{"id":20320,"date":"2020-02-19T15:54:50","date_gmt":"2020-02-19T20:54:50","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=20320"},"modified":"2024-06-03T13:36:24","modified_gmt":"2024-06-03T17:36:24","slug":"how-to-start-selling-managed-security","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/","title":{"rendered":"How to start selling managed security"},"content":{"rendered":"<p>MSPs and MSSPs face a daunting task when it comes to providing SMBs with network security. For starters, your clients will often place high expectations on your managed security practices, especially <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-10-23-gartner-says-global-it-spending-to-grow-3point7-percent-in-2020\">now more than ever<\/a>. But even with powerful tools and processes set up to protect against cyberattacks, no security plan can construct a total foolproof environment.<\/p>\n<p>Secondly, building your offering in today\u2019s crowded security marketplace can be tricky. With countless tools and products to choose from, how do you know if you\u2019re providing your clients with the services they need to successfully protect against today\u2019s evolving threats?<\/p>\n<p>In this article, you\u2019ll learn why taking on a comprehensive and multi-layered approach to selling security is critical and how to get started.<\/p>\n<h2><strong>Build your offering<\/strong><\/h2>\n<p>If you\u2019re considering entering the managed security space, you need to make it your strong suit and differentiation. After all, the managed security services market is expected to exceed more than <a href=\"https:\/\/www.globenewswire.com\/news-release\/2022\/07\/06\/2474648\/0\/en\/Managed-Security-Services-Market-Growth-Trends-COVID-19-Impact-and-Forecasts-2022-2027.html\">$56 billion<\/a> by 2027, which also means increased competition.<\/p>\n<p>You also need to keep in mind that the landscape of cyber threats is constantly evolving and becoming more complex, forcing businesses to implement advanced defenses that secure all endpoints to prevent a data breach.<\/p>\n<p>When building your tech stack, it\u2019s imperative that you consider all possible scenarios, such as outages, disasters, breaches and inefficiencies \u2013 and ensure that there are no vulnerable gaps and oversights in security coverage. Start by choosing proven solutions that make the most sense for both you and your end-customers while also making sure they offer multiple defense capabilities that suit companies of any size or scope.<\/p>\n<p>Below are examples of advanced security solutions and services you can combine to deliver the best possible protection.<\/p>\n<p><strong>Monitoring \u2013<\/strong> Many businesses think that products like Microsoft Office 365 are automatically secure. Unfortunately, SMBs with budgetary constraints or low operation overhead are unable to take advantage of additional security features within Office 365 or monitor their systems around the clock.<\/p>\n<p>Here\u2019s your opportunity to reinforce your offering with enhanced security. Look for innovative products that are designed to stay on top of security events and keep user data safe across all Office 365 apps.<\/p>\n<p><a href=\"https:\/\/www.sherweb.com\/office-365\/security\/\">Office Protect<\/a>, for example, does all that while simultaneously saving you the time and knowledge it takes to properly manage those security settings by providing:<\/p>\n<ul>\n<li><strong>Proactive monitoring; <\/strong>detecting and preventing threats in real-time<\/li>\n<li><strong>Best practice security settings<\/strong>; protecting users and their data through an audit log that\u2019s always enabled, multi-factor authentication, human error prevention, spam alerts and much more<\/li>\n<li><strong>Centralized access<\/strong> via an easy-to-use dashboard that provides all the necessary tools and reports to help you manage an environment\u2019s security<\/li>\n<\/ul>\n<p><strong>Email protection \u2013<\/strong> As one of the most widely used business communication platforms, email is an easy target for malware, phishing and spam. To make matters worse, cyber criminals continue to find new ways to target vulnerable systems and employees to access data.<\/p>\n<p>Help your clients build stronger defenses against the most sophisticated threats with email security. The ideal solution offers comprehensive protection that implements industry-leading security practices and tools to safeguard data, such as email filtering and advanced threat detection.<\/p>\n<p>You can find these capabilities in <a href=\"https:\/\/www.sherweb.com\/security\/email-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Proofpoint email protection<\/a>, for example.<\/p>\n<p><strong>Authentication \u2013 <\/strong>Today\u2019s changing workspace allows employees to access private information from within and outside the walls of an organization in a variety of ways. We\u2019re talking mobile devices, personal laptops and different types of login systems. Using multi-factor authentication blocks <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-using-multi-factor-authentication-blocks-99-9-of-account-hacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">99.99%<\/a> of account hacks by accurately validating a user\u2019s login credibility. It\u2019s a simple and straightforward security measure regardless of where private information is accessed.<\/p>\n<p><strong>Backup &amp; disaster recovery \u2013<\/strong> A large part of selling managed security services is giving clients a game plan when they ask you the all-important question: \u201cWhat happens if a security breach does happen?\u201d<\/p>\n<p>When selecting the right tools to top off your security stack, think about the kinds of <a href=\"https:\/\/www.sherweb.com\/cloud\/veeam-cloud-connect\/\" target=\"_blank\" rel=\"noopener noreferrer\">backup and recovery solutions<\/a> you would want to rely on as a provider and for the benefit of your clients. How well do you want them to be protected? What\u2019s the recovery target time? What\u2019s your <a href=\"https:\/\/www.sherweb.com\/online-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\">backup storage strategy<\/a>?<\/p>\n<p>By stepping back and looking at what\u2019s required to execute a swift backup and recovery with minimal downtime, you\u2019ll be able to match solutions that meet your client\u2019s needs. The best way to do that is by working with them to assess their goals and priorities.<\/p>\n<p><strong>Endpoint detection &amp; response \u2013<\/strong> As we mentioned earlier, a layered security approach delivers the best possible protection.<\/p>\n<p>Because businesses are operating in a highly dynamic environment, they need security measures that block attacks using detection and response capabilities across all endpoints. Unfortunately, many service providers lack the in-house security expertise and tools to defend against advanced threats.<\/p>\n<p>One way you can fill this gap is with a proven endpoint solution like <a href=\"https:\/\/www.sherweb.com\/security\/endpoint-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bitdefender<\/a>. Consistently leading tests for protection with the lowest impact on systems, Bitdefender uses advanced security layers that work together to detect and stop a breach early. By leveraging this solution, you can combine and easily manage multiple service offerings through a broad range of features and enhancements from a single console.<\/p>\n<h2><strong>Educate your clients<\/strong><\/h2>\n<p>Getting the conversation started about security can be challenging. This is especially true if a client doesn\u2019t have a clear understanding of what being secure actually means in today\u2019s business world.<\/p>\n<p>One way to break the barrier is to show them how much risk they\u2019re facing in the event of a disaster, from lost revenue to downtime costs. Ultimately, the conversation will lead to how you will manage those risks through your service offering while helping to achieve their business goals.<\/p>\n<p>To best demonstrate the value of your solution package, it\u2019s a good idea to first try the products you\u2019re pitching on your own network. This will help you see if they\u2019re easy to use and whether they fill a gap or make sense for your individual clients, making it easier for you to explain why you see a need for the solutions.<\/p>\n<p>Of course, security discussions mean nothing without putting proper training, policies and processes in place. That\u2019s why it\u2019s important to communicate with your clients on a regular basis and educate them on threats and best practices, which helps to strengthen your partnership with them.<\/p>\n<h2><strong>Work with a strategic partner<\/strong><\/h2>\n<p>Many MSPs manage multiple technology vendors. Whether or not you have the resources to do so, a lot of time goes into choosing the right vendor. This includes evaluating and qualifying them for their innovative products, offerings, services and the prospect of building a long-term business relationship.<\/p>\n<p>The last thing you want is to jeopardize your credibility by adding an excess of security products to your tech stack without an effective plan around data protection, business continuity, recovery, management and communication protocol.<\/p>\n<p>In order to realize growth, align yourself with a strategic partner that makes your life easier and saves you time. Partnering with \u00a0cloud solutions provider like <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partners\/\">Sherweb<\/a>, for example, will support you in every aspect of your business; arming you with the right tools, knowledge, skills and the best business-critical solutions that suit both your business needs and customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSPs and MSSPs face a daunting task when it comes to providing SMBs with network security. For st","protected":false},"author":177,"featured_media":20325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919,942],"class_list":["post-20320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-managed-service-providers-msps"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to start selling managed security | Sherweb Security<\/title>\n<meta name=\"description\" content=\"learn why taking on a comprehensive and multi-layered approach to selling managed security is critical and how you should get started.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to start selling managed security | Sherweb Security\" \/>\n<meta property=\"og:description\" content=\"learn why taking on a comprehensive and multi-layered approach to selling managed security is critical and how you should get started.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-19T20:54:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T17:36:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Selling-managed-security-1200x630.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Selling-managed-security-1200x630.png\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"How to start selling managed security\",\"datePublished\":\"2020-02-19T20:54:50+00:00\",\"dateModified\":\"2024-06-03T17:36:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/\"},\"wordCount\":1213,\"commentCount\":2,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Selling-managed-security-1200x460.png\",\"keywords\":[\"Cybersecurity\",\"Managed Service Providers (MSPs)\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/\",\"name\":\"How to start selling managed security | Sherweb Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Selling-managed-security-1200x460.png\",\"datePublished\":\"2020-02-19T20:54:50+00:00\",\"dateModified\":\"2024-06-03T17:36:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"learn why taking on a comprehensive and multi-layered approach to selling managed security is critical and how you should get started.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Selling-managed-security-1200x460.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Selling-managed-security-1200x460.png\",\"width\":1200,\"height\":460,\"caption\":\"managed security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/how-to-start-selling-managed-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to start selling managed security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to start selling managed security | Sherweb Security","description":"learn why taking on a comprehensive and multi-layered approach to selling managed security is critical and how you should get started.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/","og_locale":"en_US","og_type":"article","og_title":"How to start selling managed security | Sherweb Security","og_description":"learn why taking on a comprehensive and multi-layered approach to selling managed security is critical and how you should get started.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2020-02-19T20:54:50+00:00","article_modified_time":"2024-06-03T17:36:24+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Selling-managed-security-1200x630.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Selling-managed-security-1200x630.png","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"How to start selling managed security","datePublished":"2020-02-19T20:54:50+00:00","dateModified":"2024-06-03T17:36:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/"},"wordCount":1213,"commentCount":2,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Selling-managed-security-1200x460.png","keywords":["Cybersecurity","Managed Service Providers (MSPs)"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/","url":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/","name":"How to start selling managed security | Sherweb Security","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Selling-managed-security-1200x460.png","datePublished":"2020-02-19T20:54:50+00:00","dateModified":"2024-06-03T17:36:24+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"learn why taking on a comprehensive and multi-layered approach to selling managed security is critical and how you should get started.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Selling-managed-security-1200x460.png","contentUrl":"\/blog\/wp-content\/uploads\/Selling-managed-security-1200x460.png","width":1200,"height":460,"caption":"managed security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How to start selling managed security"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Cybersecurity","Managed Service Providers (MSPs)"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/20320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=20320"}],"version-history":[{"count":10,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/20320\/revisions"}],"predecessor-version":[{"id":24796,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/20320\/revisions\/24796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/20325"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=20320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=20320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=20320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}