center as a Service is a cloud-based subscription model that gives organizations a plug-and-play command center to build and improve their cybersecurity posture or fill any gaps in their current posture. Business settings with limited resources (money, skill pool) are ideal for SOC as a Service. Early-stage businesses frequently struggle to justify the substantial expenditure required to build an effective cybersecurity posture from the bottom up.<\/p>\n\n\n\n<p>SOC as a Service serves as an operational hub that enables businesses to see their business environment, spot vulnerabilities, strengthen areas, keep an eye on security alerts, and enhance their overall security posture.<\/p>\n\n\n\n<p>Below is the representation of the working of SOC as a Service: &#8211;<\/p>\n\n\n\n<p><strong>Security Operations Center Tools + Team of Cybersecurity professionals = SOC as a Service<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_does_SOC_as_a_Service_apply_to_your_business\"><\/span><strong>How&nbsp;does&nbsp;SOC as a Service&nbsp;apply&nbsp;to&nbsp;your&nbsp;<\/strong><br><strong>business?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>SOC as a Service is a ground-breaking solution that provides the newest security solutions with the best defense while reducing the amount of money you spend on security-related operations.<br>According to a recent <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/01\/22\/the-importance-of-time-and-speed-in-cybersecurity\/#:~:text=Rate%20Of%20Malicious%20Activity,attempts%20or%20malicious%20activity%20globally.\">Forbes study<\/a>, at least one company worldwide is impacted by a cyberattack every 39 seconds.<br><br>This implies that at least one hacker has successfully compromised a company system and gained access to intellectual property somewhere in the world during the time you spent learning about SOC as a Service today. Companies need to figure out how to put scale ahead of security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_kinds_of_threats_fall_under_SOC_as_a_Service\"><\/span><strong>What kinds of threats fall under SOC as a Service?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Using a range of tech stacks to uncover vulnerabilities in real-time, apply artificial intelligence (AI) to spot trends, and forecast potential threats, attack sources, and their potential effects on your company are all common SOC leverages. Although these are the most popular service options, SOC also provides tens of hundreds of supplementary services.<\/p>\n\n\n\n<p>The extent of your subscription is up to you as a <a href=\"https:\/\/www.esds.co.in\/blog\/security-operations-center-soc-services-a-measured-approach-to-digital-threat-management\/\">SOC as a Service<\/a> subscriber. Depending on the SOC as a Service provider you use, you may occasionally be able to obtain a customized security solution. &nbsp;It&#8217;s crucial to understand that SOC as a Service has drawbacks. They are not infallible, even if they are made to get better all the time. The dangers of the future do not exempt them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_Threat_Vectors_Mitigated_by_SOC_as_a_Service\"><\/span><strong>Key Threat Vectors Mitigated by SOC as a Service<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Nevertheless, SOC as a Service has demonstrated remarkable defenses against several breach vectors, some of which we have mentioned here:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/Threats-fall-under-SOC-4.jpg\" alt=\"What kinds of threats fall under SOC as a Service\" class=\"wp-image-16236\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/Threats-fall-under-SOC-4.jpg 1280w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/Threats-fall-under-SOC-4-300x147.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/Threats-fall-under-SOC-4-1024x502.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2025\/07\/Threats-fall-under-SOC-4-150x74.jpg 150w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Malware is complex software that can damage your system just by listening to data entering and leaving. It will seriously harm your system by infecting it to launch the attacker&#8217;s application.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Another type of cyberattack is phishing, which starts with a phony email or other communication getting into your system. This threat&#8217;s primary objective is to trick you, the victim, into clicking on a dangerous link.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Insider threats<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Although it comes as a surprise, this is a common hazard to businesses. People who wish to see you fail can occasionally be found right in front of you. An insider threat is a serious security danger that comes from within your organization, such as from your employees.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Another&nbsp;type&nbsp;of&nbsp;malware&nbsp;is&nbsp;ransomware,&nbsp;which&nbsp;is&nbsp;mostly&nbsp;intended&nbsp;to&nbsp;prevent&nbsp;a&nbsp;user&nbsp;or&nbsp;orgaization&nbsp;from&nbsp;accessing&nbsp;files&nbsp;on&nbsp;their&nbsp;own&nbsp;system. The&nbsp;intriguing&nbsp;aspect&nbsp;of&nbsp;these&nbsp;sophisticated&nbsp;threats&nbsp;is&nbsp;that&nbsp;the&nbsp;money&nbsp;to&nbsp;gain&nbsp;access&nbsp;is&nbsp;almostimpossible&nbsp;to&nbsp;track&nbsp;down,&nbsp;and&nbsp;attackers&nbsp;have&nbsp;become&nbsp;infamously&nbsp;inventive&nbsp;over&nbsp;time.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DDOS&nbsp;&nbsp;&nbsp;<\/strong><\/li>\n<\/ul>\n\n\n\n<p>OpenAI has acknowledged that they were battling a slew of DDoS attacks. Several traffic patterns caused occasional disruptions as a result. DDoS will bring down your network and make it more difficult for users to access the platform. In the end, it causes the system to crash. Millions of customers were prevented from using the software as intended, and fixing it most likely lost the company money and reputation.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Country than sponsor cybercrimes<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Some&nbsp;nations&nbsp;encourage&nbsp;cybercrime,&nbsp;which&nbsp;increases&nbsp;the&nbsp;likelihood&nbsp;that&nbsp;illicit&nbsp;online&nbsp;activity&nbsp;will&nbsp;flourish&nbsp;there.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_Roles_in_a_Managed_SOC_Team\"><\/span><strong>Key Roles in a Managed SOC Team<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With a variety of technological investments, <a href=\"https:\/\/www.esds.co.in\/managed-soc-services\">managed SOC as a Service<\/a> plays a number of functions and tasks that support maintaining your security posture.<\/p>\n\n\n\n<p>Among this service&#8217;s duties and tasks are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Delegating authority to determine which services within the larger security package are pertinent to them.<\/li>\n\n\n\n<li>Examine and address any online dangers.<\/li>\n\n\n\n<li>Transform the intricacies of cyberthreats or consequences into plain language that any stakeholder or layperson can understand.<br>Regarding the function of a SOC as a Service, you must now determine who will be on the team to handle security issues as you choose your vendor. They are:<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Roles<\/strong><\/td><td><strong>Responsibilities<\/strong><\/td><\/tr><tr><td>SOC Manager<\/td><td>Lead the SOC teams and over all security operations monitoring.<\/td><\/tr><tr><td>Security Analyst Tier &#8211; 1<\/td><td>Monitors alerts and identifying potential incidents<\/td><\/tr><tr><td>Security Analyst Tier &#8211; 2<\/td><td>Handles serious alerts &amp; initiates immediate actions.<\/td><\/tr><tr><td>Security Analyst Tier -3<\/td><td>Investigate advanced threats and uncovers how breaches occurred.<\/td><\/tr><tr><td>Compliance Auditor<\/td><td>Ensures compliance with regulations and policy.<\/td><\/tr><tr><td>Security Architect<\/td><td>Design &amp; implement security system.<\/td><\/tr><tr><td>SOC Co-ordinator<\/td><td>Bridges communication between SOC vendor &amp; internal teams.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Top_4_SOC_as_a_Service_Benefits\"><\/span><strong>Top 4 SOC as a Service Benefits<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\" type=\"1\">\n<li><strong>Continuous Monitoring<\/strong><\/li>\n<\/ul>\n\n\n\n<p>SOC guards are among the few that are ready around-the-clock to defend and safeguard the company&#8217;s business environment against cyberattacks.&nbsp; By continuously examining records to identify irregularities through ongoing monitoring, they are continually on the lookout for anything that can be harmful, much like a guard on duty.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Immediate response<\/strong><\/li>\n<\/ul>\n\n\n\n<p>SOCs require a lot less time to identify risks and implement remediation techniques since they are constantly alert for them. When they identify a vulnerability in real-time, they evaluate its characteristics to rule out false positives, gauge the threat it poses, and designate its severity.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Prevent threats<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Patching threats and vulnerabilities is only one aspect of SOCs.&nbsp; Additionally, they actively work to enhance the organization&#8217;s current infrastructure and security procedures in order to stay ahead of hackers and their methods of entry.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Training<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The team is in charge of educating their immediate team members about the most recent security landscape misses and hits.&nbsp; In addition, they run training programs to teach staff members about the latest penetration models and how to stop them from happening.<\/p>\n\n\n\n<p><strong>Must Read: <\/strong><a href=\"https:\/\/www.esds.co.in\/kb\/soar-vs-traditional-soc-a-comparative-guide\/\"><strong>SOAR vs Traditional SOC: A Comparative Guide<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Next\"><\/span>What Next?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>All things considered, SOC as a Service is a crucial control center for your business&#8217;s defense against cybersecurity attacks. Possessing robust security solutions and full visibility into your corporate environment strengthens your security assessment posture.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esds.co.in\/managed-soc-services\"><strong>ESDS Managed SOC Services<\/strong><\/a>: A tool that detects, prevents, investigates and responds to cyber threats. Provides a secure and scalable environment for cybersecurity operations. It also ensures remote access to business data and IT resources. It continuously monitors, and provides backup protection to prevent ransomware attacks.<\/p>\n\n\n\n<p>Secure your digital future. <strong>Contact us to discover how our <\/strong><a href=\"https:\/\/www.esds.co.in\/managed-soc-services\"><strong>SOC as a Service<\/strong><\/a><strong> can protect your business<\/strong>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As digital adoption accelerates and hybrid work becomes the norm, businesses are more vulnerable than ever. SOC as a Service is emerging as a vital solution to address these growing cybersecurity threats efficiently and affordably. According to an IMF report, cybercrime is project to cost the world $23 trillion by 2027 \u2013 a 175% increase&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/soc-as-a-service-scalable-security-for-enterprises\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":86,"featured_media":16254,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1815],"tags":[4012,3484,299,4014,3887,3890,3894,4009,3888,3886,4008,4011,3889,4007,1816,4015,4006,4013,4010],"class_list":["post-16234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soc-as-a-service","tag-24-7-soc-as-a-service-for-enterprise-risk-management","tag-ai-in-cybersecurity","tag-cloud-security","tag-cost-effective-soc-as-a-service-for-businesses","tag-cyber-threat-detection","tag-ddos-protection","tag-enterprise-security","tag-enterprise-security-monitoring-soc-as-a-service","tag-malware-protection","tag-managed-soc","tag-managed-soc-services-for-enterprise-security","tag-outsourced-soc-as-a-service-for-large-enterprises","tag-phishing-prevention","tag-scalable-soc-as-a-service-security-solutions","tag-soc-as-a-service","tag-soc-as-a-service-for-hybrid-cloud-infrastructure-security","tag-soc-as-a-service-provider-for-enterprises-in-india","tag-soc-as-a-service-with-real-time-incident-response","tag-socaas-compliance-and-threat-detection-services-india"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/16234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/86"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=16234"}],"version-history":[{"count":9,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/16234\/revisions"}],"predecessor-version":[{"id":16397,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/16234\/revisions\/16397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/16254"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=16234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=16234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=16234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}