{"id":60694,"date":"2022-03-17T14:00:00","date_gmt":"2022-03-17T18:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=60694"},"modified":"2024-11-14T19:25:53","modified_gmt":"2024-11-15T00:25:53","slug":"patch-management-vs-vulnerability-management","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management","title":{"rendered":"Patch Management vs. Vulnerability Management"},"content":{"rendered":"\n

The attack surface of any organization has significantly expanded in recent years. Unlike in the past, where organizations secured their assets in on-prem servers, today\u2019s business environment consists of various technologies extending far beyond the enterprise\u2019s perimeter. Unfortunately, securing enterprise assets \u2014 especially operating systems (OSs) and applications \u2014 is not a one-and-done event but rather an ongoing process.<\/p>\n\n\n\n

Because of this, IT teams must continually monitor and deploy security patches to safeguard multiple entry points from hackers. The process of discovering security vulnerabilities and applying the appropriate patches and updates to fix them\u2014 also called vulnerability and patch management<\/a> \u2014 is critical for the company\u2019s overall bottom line, and every IT professional should understand it. <\/p>\n\n\n\n

Compatible \u2014 But Not Interchangeable \u2014 Terms<\/h2>\n\n\n\n

The terms patch management and vulnerability management are often used interchangeably, albeit with different meanings. While patch management and vulnerability management have a compatible relationship, they are distinct processes with different goals. Patch management focuses on applying software updates to correct specific flaws or enrich the application feature sets. In contrast, vulnerability management is a much broader process that incorporates the discovery and remediation of risks of all kinds. <\/p>\n\n\n\n

Learn more about patch management versus vulnerability management to understand their core differences in this post.<\/p>\n\n\n\n

What Is Vulnerability Management?<\/strong><\/h2>\n\n\n\n

Vulnerability management is a cyclic process of discovering, prioritizing, reporting, and remediating security vulnerabilities across an organization\u2019s endpoints, workloads, and systems. When implemented alongside other security measures, vulnerability management can help organizations prioritize possible threats and minimize their attack surface. <\/p>\n\n\n\n

IT teams must conduct this process continuously to keep up with new applications that are added to the network, changes made to systems, and the discovery of new security threats over time. Vulnerability management solutions<\/a> can help organizations streamline and automate this process. These tools largely rely on business operations and threat intelligence to prioritize risks while addressing vulnerabilities as quickly as possible.<\/p>\n\n\n\n

Even though vulnerability management tools have varying strengths and feature sets, the majority of them largely incorporate the following processes in their operations:<\/p>\n\n\n\n

Discovery<\/strong><\/h3>\n\n\n\n

The vulnerability management solution continually identifies and categorizes each corporate asset in a networked environment and stores the attributes in a database during this stage. It also includes discovering security threats associated with assets. <\/p>\n\n\n\n

Prioritization<\/strong><\/h3>\n\n\n\n

The vulnerability management solution ranks the known risks and vulnerabilities at this stage. For example, the tool can rank vulnerabilities as high, medium, or low depending on their impacts on the corporate assets. <\/p>\n\n\n\n

Remediation<\/strong><\/h3>\n\n\n\n

The system generates links to information about the identified vulnerabilities, including the recommendations for vendor patches where applicable. A vendor can decide to maintain its own vulnerability database information or publish links to third-party resources such as Common Vulnerabilities and Exposures (CVE) or Common Vulnerability Scoring System (CVSS). <\/p>\n\n\n\n

Patch Management vs. Vulnerability Management: Distinctive Features<\/strong><\/h2>\n\n\n\n

Patch management is a process that IT teams often use to logically update applications and operating systems. The primary goal of the patch management process<\/a> is to highlight, categorize, and prioritize any missing patches for a particular asset. For specificity, a patch is a software update from the vendor. It can include anything from security fixes to new software features. <\/p>\n\n\n\n

In other words, not all patches contain security fixes. Likewise, not all patches will fix the security bugs you\u2019ve identified in a particular asset. This explains why having a patch management solution isn\u2019t enough to secure your enterprise resources. You still need to incorporate an effective vulnerability management strategy to address all security risks. <\/p>\n\n\n\n

How Do Patch Management and Vulnerability Management Overlap?<\/h3>\n\n\n\n

While patch management and vulnerability management overlap a lot, they\u2019re definitely not the same. Vulnerability management deals with security issues of all kinds; software and operating system vulnerabilities can include issues with the underlying code as well as configurations pertaining to permissions and network capabilities. While you can resolve most software security issues with a patch, this certainly isn\u2019t always the case. For example, you could (or might have to) fix some security issues by changing firewall policies, re-configuring the network, purchasing new hardware, or even training employees. <\/p>\n\n\n\n

Like vulnerability management, you can also conduct patch management via an automated, centralized management solution. Such a solution allows IT teams to set policy-based rules that automatically apply patches rather than a manual process. For example, you can schedule the patching process around off-peak times to ensure that the activity does not result in downtime or productivity loss. <\/p>\n\n\n\n

Why BYOD and Multi-Vendor Networks Are Raising the Patch Management and Vulnerability Management Ante<\/strong><\/h2>\n\n\n\n

The bring-your-own-device (BYOD<\/a>) phenomenon is now a familiar trend<\/a>, as employees yearn for greater mobility and flexibility in their workplaces. However, adopting BYOD also means that IT teams have to protect endpoints that the organization didn\u2019t specify, procure, or even configure. These endpoints are often laden with unknown and unpatched vulnerabilities.<\/p>\n\n\n\n

In addition, most organizations are now multi-platform oriented, blending in macOS and Linux OSs with their mainstay Windows client and server operating systems. Besides heterogeneous endpoints and multi-platform environments<\/a>, the network is increasingly growing to incorporate cloud-based services.<\/p>\n\n\n\n

Unless regularly inspected, maintained, and protected, these endpoints, OSs, and applications become increasingly vulnerable, making them easy targets for cybercriminals. This problem can become even more complex for regulated sectors such as healthcare and finance that demand strict adherence to how users access, use, and distribute information. This is because the organization\u2019s compliance liabilities extend to employees\u2019 personal devices that are not part and parcel of its IT infrastructure.<\/p>\n\n\n\n

What Are the Security Costs of Not Using a Patch Management Solution?<\/strong><\/h2>\n\n\n\n

Responding to cyber threats fast enough is the new urgency in today\u2019s fast-paced and ever-changing digital landscape. On average, organizations disclose more than 22,000 new security vulnerabilities annually<\/a>. This translates to about 60 new vulnerabilities being revealed each day. <\/p>\n\n\n\n

A sluggish infrastructure makes it nearly impossible to keep up with patching workloads, let alone get ahead of the security threats. In an ideal scenario, the race to secure OSs and applications through patching should start immediately after a vulnerability is disclosed. Security updates provide IT teams with details on new exposures and how to resolve vulnerabilities. <\/p>\n\n\n\n

However, it also gives hackers a specific focal point and codebase to plan future attacks. According to HP Wolf Security, the average time it takes for a hacker to weaponize a known vulnerability has significantly reduced in recent days, with many threats like zero-day exploits<\/a> increasing. <\/p>\n\n\n\n

Conversely, companies without effective patch management solutions<\/a> take a staggering 102 days<\/a> to deploy just one patch. This is a worrying trend because unpatched vulnerabilities can lead to lost or stolen data, fraud, lawsuits, and violation of compliance regulations. The company won\u2019t just lose money, but it can be sued or even go out of business. Learn more about the true costs of patch management<\/a>.<\/p>\n\n\n\n

JumpCloud Directory Platform: An Inclusive, Easy-to-Use Automated Patch Management <\/strong><\/h2>\n\n\n\n

The JumpCloud Directory Platform\u00ae<\/sup> is an out-of-the-box solution businesses can use to streamline patch management processes. IT teams can easily create and manage patch schedules from a single pane of glass, allowing them to achieve enhanced visibility and application version control with JumpCloud. Test drive the platform\u2019s functionality, including comprehensive System Insights<\/a>, with a free trial of JumpCloud<\/a> to see first-hand how JumpCloud simplifies and improves your company\u2019s overall security posture!<\/p>\n","protected":false},"excerpt":{"rendered":"

Curious about the difference between patch management and vulnerability management? Learn more about the two related terms in this article. <\/p>\n","protected":false},"author":131,"featured_media":58916,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[],"collection":[2778,2775],"platform":[],"funnel_stage":[3016],"coauthors":[2568],"acf":[],"yoast_head":"\nPatch Management vs. Vulnerability Management - JumpCloud<\/title>\n<meta name=\"description\" content=\"Curious about the difference between patch management and vulnerability management? Learn more about the two related terms in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Management vs. Vulnerability Management\" \/>\n<meta property=\"og:description\" content=\"Curious about the difference between patch management and vulnerability management? Learn more about the two related terms in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-17T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-15T00:25:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kelsey Kinzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelsey Kinzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management\"},\"author\":{\"name\":\"Kelsey Kinzer\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/c4e9aeadd98cafbd216d3134ad10ab13\"},\"headline\":\"Patch Management vs. Vulnerability Management\",\"datePublished\":\"2022-03-17T18:00:00+00:00\",\"dateModified\":\"2024-11-15T00:25:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management\"},\"wordCount\":1228,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png\",\"articleSection\":[\"Best Practices\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management\",\"url\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management\",\"name\":\"Patch Management vs. Vulnerability Management - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png\",\"datePublished\":\"2022-03-17T18:00:00+00:00\",\"dateModified\":\"2024-11-15T00:25:53+00:00\",\"description\":\"Curious about the difference between patch management and vulnerability management? Learn more about the two related terms in this article.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png\",\"width\":2000,\"height\":1600,\"caption\":\"automated patch management dashboard from jumpcloud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Management vs. Vulnerability Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/c4e9aeadd98cafbd216d3134ad10ab13\",\"name\":\"Kelsey Kinzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/08f33caaabd3e83507748fcc2d575a67\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a16ebe214c820d6c288597039b7e89f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a16ebe214c820d6c288597039b7e89f?s=96&d=mm&r=g\",\"caption\":\"Kelsey Kinzer\"},\"description\":\"Kelsey is a passionate storyteller and Content Writer at JumpCloud. She is particularly inspired by the people who drive innovation in B2B tech. When away from her screen, you can find her climbing mountains and (unsuccessfully) trying to quit cold brew coffee.\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Management vs. Vulnerability Management - JumpCloud","description":"Curious about the difference between patch management and vulnerability management? Learn more about the two related terms in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management","og_locale":"en_US","og_type":"article","og_title":"Patch Management vs. Vulnerability Management","og_description":"Curious about the difference between patch management and vulnerability management? Learn more about the two related terms in this article.","og_url":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management","og_site_name":"JumpCloud","article_published_time":"2022-03-17T18:00:00+00:00","article_modified_time":"2024-11-15T00:25:53+00:00","og_image":[{"width":2000,"height":1600,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png","type":"image\/png"}],"author":"Kelsey Kinzer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kelsey Kinzer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management"},"author":{"name":"Kelsey Kinzer","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/c4e9aeadd98cafbd216d3134ad10ab13"},"headline":"Patch Management vs. Vulnerability Management","datePublished":"2022-03-17T18:00:00+00:00","dateModified":"2024-11-15T00:25:53+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management"},"wordCount":1228,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png","articleSection":["Best Practices"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management","url":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management","name":"Patch Management vs. Vulnerability Management - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png","datePublished":"2022-03-17T18:00:00+00:00","dateModified":"2024-11-15T00:25:53+00:00","description":"Curious about the difference between patch management and vulnerability management? Learn more about the two related terms in this article.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/02\/jumpcloud-patch-mgmt.png","width":2000,"height":1600,"caption":"automated patch management dashboard from jumpcloud"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/patch-management-vs-vulnerability-management#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Patch Management vs. Vulnerability Management"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/c4e9aeadd98cafbd216d3134ad10ab13","name":"Kelsey Kinzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/08f33caaabd3e83507748fcc2d575a67","url":"https:\/\/secure.gravatar.com\/avatar\/9a16ebe214c820d6c288597039b7e89f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a16ebe214c820d6c288597039b7e89f?s=96&d=mm&r=g","caption":"Kelsey Kinzer"},"description":"Kelsey is a passionate storyteller and Content Writer at JumpCloud. She is particularly inspired by the people who drive innovation in B2B tech. When away from her screen, you can find her climbing mountains and (unsuccessfully) trying to quit cold brew coffee.","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/60694"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=60694"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/60694\/revisions"}],"predecessor-version":[{"id":117597,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/60694\/revisions\/117597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/58916"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=60694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=60694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=60694"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=60694"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=60694"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=60694"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=60694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}