{"id":55364,"date":"2020-07-27T12:48:38","date_gmt":"2020-07-27T12:48:38","guid":{"rendered":"https:\/\/www.42gears.com\/?p=55364"},"modified":"2023-01-04T06:52:43","modified_gmt":"2023-01-04T06:52:43","slug":"when-work-has-no-boundaries-is-zero-trust-the-right-answer","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/es\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/","title":{"rendered":"When Work Has No Boundaries, Is Zero-Trust the Right Answer?"},"content":{"rendered":"\n<p><img decoding=\"async\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust.jpg\" style=\"width:100%\" alt=\"Zero trust Banner\"><\/p>\n\n\n\n<p> Today, we work in what can rightfully be called \u201cperimeter-less enterprises.\u201d Most workers can access business data and resources without any constraints that might once have been in place- such as time of day, location, or operating system. Unfortunately, operating in such an environment substantially increases potential security risks. Since traditional security models have not mitigated sophisticated cybersecurity threats, organizations need to adopt a different approach &#8211; and many now adopt a zero trust approach.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:20px;\"><strong>What does a zero trust approach (ZTA) imply?<\/strong><\/h2>\n\n\n\n<p>The Zero Trust Approach is based on the \u201cnever trust, always verify\u201d ideology, which means that:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>All networks pose a threat to the organization.<\/li><li>Network threats can either be external or internal.<\/li><li>Threats exist irrespective of the location.<\/li><li>All network activities must be monitored at all times.<\/li><li>Unauthorized or unauthenticated devices or users should not be allowed to access an organization&#8217;s network.&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:20px;\"><strong>Why is this approach necessary? <\/strong><\/h2>\n\n\n\n<p> If workers accessed sensitive data in one way &#8211; from one computer, at one time of day, from one Wi-Fi network &#8211; trusting workers to be responsible might be possible. However, in today\u2019s complex world, we access data from everywhere on all sorts of different devices. Even the data itself may exist in on-premise or in the cloud. Trying to account for every new variable would be almost impossible if IT admins simply had to trust workers had to be completely responsible in every interaction. <\/p>\n\n\n\n<p><div class=\"gray_box_section\"> A zero trust approach allows for scalable device infrastructures that allow for the inevitable issues that arise in any workplace.  <\/div><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:20px;\"><strong>Things to consider before implementing a zero trust model<\/strong><\/h2>\n\n\n\n<p> Before implementing a zero-trust model, organizations must check the security measures they already have in place. They need to rethink their existing security strategies (like identity and access management and more) such that new policies are in line with the zero trust implementation.  <\/p>\n\n\n\n<p> Organizations will also need to review who can access what data and device functionality. This requires establishing what functionality each user requires, providing them access to only that functionality, and securing each user\u2019s access to that functionality.  <\/p>\n\n\n\n<p>As the number of enterprise endpoints increases, the need for endpoint security also rises. That\u2019s precisely why organizations around the world are implementing <a href=\"https:\/\/www.42gears.com\/solutions\/unified-endpoint-management-uem-solution\/\">Unified Endpoint Management<\/a> (UEM) tools to bolster device and data security. It\u2019s now time to adopt&nbsp;a zero-trust approach to improve security, detect and neutralize threats, and ensure more secure access to business resources.&nbsp;<br><\/p>\n\n\n\n<div style=\"background-image: url('https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-CTA.jpg'); background-position: center; padding: 40px; border-radius: 5px; margin-top: 16px; background-size: cover;\">\n<h2 style=\"font-size: 22px; color: #ffffff; margin-top: 0px;\">How do you evaluate the current state <br class=\"hidden-xs\">of your device fleet?<\/h2>\n<p style=\"margin-top: 32px; display: inline-block;\"><a href=\"https:\/\/suremdm.42gears.com\/console\/?registration=true&amp;uem=true\" style=\"min-width: 148px; height: 48px; padding: 0 24px; text-align: center; display: inline-block; background-color: #ffffff; color: #427ab7; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px;\" target=\"_black\" rel=\"noopener noreferrer\">TRY SUREMDM FOR FREE<\/a>\n<a href=\"https:\/\/www.42gears.com\/blog\/the-5-insights-that-expose-your-companys-biggest-problems\/\" style=\"min-width: 148px; height: 48px; padding: 0 24px; text-align: center; display: inline-block; background-color: transparent; color: #ffffff; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px; margin-left: 16px;\" target=\"_black\" rel=\"noopener noreferrer\">READ MORE<\/a>\n<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Today, we work in what can rightfully be called \u201cperimeter-less enterprises.\u201d Most workers can access business data and resources without any constraints that might once have been in place- such as time of day, location, or operating system. Unfortunately, operating in such an environment substantially increases potential security risks. Since traditional security models have not&hellip;<\/p>\n","protected":false},"author":7,"featured_media":55375,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[487,1],"tags":[],"class_list":["post-55364","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-42gears-uem","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Improve device and data security with the zero-trust approach<\/title>\n<meta name=\"description\" content=\"Since traditional security models have not mitigated sophisticated cybersecurity threats, businesses need to adopt a zero trust approach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Work Has No Boundaries, Is Zero-Trust the Right Answer?\" \/>\n<meta property=\"og:description\" content=\"Since traditional security models have not mitigated sophisticated cybersecurity threats, businesses need to adopt a zero trust approach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-27T12:48:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-04T06:52:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"When Work Has No Boundaries, Is Zero-Trust the Right Answer?\",\"datePublished\":\"2020-07-27T12:48:38+00:00\",\"dateModified\":\"2023-01-04T06:52:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/\"},\"wordCount\":436,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg\",\"articleSection\":[\"42Gears UEM\",\"Uncategorized\"],\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/\",\"name\":\"Improve device and data security with the zero-trust approach\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg\",\"datePublished\":\"2020-07-27T12:48:38+00:00\",\"dateModified\":\"2023-01-04T06:52:43+00:00\",\"description\":\"Since traditional security models have not mitigated sophisticated cybersecurity threats, businesses need to adopt a zero trust approach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg\",\"width\":1000,\"height\":538},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When Work Has No Boundaries, Is Zero-Trust the Right Answer?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Improve device and data security with the zero-trust approach","description":"Since traditional security models have not mitigated sophisticated cybersecurity threats, businesses need to adopt a zero trust approach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/","og_locale":"es_ES","og_type":"article","og_title":"When Work Has No Boundaries, Is Zero-Trust the Right Answer?","og_description":"Since traditional security models have not mitigated sophisticated cybersecurity threats, businesses need to adopt a zero trust approach.","og_url":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2020-07-27T12:48:38+00:00","article_modified_time":"2023-01-04T06:52:43+00:00","og_image":[{"width":1000,"height":538,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg","type":"image\/jpeg"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"When Work Has No Boundaries, Is Zero-Trust the Right Answer?","datePublished":"2020-07-27T12:48:38+00:00","dateModified":"2023-01-04T06:52:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/"},"wordCount":436,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg","articleSection":["42Gears UEM","Uncategorized"],"inLanguage":"es-ES","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/","url":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/","name":"Improve device and data security with the zero-trust approach","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg","datePublished":"2020-07-27T12:48:38+00:00","dateModified":"2023-01-04T06:52:43+00:00","description":"Since traditional security models have not mitigated sophisticated cybersecurity threats, businesses need to adopt a zero trust approach.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg","width":1000,"height":538},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/when-work-has-no-boundaries-is-zero-trust-the-right-answer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/es\/"},{"@type":"ListItem","position":2,"name":"When Work Has No Boundaries, Is Zero-Trust the Right Answer?"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/07\/Zero-trust-featured.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/55364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/comments?post=55364"}],"version-history":[{"count":10,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/55364\/revisions"}],"predecessor-version":[{"id":84917,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/55364\/revisions\/84917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/media\/55375"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/media?parent=55364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/categories?post=55364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/tags?post=55364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}