{"id":1662,"date":"2016-05-02T14:00:49","date_gmt":"2016-05-02T14:00:49","guid":{"rendered":""},"modified":"2023-05-31T16:33:06","modified_gmt":"2023-05-31T23:33:06","slug":"managing-security-in-a-multi-vendor-multi-cloud-environment","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/","title":{"rendered":"Managing security in a multi-vendor, multi-cloud environment"},"content":{"rendered":"<p>Managing a secure enterprise has dramatically changed over the last 12 months.No longer are government agencies storing all their data in a self-contained repository on-premises. Today, governments are embracing the cloud for at least some of their workloads, working with multiple cloud and software-as-a-service providers. In addition, their employees are far more mobile, performing their jobs from a far wider range of devices and locations than was once possible. While these new ways of working are dramatically boosting productivity, both the frequency and sophistication of cyberattacks are increasing. Unfortunately, the average attacker now resides within a victim\u2019s network for more than 200 days before being detected.<\/p>\n<p>As the IT landscape becomes more complex, government agencies need a more advanced approach to securing their infrastructures. In a nutshell, today\u2019s IT administrators need intelligent tools to help their employees be productive from anywhere\u2014while guarding user identity, protecting sensitive content, and efficiently detecting suspicious activity across the network. Microsoft can help governments achieve these goals. Consider the following:<\/p>\n<h2>Managing user identity<\/h2>\n<p>Today, 75 percent of all network intrusions can be traced back to compromised user credentials. Responding to this trend, governments have worked diligently to move away from traditional user names and passwords to deploy multi-factor authentication. Yet they need a simple way to manage identities across numerous applications obtained from different vendors, hosted within different cloud environments, and accessed from a wide variety of devices. Rather than requiring customers to implement multi-factor authentication separately for each application, <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/server-cloud\/products\/azure-active-directory\/\">Microsoft Azure Active Directory<\/a> Premium provides single sign-on for numerous cloud-based applications\u2014including those from Cisco, Box, Salesforce, Google, and thousands of others\u2014across all major mobile device platforms including Windows, Android, and iOS.<\/p>\n<p>In addition, Azure Active Directory Premium can help government agencies intelligently assess whether they should grant user access based on factors such as the health of the devices they\u2019re using and the location from which they\u2019re trying to log in\u2014whether it\u2019s a secure government facility or a coffee shop with unencrypted, wireless access. Using Azure Active Directory in combination with <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/server-cloud\/products\/microsoft-intune\/\">Microsoft Intune<\/a>, IT administrators can determine how mobile devices will be managed and which policies will be applied in each instance. Conditional access is critical to maintaining security\u00a0because today\u2019s mobile workforce will leverage wide variety of networks and devices along with the same credentials and authentication types.<\/p>\n<h2>Protecting sensitive content regardless of location<\/h2>\n<h2><img decoding=\"async\" class=\"alignright size-full wp-image-257711\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/05\/RRMS_screenshot.jpg\" alt=\"multi-cloud environment\" \/><\/h2>\n<p>Once government agencies have established a sound identity management platform, often their next priority is to secure their content. While it was once sufficient to protect the castle by simply locking the doors, today\u2019s IT administrators need to protect confidential files in a mobile environment in which data regularly gets passed around from PCs to tablets to smartphones outside the physical walls of the building. <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/server-cloud\/products\/azure-rights-management\/\"><u>Microsoft Azure Rights Management<\/u><\/a> enables agencies and enterprises to encrypt content, safely sharing files as they move around among users and unmanaged devices\u2014even protecting documents that end up being publicly posted.<\/p>\n<p>Using Azure Rights Management, employees can <a href=\"https:\/\/blogs.office.com\/2015\/09\/30\/data-loss-prevention-in-onedrive-for-business-sharepoint-online-and-office-2016-is-rolling-out\/\">protect sensitive data<\/a> on any Office 2016 document including Microsoft Word, PowerPoint, Excel, and Outlook\u2014for example, by mandating that users not forward or print certain files, or that perhaps content cannot be copied form the document at any time. Likewise, IT administrators can automatically apply requirements to files sitting in a SharePoint repository, or to emails as they move through the Exchange messaging system\u2014designating that certain documents not be forwarded outside the organization or that confidential files can only be read by authorized employees.<\/p>\n<h2>Detecting and responding to network threats<\/h2>\n<p>For governments to efficiently respond to security threats, they must also be able to detect potential breaches across their network. <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/server-cloud\/products\/advanced-threat-analytics\/\">Microsoft Advanced Threat Analytics<\/a> (ATA) provides a simple and fast way to identify malicious attacks, identity theft, and potential cases of data loss. ATA leverages deep-packet inspection technology as well as information from multiple data sources to build an Organizational Security Graph that helps organizations understand normal traffic patterns on a detailed level. By learning the ways in which employees normally access data, ATA can more accurately pinpoint true abnormalities\u2014say, for example, that someone tried to log in numerous times in the last five minutes from different devices on multiple continents. ATA helps to eliminate the false positives while focusing IT administrators on the true threats they face so they can quickly take action.<\/p>\n<p>Today\u2019s complex IT landscape requires an intelligent set of tools to prevent identity theft, protect confidential government content, and minimize malicious attacks across the network. Please see the <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/server-cloud\/enterprise-mobility\/overview.aspx\">Microsoft Enterprise Mobility<\/a> webpage to learn more about how Microsoft is delivering these capabilities in today\u2019s cloud-first, mobile-first world.<img decoding=\"async\" class=\"aligncenter size-full wp-image-257701\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/05\/Microsoft_Advanced_Threat_Analytics_screenshot.jpg\" alt=\"multi-cloud environment\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft offers a sophisticated set of tools in a multi-cloud environment to help governments protect content and pinpoint suspicious activity.<\/p>\n","protected":false},"author":0,"featured_media":9798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1515],"post_tag":[],"content-type":[1483],"coauthors":[952],"class_list":["post-1662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing security in a multi-vendor, multi-cloud environment - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing security in a multi-vendor, multi-cloud environment - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Microsoft offers a sophisticated set of tools in a multi-cloud environment to help governments protect content and pinpoint suspicious activity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-02T14:00:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T23:33:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"339\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 min read\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Kent Cunningham\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/kent-cunningham_1\/\",\"@type\":\"Person\",\"@name\":\"Kent Cunningham\"}],\"headline\":\"Managing security in a multi-vendor, multi-cloud environment\",\"datePublished\":\"2016-05-02T14:00:49+00:00\",\"dateModified\":\"2023-05-31T23:33:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/\"},\"wordCount\":786,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg\",\"articleSection\":[\"Government\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/\",\"name\":\"Managing security in a multi-vendor, multi-cloud environment - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg\",\"datePublished\":\"2016-05-02T14:00:49+00:00\",\"dateModified\":\"2023-05-31T23:33:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg\",\"width\":1200,\"height\":339,\"caption\":\"multi-cloud environment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing security in a multi-vendor, multi-cloud environment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managing security in a multi-vendor, multi-cloud environment - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/","og_locale":"en_US","og_type":"article","og_title":"Managing security in a multi-vendor, multi-cloud environment - Microsoft Industry Blogs","og_description":"Microsoft offers a sophisticated set of tools in a multi-cloud environment to help governments protect content and pinpoint suspicious activity.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2016-05-02T14:00:49+00:00","article_modified_time":"2023-05-31T23:33:06+00:00","og_image":[{"width":1200,"height":339,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 min read","Written by":"Kent Cunningham"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/kent-cunningham_1\/","@type":"Person","@name":"Kent Cunningham"}],"headline":"Managing security in a multi-vendor, multi-cloud environment","datePublished":"2016-05-02T14:00:49+00:00","dateModified":"2023-05-31T23:33:06+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/"},"wordCount":786,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg","articleSection":["Government"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/","name":"Managing security in a multi-vendor, multi-cloud environment - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg","datePublished":"2016-05-02T14:00:49+00:00","dateModified":"2023-05-31T23:33:06+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Genomics-Partner-Image1.jpg","width":1200,"height":339,"caption":"multi-cloud environment"},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2016\/05\/02\/managing-security-in-a-multi-vendor-multi-cloud-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Managing security in a multi-vendor, multi-cloud environment"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/1662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=1662"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/1662\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/9798"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=1662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=1662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=1662"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=1662"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=1662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}