{"id":63332,"date":"2021-02-16T20:53:14","date_gmt":"2021-02-17T04:53:14","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=63332"},"modified":"2021-02-16T20:55:50","modified_gmt":"2021-02-17T04:55:50","slug":"customer-corner-south-central-power-company-on-implementing-zero-trust","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/","title":{"rendered":"Customer Corner: South Central Power Company on Implementing Zero Trust"},"content":{"rendered":"<p>When South Central Power Company underwent a penetration test, they realized they had to make some changes. The company dove headfirst into implementing Zero Trust principles across their organization, including in both IT and operational technology (OT) environments. The result was a significant improvement to the organization\u2019s cybersecurity posture across the entire extended enterprise.<\/p>\n<p>Those cybersecurity capabilities were put to the test last year, as South Central had to transition nearly overnight to a remote workforce. By leveraging the principles of Zero Trust and the technologies they already had in place, the team was able to ensure smooth and secure operations, even with hundreds of employees now connecting in to corporate or OT networks from remote locations.<\/p>\n<p>I sat down with Jeff Haidet, Director of Application Development and Architecture, to discuss this journey, including how they went about implementing Zero Trust and their learnings as an organization along the way:<\/p>\n<p><strong>Tell us a little bit about your network infrastructure and what types of Enterprise of Things devices are present in your environment.<\/strong><\/p>\n<p>At South Central, we have broken traditional IT into three buckets. The first is systems, which includes the physical machines and items that people use. The second is pure networking, such as data transport switches and wide area networking. Finally, there\u2019s applications, which is what I oversee and comprises of enterprise applications, license management, release management, and software development.<\/p>\n<p>Security is the overarching item that stretches across every one of those buckets, from the front-facing applications to our customers and securing payments to laptops, cellphones, tablets and computers. We also have regulatory compliance needs and critical infrastructure technology. Some of these devices, particularly when it comes to critical infrastructure, are older \u2013 sometimes 30 years old or more. The result is a wide variety of devices that we have to secure and maintain.<\/p>\n<p><strong>What event opened your eyes to the importance of Zero Trust in your cybersecurity strategy?<\/strong><\/p>\n<p>Back in 2015, we did an in-depth penetration test to help us illustrate and prioritize risk and we\u2019ve been working on the long-term remediation since. Some of the things we discovered were easy to correct, but others took a bit more work. One of those areas was network segmentation. We needed to be way more granular and have way more visibility into our environments. Adding Forescout a year ago allowed us to make a leap forward with this remediation. That was when we began our Zero Trust journey in full and Forescout helped us execute on that.<\/p>\n<p>We knew we wanted to bolster our posture going forward. This not only helps us achieve our security goals today, but also puts us in a position to respond to any future regulatory requirements that may emerge. This is all about being preventative and proactive \u2013 we can\u2019t protect what we do not know. We can\u2019t manage it if we don\u2019t see it.<\/p>\n<p><strong>What were some of the challenges you encountered in your transition to implementing Zero Trust?<\/strong><\/p>\n<p>When we first started, we really didn\u2019t have a clue as to how many IP-based devices we had on our network. One of our initial goals was to get to a strong level of visibility across all our devices, from those used by our internal employees to our linemen. What we found is that we average around 7 to 8 different devices per employee &#8211; significantly higher than our estimates. Having that visibility opened our senior leadership\u2019s eyes to the importance of having strong device visibility and control.<\/p>\n<p>We were able to get the software installed in under a day and within two to three days had full visibility. From there, we took about two to three weeks for device classification. This set the foundation for initial rules and then segmentation, which allowed us to put our Zero Trust strategy into action.<\/p>\n<p style=\"margin-left:0;\"><strong>What are some examples of how you are using the Forescout platform to ensure Zero Trust?<\/strong><\/p>\n<p>One example is around patching. We have a third-party tool that manages our Windows patch status, but we are able to use Forescout eyeSight to have a policy that reviews to make sure that those patches are being applied in a timely manner and raises alerts if they are not patched. If we find a critical vulnerability that\u2019s greater than 30 days old, for example, we force that to be remediated prior to being able to join the network on the trusted side of the network.<\/p>\n<p style=\"margin-left:0;\"><strong>How do you determine when and where to segment various device types?<\/strong><\/p>\n<p>Our initial stance on everything is \u201ctrust nothing.\u201d When it comes to segmentation and Zero Trust, that means looking at the traffic, determining what needs to talk to what and clearing that traffic out. We can have discussions about individual groups of machines, their functions and anything that deviates from those base case situations is not trusted.<\/p>\n<p>This evaluation happens on an on-going basis. If anything does fall off the reservation, something has changed. Whether that\u2019s a software update, whether that\u2019s a vendor doing something that they shouldn\u2019t be doing or is not documented somewhere, we are able to root those things out. We can do that because we now have full visibility into the Matrix, if you will, between the different segments.<\/p>\n<p style=\"margin-left:0;\"><strong>How do you do a policy enforcement without knowing it\u2019s going to break something?<\/strong><\/p>\n<p>We don\u2019t. In this model of Zero Trust, we have to make the assumption that we are willing to break something. That is because, if it breaks you probably didn\u2019t know about it and it is likely some obscure function that somebody is doing. It\u2019s not likely to be your everyday stuff. That said, it doesn\u2019t happen as often as you might think. Once you are able to standardize your footprint of your applications, you very rarely go off the rails.<\/p>\n<p>While we\u2019ve decided we\u2019d rather break something than let it remain insecure in the name of Zero Trust, we also have the power of simulation on our side. Using eyeSegment, we can test if a change in deny posture or a changing policy could have an unexpected ramification across the network. The simulate feature allows us to basically double-check our work before we make it live.<\/p>\n<p style=\"margin-left:0;\"><strong>How has COVID and remote work affected or validated your Zero Trust strategy?<\/strong><\/p>\n<p>In order to ensure the health and safety of our employees, we moved from less than 50 employees regularly using VPN access to more than 250 people within just a few days. With such a newly distributed workforce, we knew we needed to be able to monitor the traffic patterns for people in the VPN segments, as well as ensure they are updated to our patch policies, no rogue software is being uploaded on them and that all anti-malware is up to date. We felt our security posture was drastically improved because of this visibility, even with so many of our employees working remotely.<\/p>\n<p><em>To read more about how South Central Power was able to gain visibility, compliance and Zero Trust network segmentation with Forescout, read the <a href=\"\/company\/resources\/south-central-power-company\/\" target=\"_blank\" rel=\"noopener\">full case study here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When South Central Power Company underwent a penetration test, they realized they had to make some changes. The company dove headfirst into implementing Zero Trust principles across their organization, including in both IT and operational technology (OT) environments. The result was a significant improvement to the organization\u2019s cybersecurity posture across the entire extended enterprise. Those [&hellip;]<\/p>\n","protected":false},"author":142,"featured_media":63333,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[652],"class_list":["post-63332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Customer Corner: South Central Power Company on Implementing Zero Trust - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Customer Corner: South Central Power Company on Implementing Zero Trust - Forescout\" \/>\n<meta property=\"og:description\" content=\"When South Central Power Company underwent a penetration test, they realized they had to make some changes. The company dove headfirst into implementing Zero Trust principles across their organization, including in both IT and operational technology (OT) environments. The result was a significant improvement to the organization\u2019s cybersecurity posture across the entire extended enterprise. Those [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-17T04:53:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-17T04:55:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"561\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jon Connet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/\"},\"author\":{\"name\":\"Jon Connet\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/d7a034b7c166cc4fc6cdde4bd7db3b67\"},\"headline\":\"Customer Corner: South Central Power Company on Implementing Zero Trust\",\"datePublished\":\"2021-02-17T04:53:14+00:00\",\"dateModified\":\"2021-02-17T04:55:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/\"},\"wordCount\":1199,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/\",\"name\":\"Customer Corner: South Central Power Company on Implementing Zero Trust - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png\",\"datePublished\":\"2021-02-17T04:53:14+00:00\",\"dateModified\":\"2021-02-17T04:55:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png\",\"width\":1024,\"height\":561},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Customer Corner: South Central Power Company on Implementing Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/d7a034b7c166cc4fc6cdde4bd7db3b67\",\"name\":\"Jon Connet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/76091b4819002b50d6acf25d896db31b\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/16d60064aa129de90d15266746b038b913e31c9ea7c4436e822ec5a4ee391d72?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/16d60064aa129de90d15266746b038b913e31c9ea7c4436e822ec5a4ee391d72?s=96&d=mm&r=g\",\"caption\":\"Jon Connet\"},\"sameAs\":[\"https:\/\/www.forescout.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Customer Corner: South Central Power Company on Implementing Zero Trust - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Customer Corner: South Central Power Company on Implementing Zero Trust - Forescout","og_description":"When South Central Power Company underwent a penetration test, they realized they had to make some changes. The company dove headfirst into implementing Zero Trust principles across their organization, including in both IT and operational technology (OT) environments. The result was a significant improvement to the organization\u2019s cybersecurity posture across the entire extended enterprise. Those [&hellip;]","og_url":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2021-02-17T04:53:14+00:00","article_modified_time":"2021-02-17T04:55:50+00:00","og_image":[{"width":1024,"height":561,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png","type":"image\/png"}],"author":"Jon Connet","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/"},"author":{"name":"Jon Connet","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/d7a034b7c166cc4fc6cdde4bd7db3b67"},"headline":"Customer Corner: South Central Power Company on Implementing Zero Trust","datePublished":"2021-02-17T04:53:14+00:00","dateModified":"2021-02-17T04:55:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/"},"wordCount":1199,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/","url":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/","name":"Customer Corner: South Central Power Company on Implementing Zero Trust - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png","datePublished":"2021-02-17T04:53:14+00:00","dateModified":"2021-02-17T04:55:50+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png","width":1024,"height":561},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/customer-corner-south-central-power-company-on-implementing-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Customer Corner: South Central Power Company on Implementing Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/d7a034b7c166cc4fc6cdde4bd7db3b67","name":"Jon Connet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/76091b4819002b50d6acf25d896db31b","url":"https:\/\/secure.gravatar.com\/avatar\/16d60064aa129de90d15266746b038b913e31c9ea7c4436e822ec5a4ee391d72?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16d60064aa129de90d15266746b038b913e31c9ea7c4436e822ec5a4ee391d72?s=96&d=mm&r=g","caption":"Jon Connet"},"sameAs":["https:\/\/www.forescout.com"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/02\/FS-QA-Blog-02-10-21.png","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/63332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/142"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=63332"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/63332\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/63333"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=63332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=63332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=63332"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=63332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}