{"id":79257,"date":"2023-06-30T05:36:00","date_gmt":"2023-06-30T12:36:00","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/website-refresh\/ot-security-copy\/"},"modified":"2025-07-23T10:47:16","modified_gmt":"2025-07-23T14:47:16","slug":"siem-modernization","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/","title":{"rendered":"SIEM Modernization"},"content":{"rendered":"<h1>SIEM Modernization<\/h1>\n<h3>Say goodbye to legacy SIEM costs and frustrations with a cloud-native, next-gen SIEM\/Threat Detection &amp; Response<\/h3>\n<p>Legacy SIEM (security information and event management) technology is outdated. While adequate for log management and compliance requirements, traditional SIEMs were never designed to keep up with the overwhelming volume of data in present-day security operations centers (SOCs). As a result, they kick out way too much noise. Tired of chasing down false positives, analysts end up ignoring or turning off alerts, at the risk of a data breach or cyberattack that should have been prevented.<\/p>\n<p>Schedule a demo <\/p>\n<p>\u00a0<\/p>\n<h2 class=\"c-title\">Top 3 Frustrations with Legacy SIEMs<\/h2>\n<p>The initial driver behind SIEM products in 2005 was log storage for compliance reporting. Despite advances, legacy SIEMs still cost too much, are hard to configure and produce too many alerts, making threat detection difficult and time consuming. What\u2019s more, the average SIEM fails to detect as much as 76% of attacker TTPs<sup>1<\/sup>. Security teams are looking for a better approach that meets modern threat detection requirements.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/hdd-blue-round-icon.svg\" style=\"width:45%\" alt=\"Storage and Maintenance Costs\" loading=\"lazy\"><\/p>\n<h3>Storage and<br \/>\nMaintenance Costs<\/h3>\n<p>In addition to excessive and variable log storage costs, SIEMs require ongoing maintenance and management to remain effective.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/bomb-blue-round-icon.svg\" style=\"width:45%\" alt=\"Alert Fatigue\" loading=\"lazy\"><\/p>\n<h3>Alert<br \/>\nFatigue<\/h3>\n<p>The average SOC team receives 11,000 alerts a day, or 450 alerts an hour,1 without the context needed to know severity and prioritize true threats.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/server-blue-round-icon.svg\" style=\"width:45%\" alt=\"Complex Configuration\" loading=\"lazy\"><\/p>\n<h3>Complex<br \/>\nConfiguration<\/h3>\n<p>Many SIEMS start out as black boxes with a few starter rules and no data sources. Rule tuning and onboarding data feeds for threat detection is costly and laborious.<\/p>\n<h2 class=\"c-title\">SIEM vs. Next-Gen SIEM Comparison*<\/h2>\n<p>At first glance, a Threat Detection &amp; Response tool may look like a SIEM. Both take in telemetry from across an organization\u2019s security stack to better detect threats. What they do with that data varies widely.<\/p>\n<table>\n<thead>\n<tr>\n<th><\/th>\n<th style=\"background-color: #415464\">SIEM<\/th>\n<th style=\"background-color: #415464\">Next-Gen SIEM\/Threat Detection &amp; Response<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<th>Primary Use Case<\/th>\n<td style=\"background-color: #f6f6f7\">Collect and analyze log data from various security systems and devices for correlation.<\/td>\n<td style=\"background-color: #f6f6f7\">Combine endpoint, network and cloud data to detect, investigate and respond to threats.<\/td>\n<\/tr>\n<tr>\n<th>Data Sources<\/th>\n<td style=\"background-color: #f6f6f7\">Primarily focuses on log data from security devices, applications, and infrastructure.<\/td>\n<td style=\"background-color: #f6f6f7\">Collects data from endpoints, networks, cloud environments and other security solutions, along with infrastructure and applications.<\/td>\n<\/tr>\n<tr>\n<th>Threat Detection<\/th>\n<td style=\"background-color: #f6f6f7\">Often lack context needed to detect patterns and understand threat severity, impeding security team\u2019s ability to prioritize investigation and response.<\/td>\n<td style=\"background-color: #f6f6f7\">A blend of threat detection techniques, including signatures, threat intel, behavioral analysis and machine learning\/AI-powered analytics for superior incident correlation and advanced threat detection.<\/td>\n<\/tr>\n<tr>\n<th>Incident Investigation<\/th>\n<td style=\"background-color: #f6f6f7\">Security teams manually investigate incidents by correlating events from multiple sources.<\/td>\n<td style=\"background-color: #f6f6f7\">Provides a unified analyst-centric platform, with rich contextual data and investigative and analytical tools, to investigate incidents, correlate data and respond to threats.<\/td>\n<\/tr>\n<tr>\n<th>Incident Response<\/th>\n<td style=\"background-color: #f6f6f7\">Limited automation capabilities; relies on manual response actions or third-party integrations.<\/td>\n<td style=\"background-color: #f6f6f7\">Automated response actions, such as isolating compromised devices, based on detected threats.<\/td>\n<\/tr>\n<tr>\n<th>Scalability<\/th>\n<td style=\"background-color: #f6f6f7\">May struggle with high volume and variety of log data, leading to excessive noise and false positives.<\/td>\n<td style=\"background-color: #f6f6f7\">Designed to handle massive volumes of data in a hyper-scalable, cloud-based data lake, with nothing to deploy.<\/td>\n<\/tr>\n<tr>\n<th>Visibility<\/th>\n<td style=\"background-color: #f6f6f7\">Limited to the logs and data collected from SIEM-connected sources, resulting in blind spots that limit ability to detect threats.<\/td>\n<td style=\"background-color: #f6f6f7\">Comprehensive visibility into endpoints, including IT, OT, IoT and IoMT, along with networks and cloud environments.<\/td>\n<\/tr>\n<tr>\n<th>Ecosystem Integration <\/th>\n<td style=\"background-color: #f6f6f7\">Typically integrates with a wide range of security tools to collect and correlate log data.<\/td>\n<td style=\"background-color: #f6f6f7\">Integrates with other security solutions for improved threat detection, response and visibility.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Every next-gen SIEM is different. Forescout Threat Detection &amp; Response combines vendor- and EDR-agnostic support for 180+ data sources with predictable, endpoint-based pricing; automated data normalization and enrichment; 1,500+ verified rules and models; and a two-stage threat detection engine to weed out false positives and identify true threats.<\/p>\n<h2 class=\"c-title\">A Phased Approach to SIEM Modernization<\/h2>\n<p>Not ready to replace your SIEM, which is also used outside the SOC for log storage and other operational requirements? Consider a phased transition.<\/p>\n<p>With Forescout Threat Detection &amp; Response, you can reduce the quantity of logs sent to your legacy SIEM, which reduces storage costs. The Forescout TDR license fee is based on the total number of endpoints in your organization. There are no penalties for sending more logs in support of better threat detection.<\/p>\n<h4 style=\"color: #009dea\">Phase 1: Leverage<\/h4>\n<p>Continue to leverage your existing SIEM, while leveraging additional data sources via Forescout Threat Detection &amp; Response that are not currently used or supported by your SIEM, for better detection and faster response of true threats.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-76838\" style=\"width: 100%;height: auto;margin-bottom: 30px\" src=\"\/wp-content\/uploads\/2023\/07\/SIEM-Diagram-1-Leverage.svg\" alt=\"SIEM Modernization Diagram 1 - Leverage\" width=\"700\" height=\"593\"><\/p>\n<h5>SIEM-Related Savings \u2013 $<\/h5>\n\n<ul>\n<li style=\"text-align: left\">People costs related to rules management, supporting new data sources<\/li>\n<\/ul>\n<h4 style=\"color: #009dea\">Phase 2: Migrate<\/h4>\n<p>The vast majority of relevant data sources are now directly ingested into Forescout Threat Detection &amp; Response, with use cases and rules that were used in the SIEM now recreated and fully available and operational via Forescout TDR.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-76838\" style=\"width: 100%;height: auto;margin-bottom: 30px\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/siem-diagram-2-migrate.svg\" alt=\"SIEM Modernization Diagram 2 - Migrate\" width=\"700\" height=\"593\"><\/p>\n<h5>SIEM-Related Savings \u2013 $$<\/h5>\n\n<ul>\n<li style=\"text-align: left\">Log storage costs (high volume data sources can be prioritized to maximize savings<\/li>\n<li style=\"text-align: left\">People costs related to rules management, supporting new data sources<\/li>\n<\/ul>\n<h4 style=\"color: #009dea\">Phase 3: Liberate<\/h4>\n<p>Existing SIEM can be fully sunset for security use cases once all final custom reports and dashboards are available in Forescout Threat Detection &amp; Response.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-76838\" style=\"width: 100%;height: auto;margin-bottom: 30px\" src=\"\/wp-content\/uploads\/2023\/07\/siem-diagram-3-liberate.svg\" alt=\"SIEM Modernization Diagram 3 - Liberate\" width=\"700\" height=\"593\"><\/p>\n<h5>SIEM-Related Savings \u2013 $$$<\/h5>\n\n<ul>\n<li style=\"text-align: left\">SIEM license and support costs<\/li>\n<li style=\"text-align: left\">Log storage costs<\/li>\n<li style=\"text-align: left\">People costs<\/li>\n<\/ul>\n<h2 class=\"c-title\">Related Solutions<\/h2>\n<p><a href=\"\/solutions\/threat-detection-and-response\/\" title=\"Explore Forescout TDR\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/xdr-demo-in-screen-teaser-gif.gif\" alt=\"Forescout XDR\" loading=\"lazy\"><\/a><\/p>\n<h3>Forescout Threat Detection &amp; Response<\/h3>\n<p>Improve your SOC efficiency by 450x with\u200b better detection and response of true threats\u200b.<\/p>\n<p><a href=\"\/solutions\/threat-detection-and-response\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p style=\"text-align: left\"><small><sup>1<\/sup> <a href=\"https:\/\/www.darkreading.com\/analytics\/enterprise-siem-blind-mitre-attack-coverage\" target=\"new\">Dark Reading<\/a>, Most Enterprise SIEMs Blind to MITRE ATT&amp;CK Tactics, June 27, 2023<\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SIEM Modernization Say goodbye to legacy SIEM costs and frustrations with a cloud-native, next-gen SIEM\/Threat Detection &amp; Response Legacy SIEM (security information and event management) technology is outdated. While adequate for log management and compliance requirements, traditional SIEMs were never designed to keep up with the overwhelming volume of data in present-day security operations centers [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":80914,"parent":80153,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-79257","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SIEM Software Platform &amp; Monitoring Software Tool<\/title>\n<meta name=\"description\" content=\"Security teams looking to modernize their SOC say legacy SIEMs cost too much for log storage, are hard to configure and produce too many alerts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIEM Software Platform &amp; Monitoring Software Tool\" \/>\n<meta property=\"og:description\" content=\"Security teams looking to modernize their SOC say legacy SIEMs cost too much for log storage, are hard to configure and produce too many alerts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T14:47:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/\",\"url\":\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/\",\"name\":\"SIEM Software Platform & Monitoring Software Tool\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"datePublished\":\"2023-06-30T12:36:00+00:00\",\"dateModified\":\"2025-07-23T14:47:16+00:00\",\"description\":\"Security teams looking to modernize their SOC say legacy SIEMs cost too much for log storage, are hard to configure and produce too many alerts.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Forescout Demo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/www.forescout.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SIEM Modernization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SIEM Software Platform & Monitoring Software Tool","description":"Security teams looking to modernize their SOC say legacy SIEMs cost too much for log storage, are hard to configure and produce too many alerts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/","og_locale":"en_US","og_type":"article","og_title":"SIEM Software Platform & Monitoring Software Tool","og_description":"Security teams looking to modernize their SOC say legacy SIEMs cost too much for log storage, are hard to configure and produce too many alerts.","og_url":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-07-23T14:47:16+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/","url":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/","name":"SIEM Software Platform & Monitoring Software Tool","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","datePublished":"2023-06-30T12:36:00+00:00","dateModified":"2025-07-23T14:47:16+00:00","description":"Security teams looking to modernize their SOC say legacy SIEMs cost too much for log storage, are hard to configure and produce too many alerts.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/solutions\/siem-modernization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","width":1200,"height":628,"caption":"Forescout Demo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/solutions\/siem-modernization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.forescout.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"SIEM Modernization"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=79257"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79257\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80914"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=79257"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=79257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}