{"id":80053,"date":"2022-07-15T12:08:39","date_gmt":"2022-07-15T12:08:39","guid":{"rendered":"https:\/\/www.42gears.com\/?p=80053"},"modified":"2022-07-19T12:28:36","modified_gmt":"2022-07-19T12:28:36","slug":"eliminating-shadow-it-with-mdm-solution","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/fr\/blog\/eliminating-shadow-it-with-mdm-solution\/","title":{"rendered":"Eliminating Shadow IT with MDM Solution"},"content":{"rendered":"\n<p>Eliminating shadow IT with MDM (Mobile Device Management) solution is the key to ensuring corporate data security. In recent years, the adoption of shadow IT has increased due to the increased use of cloud-based applications and services.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.techtarget.com\/searchcloudcomputing\/definition\/shadow-IT-shadow-information-technology\" target=\"_blank\" rel=\"noreferrer noopener\">Shadow IT<\/a> refers to the use of applications, services, software, devices, equipment, or any information technology without the IT department&rsquo;s approval.&nbsp;<\/p>\n\n\n\n<p>While shadow IT may have multiple benefits, such as driving innovation in work processes and improving employee productivity, it may also pose a risk of serious security breaches, data leaks, regulatory compliance violations, and more.<\/p>\n\n\n\n<p>There are multiple ways to eliminate the risks associated with shadow IT. And deploying and implementing an MDM solution is one of them.&nbsp;<\/p>\n\n\n\n<p>Let&rsquo;s look at how MDM solutions have made it possible to eliminate shadow IT.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-eliminate-shadow-it-with-an-mdm-solution\"><strong>How to eliminate shadow IT with an MDM solution&nbsp;<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mdm-solutions-help-ensure-data-and-device-security\"><strong>MDM Solutions Help Ensure Data and Device Security<\/strong><\/h3>\n\n\n\n<p>Some companies use a diverse range of hardware and operating systems, which can be difficult to manage and secure. This is especially true when users keep downloading and installing apps and data without the IT department&rsquo;s permission.<\/p>\n\n\n\n<p>Using MDM solutions, IT administrators can easily grant or deny access to data and apps. When necessary, it can even lock and unlock devices. Additionally, an MDM solution can help IT admins install and uninstall apps as required.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mdm-solutions-help-manage-access-control\"><strong>MDM Solutions Help Manage Access Control<\/strong><\/h3>\n\n\n\n<p>With the rise in the adoption of cloud-based and BYOD technologies, securing a company\u2019s resources and network has become quite challenging. It has also made it difficult to ensure that&nbsp; all technologies, applications, and software on a company\u2019s network are secure and legally compliant.&nbsp;<\/p>\n\n\n\n<p>MDM solutions help IT departments exercise control over the use of apps and software. With an MDM solution, they can ensure role-based access to company resources. For example, a CTO may get access to more resources than other employees. An MDM solution can also ensure that no application or software can be installed without approval from the IT department.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mdm-solutions-allow-for-containerization\"><strong>MDM Solutions Allow for Containerization<\/strong><\/h3>\n\n\n\n<p>Employees may feel comfortable working with technologies they are familiar with. And that\u2019s precisely why they choose the shadow IT route. However, organizations can\u2019t ignore the risks associated with shadow IT. Hence, they need a solution to allow users to work in a conducive environment while keeping the company\u2019s resources secure.&nbsp;<\/p>\n\n\n\n<p>An MDM solution can separate business data and apps from personal ones through containerization. Containerization helps the IT department manage corporate resources on mobile devices. In addition, an MDM solution can monitor, delete, modify, install, uninstall, and wipe data remotely without touching employees\u2019 personal data and apps.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mdm-solutions-support-network-monitoring\"><strong>MDM Solutions Support Network Monitoring<\/strong><\/h3>\n\n\n\n<p>To eliminate shadow IT risks, organizations must continuously monitor their device networks. Doing so can help detect security breaches and take remedial actions immediately.<\/p>\n\n\n\n<p>An MDM solution can regularly scan a company\u2019s network and detect the presence of any active cloud-based service that\u2019s running without the IT department\u2019s approval. An MDM solution can also help monitor data downloads or uploads.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Just like any other approach, shadow IT, too, has its own set of pros and cons. Businesses must, therefore, find a middle path that can help them strike the right balance. Managing shadow IT with an MDM solution can reduce the associated risks while allowing end-users to work with familiar technologies.&nbsp;<\/p>\n\n\n\n<p>42gears\u2019 MDM solution,<a href=\"https:\/\/www.42gears.com\/products\/mobile-device-management\/\"> SureMDM<\/a>, offers features to mitigate the risks associated with shadow IT by controlling the use of technologies. It also helps secure corporate data without affecting employees\u2019 productivity.&nbsp;&nbsp;<\/p>\n\n\n\n<div style=\"background-image: url('https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/CTA-5.jpg'); background-position: right; padding: 40px; border-radius: 5px; margin-top: 16px; background-size: cover;\">\n<h2 style=\"font-size: 22px; color: #fff; margin-top: 0px; margin-right: 200px\">Are you looking for an MDM solution that helps to eliminate shadow IT?<\/h2>\n<p style=\"margin-top: 32px; display: inline-block;\"><a href=\"https:\/\/suremdm.42gears.com\/console\/?_ga=2.14483831.1788783459.1658118516-531630290.1648451395\" style=\"min-width: 148px; height: 48px; padding: 0 12px; text-align: center; display: inline-block; background-color: #ffffff; color: #427ab7; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px;\" target=\"_black\" rel=\"noopener noreferrer\">Try MDM<\/a>\n<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Eliminating shadow IT with MDM (Mobile Device Management) solution is the key to ensuring corporate data security. In recent years, the adoption of shadow IT has increased due to the increased use of cloud-based applications and services.&nbsp; Shadow IT refers to the use of applications, services, software, devices, equipment, or any information technology without the&hellip;<\/p>\n","protected":false},"author":7,"featured_media":80060,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"new-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-80053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Eliminating shadow IT with MDM<\/title>\n<meta name=\"description\" content=\"Eliminating shadow IT with MDM is easy through continuous network monitoring and keeping a check on cloud services used without approval.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eliminating Shadow IT with MDM Solution\" \/>\n<meta property=\"og:description\" content=\"Eliminating shadow IT with MDM is easy through continuous network monitoring and keeping a check on cloud services used without approval.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-15T12:08:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-19T12:28:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"Eliminating Shadow IT with MDM Solution\",\"datePublished\":\"2022-07-15T12:08:39+00:00\",\"dateModified\":\"2022-07-19T12:28:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/\"},\"wordCount\":627,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/\",\"name\":\"Eliminating shadow IT with MDM\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png\",\"datePublished\":\"2022-07-15T12:08:39+00:00\",\"dateModified\":\"2022-07-19T12:28:36+00:00\",\"description\":\"Eliminating shadow IT with MDM is easy through continuous network monitoring and keeping a check on cloud services used without approval.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png\",\"width\":1000,\"height\":538},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Eliminating Shadow IT with MDM Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Eliminating shadow IT with MDM","description":"Eliminating shadow IT with MDM is easy through continuous network monitoring and keeping a check on cloud services used without approval.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/","og_locale":"fr_FR","og_type":"article","og_title":"Eliminating Shadow IT with MDM Solution","og_description":"Eliminating shadow IT with MDM is easy through continuous network monitoring and keeping a check on cloud services used without approval.","og_url":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2022-07-15T12:08:39+00:00","article_modified_time":"2022-07-19T12:28:36+00:00","og_image":[{"width":1000,"height":538,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png","type":"image\/png"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"Eliminating Shadow IT with MDM Solution","datePublished":"2022-07-15T12:08:39+00:00","dateModified":"2022-07-19T12:28:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/"},"wordCount":627,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png","articleSection":["Uncategorized"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/","url":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/","name":"Eliminating shadow IT with MDM","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png","datePublished":"2022-07-15T12:08:39+00:00","dateModified":"2022-07-19T12:28:36+00:00","description":"Eliminating shadow IT with MDM is easy through continuous network monitoring and keeping a check on cloud services used without approval.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png","width":1000,"height":538},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/eliminating-shadow-it-with-mdm-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Eliminating Shadow IT with MDM Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/07\/featured-3.png","_links":{"self":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/80053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/comments?post=80053"}],"version-history":[{"count":5,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/80053\/revisions"}],"predecessor-version":[{"id":80150,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/80053\/revisions\/80150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/media\/80060"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/media?parent=80053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/categories?post=80053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/tags?post=80053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}