{"id":79232,"date":"2023-06-28T14:25:54","date_gmt":"2023-06-28T21:25:54","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=79232"},"modified":"2023-07-10T09:21:57","modified_gmt":"2023-07-10T16:21:57","slug":"go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/","title":{"rendered":"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk"},"content":{"rendered":"<p>When I joined Forescout as CEO six months ago, I was excited to partner with our strong employees, management team and board as we take the company through its <a href=\"\/blog\/company-update-from-ceo-barry-mainz\/\">next phase of growth<\/a>. Today I\u2019m pleased to announce enhancements to the Forescout\u00ae Platform that will help customers fully understand the risk posture of their attack surface and enable their security teams to focus on remediating the assets that pose the most risk.<\/p>\n<h3>Build on a core foundation of visibility and control<\/h3>\n<p>The Forescout Platform is the only automated cybersecurity platform that offers continuous discovery, assessment and control of all managed and unmanaged connected assets \u2013 IT, IoT, IoMT and OT \u2013 from campus to data center to edge. It plays a critical role in the cyber defense of many of the largest and best-known enterprises and agencies around the globe. Our customers report that they see over 30% more assets in their environment than previously known when they deploy our platform.<\/p>\n<p>Still, we consistently hear from customers the need to derive even greater value \u2013 to not only understand the details and risks of connected devices but be able to take the best actions based on accurate information.<\/p>\n<p>What I\u2019ve heard loud and clear, particularly from our customer advisory board members, is this:<\/p>\n<ul>\n<li><em>Can you give me a clear picture of my attack surface and the gaps in my security tools? <\/em><\/li>\n<li><em>What\u2019s the biggest gap in my defenses? <\/em><\/li>\n<li><em>Which vulnerability is most likely to get exploited by an attacker? <\/em><\/li>\n<li><em>Do I have any gaps or misconfigurations that mean I\u2019ll fail my next audit?<\/em><\/li>\n<li><em>Which problems should we fix first?<\/em><\/li>\n<\/ul>\n<h3>Prove the effectiveness of your strategy and investments<\/h3>\n<p>Today, CISOs must not only reduce actual risk and exposure but be able to <em>prove<\/em> to their boards the value of their security investments. If ChatGPT were to summarize my conversations with customers, it might say something like this:<\/p>\n<p><em>We love the real-time contextual asset data provided by Forescout\u00ae eyeSight but are struggling to know how to best use the data to implement controls. We have policies in place but don\u2019t know how effective they are at reducing our exposure, and we need to be able to report a reduction in risk over time, for compliance, audit and other business mandates.<\/em><\/p>\n<p>In other words, you need a simplified way to maintain both <strong>real-time <\/strong>and<strong> persistent asset intelligence<\/strong> for every connected device \u2013 managed or unmanaged, physical or virtual, including OT\/ICS, IoT devices and specialty subsets like medical devices. The platform enhancements we are making will provide that intelligence to help you effectively prove a reduction in risk posture of your attack surface.<\/p>\n<p>Persistent asset intelligence is also essential for more effective threat detection, and for faster investigation of a breach or incident to pinpoint the root cause, such as when a compromised device\u2019s configuration or risk posture changed. You could then identify similar devices and exposure gaps to fix the issues before another incident occurs.<\/p>\n<h3>Identify, quantify and prioritize cybersecurity risk<\/h3>\n<p>The new risk exposure and management capabilities in the Forescout Platform will enhance your security posture by:<\/p>\n<ul>\n<li><strong>Identifying<\/strong> the exposure of your attack surface<\/li>\n<li><strong>Quantifying<\/strong> the risk presented to your organization<\/li>\n<li><strong>Prioritizing<\/strong> remediation actions through guided mitigation, historical context and a risk-based approach to incident response<\/li>\n<\/ul>\n<p>Our newest platform enhancements include a cloud-native multifactor risk score that combines attributes from the configuration, function and behavior of every connected asset. You can see overall risk presented as a whole, in executive-style dashboards, and as risk over time for each individual asset for the past 90 days. The score correlates all the asset data that we collect to help you understand the true risk of each device and overall risk posture of your entire attack surface.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-79233\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png\" alt=\"Identify, quantify and prioritize cybersecurity risk\" width=\"564\" height=\"256\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png 564w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1-300x136.png 300w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><\/h3>\n<h3>More consolidated risk management news to come<\/h3>\n<p>The platform enhancements I\u2019m describing here are game changing for security professionals, especially if you\u2019re a current Forescout customer. I hope you also recognize that they are incremental changes to a strong, enduring platform that extends the power of what you already have.<\/p>\n<p>We look forward to sharing more details about our new risk and exposure management solution in the coming weeks. In the meantime, please book a meeting with your account manager, or schedule a demo to learn more.<\/p>\n<a href=\"\/demo\/\"  title=\"REQUEST A DEMO\" class=\"c-btn c-btn--primary icon-position-right\"><span class=\"cta-button-text\">REQUEST A DEMO<\/span><\/a>\n","protected":false},"excerpt":{"rendered":"<p>When I joined Forescout as CEO six months ago, I was excited to partner with our strong employees, management team and board as we take the company through its next phase of growth. Today I\u2019m pleased to announce enhancements to the Forescout\u00ae Platform that will help customers fully understand the risk posture of their attack [&hellip;]<\/p>\n","protected":false},"author":174,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[738],"class_list":["post-79232","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk - Forescout<\/title>\n<meta name=\"description\" content=\"Cybersecurity risk and exposure management enables security teams to understand the attack surface and focus on remediating cyber assets that pose the most risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk - Forescout\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity risk and exposure management enables security teams to understand the attack surface and focus on remediating cyber assets that pose the most risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T21:25:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-10T16:21:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png\" \/>\n<meta name=\"author\" content=\"Barry Mainz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/\"},\"author\":{\"name\":\"Barry Mainz\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/7ac726b9057dc740a9a2e59dd3e0641e\"},\"headline\":\"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk\",\"datePublished\":\"2023-06-28T21:25:54+00:00\",\"dateModified\":\"2023-07-10T16:21:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/\"},\"wordCount\":734,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/\",\"name\":\"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png\",\"datePublished\":\"2023-06-28T21:25:54+00:00\",\"dateModified\":\"2023-07-10T16:21:57+00:00\",\"description\":\"Cybersecurity risk and exposure management enables security teams to understand the attack surface and focus on remediating cyber assets that pose the most risk.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png\",\"width\":564,\"height\":256,\"caption\":\"Identify, quantify and prioritize cybersecurity risk\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/7ac726b9057dc740a9a2e59dd3e0641e\",\"name\":\"Barry Mainz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/66fa8e5024f161066cf3c68569e1c33a\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/296573c38cf686aa081a9bfddcd31fb1ead4f51d84a2f074aeb9e33bbfa83ff6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/296573c38cf686aa081a9bfddcd31fb1ead4f51d84a2f074aeb9e33bbfa83ff6?s=96&d=mm&r=g\",\"caption\":\"Barry Mainz\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk - Forescout","description":"Cybersecurity risk and exposure management enables security teams to understand the attack surface and focus on remediating cyber assets that pose the most risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/","og_locale":"en_US","og_type":"article","og_title":"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk - Forescout","og_description":"Cybersecurity risk and exposure management enables security teams to understand the attack surface and focus on remediating cyber assets that pose the most risk.","og_url":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2023-06-28T21:25:54+00:00","article_modified_time":"2023-07-10T16:21:57+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png","type":"","width":"","height":""}],"author":"Barry Mainz","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/"},"author":{"name":"Barry Mainz","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/7ac726b9057dc740a9a2e59dd3e0641e"},"headline":"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk","datePublished":"2023-06-28T21:25:54+00:00","dateModified":"2023-07-10T16:21:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/"},"wordCount":734,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/","url":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/","name":"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png","datePublished":"2023-06-28T21:25:54+00:00","dateModified":"2023-07-10T16:21:57+00:00","description":"Cybersecurity risk and exposure management enables security teams to understand the attack surface and focus on remediating cyber assets that pose the most risk.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/Picture1.png","width":564,"height":256,"caption":"Identify, quantify and prioritize cybersecurity risk"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/go-beyond-device-visibility-to-prioritize-and-act-on-cybersecurity-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Go Beyond Device Visibility to Prioritize and Act on Cybersecurity Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/7ac726b9057dc740a9a2e59dd3e0641e","name":"Barry Mainz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/66fa8e5024f161066cf3c68569e1c33a","url":"https:\/\/secure.gravatar.com\/avatar\/296573c38cf686aa081a9bfddcd31fb1ead4f51d84a2f074aeb9e33bbfa83ff6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/296573c38cf686aa081a9bfddcd31fb1ead4f51d84a2f074aeb9e33bbfa83ff6?s=96&d=mm&r=g","caption":"Barry Mainz"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/79232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/174"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=79232"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/79232\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=79232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=79232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=79232"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=79232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}