{"id":98175,"date":"2024-02-28T10:13:10","date_gmt":"2024-02-28T10:13:10","guid":{"rendered":"https:\/\/www.42gears.com\/?p=98175"},"modified":"2025-12-20T03:14:12","modified_gmt":"2025-12-20T03:14:12","slug":"secure-usb-management-windows-macos-linux","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/de\/blog\/secure-usb-management-windows-macos-linux\/","title":{"rendered":"52% of Cyber Attacks Target USB Drives: How to Secure Your Business Without Losing Productivity"},"content":{"rendered":"\n<p>The Universal Serial Bus (USB) has become an essential and widely used interface for connecting a vast array of devices to computers and other electronics. Businesses benefit from USB devices thanks to several advantages like effortless file transfer, offline access, and cost-effectiveness. However, the same convenience and versatility factors that make USB technology so popular have also introduced potential threats and critical risks that need to be addressed.&nbsp;<\/p>\n\n\n\n<p>According to Honeywell Cybersecurity Research, <a href=\"https:\/\/www.honeywell.com\/us\/en\/press\/2022\/08\/honeywell-cybersecurity-research-reveals-52-of-cyber-threats-targeted-at-removable-media#:~:text=Data%20from%20the%202022%20Honeywell,to%20use%20removable%20media%20have\">52% of cyber threats<\/a> were specifically designed to utilize removable media like USB or pen drives. Some of the potential concerns on using USB devices include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malware attack through infected drives,&nbsp;<\/li>\n\n\n\n<li>Unauthorized data leaks due to accidental or intentional sharing, and&nbsp;<\/li>\n\n\n\n<li>Difficulty in ensuring compliance with data privacy regulations.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Simply encrypting USB devices or outright banning them might not be the answer. USB drives serve multiple purposes and device-wide security rules can hinder legitimate use. To address this issue, <a href=\"https:\/\/www.42gears.com\/products\/mobile-device-management\/\">SureMDM<\/a> lets you configure advanced USB management capabilities at each device level for optimal results, without compromising usability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-usb-security-management-on-windows-devices\">USB Security Management on Windows Devices<\/h2>\n\n\n\n<p>SureMDM empowers IT admins to protect company data by managing USB connectivity on managed devices. Here&#8217;s how:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Restrict Unauthorized USB Devices: Admins can create a list of \u2018Approved\u2019 and \u2018Prohibited\u2019 USB devices, mitigating potential security risks associated with unauthorized USB devices.<\/li>\n\n\n\n<li>Fine-Grained USB Management: SureMDM offers granular control over USB ports. Admins can configure settings for individual devices or apply different rules to groups of devices, ensuring a flexible and adaptable security posture.<\/li>\n<\/ul>\n\n\n\n<p>USB Security Management in Windows is done by adding DeviceClassID and DeviceInstanceID to the USB Media Control Profile on SureMDM for various USB devices.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/12\/img1.gif\"><img decoding=\"async\" width=\"1600\" height=\"803\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/12\/img1.gif\" alt=\"\" class=\"wp-image-110081\"\/><\/a><figcaption class=\"wp-element-caption\">Configuring USB Security Management on Windows devices<\/figcaption><\/figure>\n\n\n\n<p>Check this article on how to <a href=\"https:\/\/knowledgebase.42gears.com\/article\/how-to-allow-or-prevent-the-installation-of-devices-by-deviceclassid-or-deviceinstanceid-on-windows\/\">how to setup USB Security management for your windows devices<\/a>. <\/p>\n\n\n\n<p>Note that, to configure the USB Media Control Profile, the Windows device has to be enrolled into SureMDM using the <a href=\"https:\/\/www.42gears.com\/blog\/8-enrollment-methods-available-for-windows-devices\/\">Windows EMM enrollment method or Dual Enrollment<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-you-need-usb-security-management-for-windows-devices\">Why you need USB Security Management for Windows Devices<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid potential data theft and loss caused by employees using personal USB sticks.&nbsp;<\/li>\n\n\n\n<li>Mitigate risks associated with malicious programs or code and enhance corporate security.&nbsp;<\/li>\n\n\n\n<li>Leverage SureMDM with BitLocker to significantly strengthen your defenses against accidental data leaks through removable USB drives. By using BitLocker, you can ensure that any data transferred to removable drives will require mandatory encryption, safeguarding sensitive information regardless of the organization using the drive.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-usb-security-management-on-linux-devices\">USB Security Management on Linux Devices<\/h2>\n\n\n\n<p>Using SureMDM, customers can use the serial number of Linux devices to control access to specific USB devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-you-need-usb-security-management-for-linux-devices\">Why you need USB Security Management for Linux devices<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid potential data theft and loss caused by employees using personal USB sticks.&nbsp;<\/li>\n\n\n\n<li>Mitigate risks associated with malicious programs or code and enhance corporate security.&nbsp;<\/li>\n\n\n\n<li>Ensure only encrypted USB drives are connectable to laptops, and force encrypt any USB devices that are yet to be secured.<\/li>\n\n\n\n<li>Enable read-only mode for unencrypted USB devices and block write-protection.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/12\/img2.gif\"><img decoding=\"async\" width=\"1600\" height=\"803\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/12\/img2.gif\" alt=\"\" class=\"wp-image-110093\"\/><\/a><figcaption class=\"wp-element-caption\">Configuring USB Security Management on Linux devices<\/figcaption><\/figure>\n\n\n\n<p>Check this article on <a href=\"https:\/\/docs.42gears.com\/suremdm\/linuxjobsprofile\/linux_jobsandprofilemanage\/linux_devices_profiless\/configure_usb_media_control_profile\">how to setup USB Security management for your Linux devices<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-usb-security-management-on-macos-devices\">USB Security Management on macOS Devices<\/h2>\n\n\n\n<p>Using SureMDM, admins can fully block or allow the use of USB storage devices on MacBooks, providing a robust layer of security for your enterprise devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-you-need-usb-security-management-for-macOS-devices\">Why you need USB Security Management for macOS devices<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Block or allow USB devices as per business requirements and avoid potential data theft and loss by unauthorized USB sticks.&nbsp;<\/li>\n\n\n\n<li>Mitigate risks associated with unauthorized software installations, malware, and ransomware attacks.\u00a0<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/12\/img3.gif\"><img decoding=\"async\" width=\"1600\" height=\"1000\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/12\/img3.gif\" alt=\"\" class=\"wp-image-110099\"\/><\/a><figcaption class=\"wp-element-caption\">Configuring USB Security Management on macOS devices<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The Universal Serial Bus (USB) has become an essential and widely used interface for connecting a vast array of devices to computers and other electronics. Businesses benefit from USB devices thanks to several advantages like effortless file transfer, offline access, and cost-effectiveness. However, the same convenience and versatility factors that make USB technology so popular&hellip;<\/p>\n","protected":false},"author":36,"featured_media":98200,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"latest-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-98175","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>USB Security Management for Enterprise: Windows, Mac &amp; Linux Guide<\/title>\n<meta name=\"description\" content=\"Protect your enterprise from USB-based cyber threats with comprehensive USB security management across Windows, macOS, and Linux. Learn how to prevent data theft, block malware, and maintain productivity with granular USB device controls. \u2713 Real-time protection \u2713 Custom policies \u2713 BitLocker integration\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"52% of Cyber Attacks Target USB Drives: How to Secure Your Business Without Losing Productivity\" \/>\n<meta property=\"og:description\" content=\"Protect your enterprise from USB-based cyber threats with comprehensive USB security management across Windows, macOS, and Linux. Learn how to prevent data theft, block malware, and maintain productivity with granular USB device controls. \u2713 Real-time protection \u2713 Custom policies \u2713 BitLocker integration\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-28T10:13:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T03:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nareddy Saivikas Reddy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nareddy Saivikas Reddy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/\"},\"author\":{\"name\":\"Nareddy Saivikas Reddy\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/58570a4989f85f107145706d2131864f\"},\"headline\":\"52% of Cyber Attacks Target USB Drives: How to Secure Your Business Without Losing Productivity\",\"datePublished\":\"2024-02-28T10:13:10+00:00\",\"dateModified\":\"2025-12-20T03:14:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/\"},\"wordCount\":614,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/\",\"url\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/\",\"name\":\"USB Security Management for Enterprise: Windows, Mac & Linux Guide\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg\",\"datePublished\":\"2024-02-28T10:13:10+00:00\",\"dateModified\":\"2025-12-20T03:14:12+00:00\",\"description\":\"Protect your enterprise from USB-based cyber threats with comprehensive USB security management across Windows, macOS, and Linux. Learn how to prevent data theft, block malware, and maintain productivity with granular USB device controls. \u2713 Real-time protection \u2713 Custom policies \u2713 BitLocker integration\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg\",\"width\":1000,\"height\":538},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"52% of Cyber Attacks Target USB Drives: How to Secure Your Business Without Losing Productivity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/58570a4989f85f107145706d2131864f\",\"name\":\"Nareddy Saivikas Reddy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/459a0c72439f59dcaa1443e71b9272cc2f80b487c7f610672a728aede71df910?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/459a0c72439f59dcaa1443e71b9272cc2f80b487c7f610672a728aede71df910?s=96&d=mm&r=g\",\"caption\":\"Nareddy Saivikas Reddy\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"USB Security Management for Enterprise: Windows, Mac & Linux Guide","description":"Protect your enterprise from USB-based cyber threats with comprehensive USB security management across Windows, macOS, and Linux. Learn how to prevent data theft, block malware, and maintain productivity with granular USB device controls. \u2713 Real-time protection \u2713 Custom policies \u2713 BitLocker integration","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/","og_locale":"de_DE","og_type":"article","og_title":"52% of Cyber Attacks Target USB Drives: How to Secure Your Business Without Losing Productivity","og_description":"Protect your enterprise from USB-based cyber threats with comprehensive USB security management across Windows, macOS, and Linux. Learn how to prevent data theft, block malware, and maintain productivity with granular USB device controls. \u2713 Real-time protection \u2713 Custom policies \u2713 BitLocker integration","og_url":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2024-02-28T10:13:10+00:00","article_modified_time":"2025-12-20T03:14:12+00:00","og_image":[{"width":1000,"height":538,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg","type":"image\/jpeg"}],"author":"Nareddy Saivikas Reddy","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"Nareddy Saivikas Reddy","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/"},"author":{"name":"Nareddy Saivikas Reddy","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/58570a4989f85f107145706d2131864f"},"headline":"52% of Cyber Attacks Target USB Drives: How to Secure Your Business Without Losing Productivity","datePublished":"2024-02-28T10:13:10+00:00","dateModified":"2025-12-20T03:14:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/"},"wordCount":614,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg","articleSection":["Uncategorized"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/","url":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/","name":"USB Security Management for Enterprise: Windows, Mac & Linux Guide","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg","datePublished":"2024-02-28T10:13:10+00:00","dateModified":"2025-12-20T03:14:12+00:00","description":"Protect your enterprise from USB-based cyber threats with comprehensive USB security management across Windows, macOS, and Linux. Learn how to prevent data theft, block malware, and maintain productivity with granular USB device controls. \u2713 Real-time protection \u2713 Custom policies \u2713 BitLocker integration","breadcrumb":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg","width":1000,"height":538},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/fr\/blog\/secure-usb-management-windows-macos-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/de\/"},{"@type":"ListItem","position":2,"name":"52% of Cyber Attacks Target USB Drives: How to Secure Your Business Without Losing Productivity"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/58570a4989f85f107145706d2131864f","name":"Nareddy Saivikas Reddy","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/459a0c72439f59dcaa1443e71b9272cc2f80b487c7f610672a728aede71df910?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/459a0c72439f59dcaa1443e71b9272cc2f80b487c7f610672a728aede71df910?s=96&d=mm&r=g","caption":"Nareddy Saivikas Reddy"}}]}},"author_meta":{"ID":"36","user_nicename":"nareddy-reddy42gears-com","user_email":"nareddy.reddy@42gears.com","user_registered":"2024-02-23 06:21:35","display_name":"Nareddy Saivikas Reddy","first_name":"Nareddy","last_name":"Saivikas Reddy"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/02\/featured-2.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/posts\/98175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/comments?post=98175"}],"version-history":[{"count":16,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/posts\/98175\/revisions"}],"predecessor-version":[{"id":127824,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/posts\/98175\/revisions\/127824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/media\/98200"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/media?parent=98175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/categories?post=98175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/tags?post=98175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}