{"id":18180,"date":"2025-09-23T17:30:22","date_gmt":"2025-09-23T17:30:22","guid":{"rendered":"http:\/\/live-42gears-site.pantheonsite.io\/?p=18180\/"},"modified":"2025-09-24T12:02:30","modified_gmt":"2025-09-24T12:02:30","slug":"mobile-endpoint-security-risk-management","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/nl\/blog\/mobile-endpoint-security-risk-management\/","title":{"rendered":"Mobile Endpoint Security Management: Safeguarding Business Data in a Mobile-First World"},"content":{"rendered":"\n<p>With<a href=\"https:\/\/explodingtopics.com\/blog\/byod-stats?\"> 66% of employees now using smartphones<\/a>, laptops, tablets for work-related activities, mobile devices have become indispensable productivity tools\u2014but that also means every connected device can be a potential entry point for cyber threats, making mobile endpoint security management a business-critical priority.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-mobile-endpoint-security-management-matters\"><strong>Why Mobile Endpoint Security Management Matters<\/strong><\/h2>\n\n\n\n<p>Cybercriminals increasingly target mobile devices because of the valuable corporate data they carry. From phishing attacks and malware to device theft and unauthorized access, the risks are real\u2014and costly. Without robust endpoint security management, organizations face:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Breaches:<\/strong> Sensitive customer and business information may be exposed.<\/li>\n\n\n\n<li><strong>Compliance Requirements:<\/strong> Industries such as BFSI, healthcare, and retail are bound by strict data protection regulations like PCI DSS, HIPAA, and GDPR. Mobile endpoint security management helps organizations enforce these standards, safeguard sensitive data, and reduce the risk of costly non-compliance.<\/li>\n\n\n\n<li><strong>Productivity Loss:<\/strong> Compromised devices can cause downtime, disrupting daily operations.<\/li>\n<\/ul>\n\n\n\n<p>Effective <strong>mobile endpoint security management<\/strong> ensures that organizations can protect devices, applications, and data without compromising employee productivity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-capabilities-of-mobile-endpoint-security-management\"><strong>Key Capabilities of Mobile Endpoint Security Management<\/strong><\/h2>\n\n\n\n<p>To build a strong mobile security posture, businesses need solutions that go beyond traditional antivirus software. A comprehensive mobile endpoint security management strategy should include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Device <\/strong><a href=\"https:\/\/knowledgebase.42gears.com\/article\/how-to-ensure-security-compliance-on-enrolled-android-devices-with-suremdm\/\"><strong>Security &amp; Compliance<\/strong><\/a><strong> Monitoring<\/strong><strong><br><\/strong>\n<ul class=\"wp-block-list\">\n<li>Enforce security policies such as passcodes, encryption, and VPN usage.<\/li>\n\n\n\n<li>Automatically detect and block non-compliant or jailbroken\/rooted devices.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.42gears.com\/solutions\/mobile-application-management-mam\/\"><strong>App Management<\/strong><\/a><strong> &amp; <\/strong><a href=\"https:\/\/www.42gears.com\/blog\/essential-endpoint-management-capabilities-to-stay-ahead-of-threats\/\"><strong>Threat Protection<\/strong><strong><br><\/strong><\/a>\n<ul class=\"wp-block-list\">\n<li>Restrict access to only approved apps.<\/li>\n\n\n\n<li>Detect malicious apps and prevent data leakage.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Secure Connectivity &amp; Access Control<\/strong><strong><br><\/strong>\n<ul class=\"wp-block-list\">\n<li>Enable secure access to enterprise networks and cloud apps.<\/li>\n\n\n\n<li>Integrate with <a href=\"https:\/\/www.42gears.com\/products\/sureidp\/\">Identity and Access Management<\/a> (IAM) systems for role-based permissions.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.42gears.com\/solutions\/capabilities\/data-loss-prevention\/\"><strong>Data Loss Prevention<\/strong><\/a><strong> (DLP)<\/strong><strong><br><\/strong>\n<ul class=\"wp-block-list\">\n<li>Remotely lock or wipe lost or stolen devices.<\/li>\n\n\n\n<li>Prevent unauthorized data sharing through app\/containerization policies.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.42gears.com\/solutions\/capabilities\/mobile-threat-defense\/\"><strong>Real-Time Threat Detection<\/strong><\/a><strong> &amp; Response<\/strong><strong><br><\/strong>\n<ul class=\"wp-block-list\">\n<li>Monitor mobile devices for anomalies.<\/li>\n\n\n\n<li>Take immediate action to contain threats and minimize damage.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-42gears-strengthens-mobile-endpoint-security\"><strong>How 42Gears Strengthens Mobile Endpoint Security<\/strong><\/h2>\n\n\n\n<p>42Gears\u2019 Unified Endpoint Management (UEM) platform offers advanced tools for <strong>mobile endpoint security management<\/strong>, helping organizations protect every device in their ecosystem. With SureMDM, IT teams can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enforce enterprise-wide security policies with ease.<\/li>\n\n\n\n<li>Manage devices across Android, iOS\/iPadOS, Windows, macOS, ChromeOS, and Linux.<\/li>\n\n\n\n<li>Monitor endpoints in real-time for compliance and security threats.<\/li>\n\n\n\n<li>Remotely troubleshoot and secure compromised devices.<\/li>\n<\/ul>\n\n\n\n<p>Whether your workforce operates in-office, remotely, or on the go, 42Gears Mobile Endpoint Security ensures that every endpoint remains secure, compliant, and productive.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>As businesses continue to embrace mobility, securing mobile endpoints is no longer optional\u2014it\u2019s essential. A proactive approach to <strong>mobile endpoint security management<\/strong> not only prevents cyberattacks but also ensures compliance, protects brand reputation, and empowers a flexible workforce.With 42Gears\u2019 comprehensive <a href=\"https:\/\/www.42gears.com\/solutions\/capabilities\/unified-endpoint-management\/\">UEM solution<\/a>, enterprises can confidently embrace mobility without compromising on security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With 66% of employees now using smartphones, laptops, tablets for work-related activities, mobile devices have become indispensable productivity tools\u2014but that also means every connected device can be a potential entry point for cyber threats, making mobile endpoint security management a business-critical priority. Why Mobile Endpoint Security Management Matters Cybercriminals increasingly target mobile devices because of&hellip;<\/p>\n","protected":false},"author":23,"featured_media":124381,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"latest-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10,23],"tags":[307,353],"class_list":["post-18180","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-enterprise-mobility","tag-enterprise-mobility-managament","tag-mobile-endpoint-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Endpoint Security Management | 42Gears<\/title>\n<meta name=\"description\" content=\"Protect business data with mobile endpoint security management. Secure devices, apps, and networks while ensuring compliance and productivity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Endpoint Security Management: Safeguarding Business Data in a Mobile-First World\" \/>\n<meta property=\"og:description\" content=\"Protect business data with mobile endpoint security management. Secure devices, apps, and networks while ensuring compliance and productivity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-23T17:30:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T12:02:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1076\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Upasna Kesarwani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Upasna Kesarwani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/\"},\"author\":{\"name\":\"Upasna Kesarwani\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/1fd5dbed016b9dad29c1ff022edd3ea9\"},\"headline\":\"Mobile Endpoint Security Management: Safeguarding Business Data in a Mobile-First World\",\"datePublished\":\"2025-09-23T17:30:22+00:00\",\"dateModified\":\"2025-09-24T12:02:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/\"},\"wordCount\":456,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg\",\"keywords\":[\"Enterprise Mobility Managament\",\"Mobile Endpoint Security\"],\"articleSection\":[\"Business\",\"Enterprise Mobility\"],\"inLanguage\":\"nl\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/\",\"name\":\"Mobile Endpoint Security Management | 42Gears\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg\",\"datePublished\":\"2025-09-23T17:30:22+00:00\",\"dateModified\":\"2025-09-24T12:02:30+00:00\",\"description\":\"Protect business data with mobile endpoint security management. Secure devices, apps, and networks while ensuring compliance and productivity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#breadcrumb\"},\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg\",\"width\":2000,\"height\":1076,\"caption\":\"Mobile Endpoint Security Management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Endpoint Security Management: Safeguarding Business Data in a Mobile-First World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/1fd5dbed016b9dad29c1ff022edd3ea9\",\"name\":\"Upasna Kesarwani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0a0e817fcee13af47ef40f5ad0564631eab2fc39084468a5e074bd1c85336ce4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0a0e817fcee13af47ef40f5ad0564631eab2fc39084468a5e074bd1c85336ce4?s=96&d=mm&r=g\",\"caption\":\"Upasna Kesarwani\"},\"sameAs\":[\"https:\/\/www.42gears.com\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile Endpoint Security Management | 42Gears","description":"Protect business data with mobile endpoint security management. Secure devices, apps, and networks while ensuring compliance and productivity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/","og_locale":"nl_NL","og_type":"article","og_title":"Mobile Endpoint Security Management: Safeguarding Business Data in a Mobile-First World","og_description":"Protect business data with mobile endpoint security management. Secure devices, apps, and networks while ensuring compliance and productivity.","og_url":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2025-09-23T17:30:22+00:00","article_modified_time":"2025-09-24T12:02:30+00:00","og_image":[{"width":2000,"height":1076,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg","type":"image\/jpeg"}],"author":"Upasna Kesarwani","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"Upasna Kesarwani","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/"},"author":{"name":"Upasna Kesarwani","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/1fd5dbed016b9dad29c1ff022edd3ea9"},"headline":"Mobile Endpoint Security Management: Safeguarding Business Data in a Mobile-First World","datePublished":"2025-09-23T17:30:22+00:00","dateModified":"2025-09-24T12:02:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/"},"wordCount":456,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg","keywords":["Enterprise Mobility Managament","Mobile Endpoint Security"],"articleSection":["Business","Enterprise Mobility"],"inLanguage":"nl"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/","url":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/","name":"Mobile Endpoint Security Management | 42Gears","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg","datePublished":"2025-09-23T17:30:22+00:00","dateModified":"2025-09-24T12:02:30+00:00","description":"Protect business data with mobile endpoint security management. Secure devices, apps, and networks while ensuring compliance and productivity.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#breadcrumb"},"inLanguage":"nl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg","width":2000,"height":1076,"caption":"Mobile Endpoint Security Management"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/mobile-endpoint-security-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Mobile Endpoint Security Management: Safeguarding Business Data in a Mobile-First World"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/1fd5dbed016b9dad29c1ff022edd3ea9","name":"Upasna Kesarwani","image":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0a0e817fcee13af47ef40f5ad0564631eab2fc39084468a5e074bd1c85336ce4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0a0e817fcee13af47ef40f5ad0564631eab2fc39084468a5e074bd1c85336ce4?s=96&d=mm&r=g","caption":"Upasna Kesarwani"},"sameAs":["https:\/\/www.42gears.com\/"]}]}},"author_meta":{"ID":"23","user_nicename":"upasna","user_email":"upasna.kesarwani@42gears.com","user_url":"https:\/\/www.42gears.com\/","user_registered":"2021-03-01 06:10:45","display_name":"Upasna Kesarwani","first_name":"Upasna","last_name":"Kesarwani"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2017\/03\/mobile-endpoint-security-management-with-42gears.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/18180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/comments?post=18180"}],"version-history":[{"count":6,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/18180\/revisions"}],"predecessor-version":[{"id":124379,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/18180\/revisions\/124379"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media\/124381"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media?parent=18180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/categories?post=18180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/tags?post=18180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}