{"id":9178,"date":"2023-06-16T16:35:00","date_gmt":"2023-06-16T21:35:00","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=9178"},"modified":"2025-04-03T11:34:10","modified_gmt":"2025-04-03T16:34:10","slug":"forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/","title":{"rendered":"4 Steps to Applying Zero Trust to Content Security"},"content":{"rendered":"\n<p>As organizations adopt zero trust architectures, there\u2019s one key area that seems to be overlooked: the content layer. And yet, security vulnerabilities at this layer pose significant, and extremely common threats. In fact, research reveals that a large portion of companies share sensitive content with over 2,500 third parties and use multiple tools for content communications.<\/p>\n\n\n\n<p>Given the vulnerable nature of content exchange, it\u2019s important to extend zero trust principles right down to the emails, documents, and files that we all share every day. But there are reasons why organizations do not do this regularly. For example, enforcing access rights can be tricky, especially in large organizations or companies with significant turnover. Tracking and monitoring every file type is impossible, as is adequately classifying every type of content.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"625\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_300x300.jpg\" alt=\"Forcepoint Kiteworks Collaboration Zero Trust Blog Embedded Image 2024\" class=\"wp-image-9401\" style=\"width:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_300x300.jpg 625w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_300x300-300x300.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_300x300-150x150.jpg 150w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure><\/div>\n\n\n<p>Forcepoint\u2019s new partnership with Kiteworks, a leader in data privacy and compliance for sensitive content communications, changes everything. Together, we\u2019ve developed the industry\u2019s most powerful solution for true zero trust security at the content layer. It combines Forcepoint\u2019s Content Disarm &amp; Reconstruction (CDR) and Data Loss Prevention (DLP) solutions with Kiteworks\u2019 Private Content Network (PCN).<\/p>\n\n\n\n<p>This combination allows organizations to take a highly effective four-step approach to zero trust content security by:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Making all content untrusted by default \u2013&nbsp;<\/strong>Applying zero trust at the content layer entails assuming that all data is malicious until proven otherwise. Ensuring content is secure and delivered safely requires deconstructing\u2014and reconstructing\u2014the information that\u2019s being sent. Forcepoint\u2019s Zero Trust CDR extracts information from files, verifies that the information is secure, and builds new, functional files to carry the information to its ultimate destination.<\/li>\n\n\n\n<li><strong>Enforcing least-privilege content access \u2013&nbsp;<\/strong>Least-privilege access management is a core tenet of zero trust security; our solution extends this practice to the content layer. It applies access control for applications to all content assets and allows organizations to assess who is sending, sharing, receiving, viewing, altering, or saving content. Companies can also monitor from where and to that content is being sent.<\/li>\n\n\n\n<li><strong>Monitoring content for potential vulnerabilities \u2013&nbsp;<\/strong>Most organizations employ some form of network monitoring and have done so for years. Effective content monitoring employs the same principles of complete, real-time visibility and unified control. Our joint solution consolidates content communication channels for easy management and closely monitors each asset to ensure content is free of vulnerabilities.<\/li>\n\n\n\n<li><strong>Integrating policy management tracking and controls for data loss prevention \u2013&nbsp;<\/strong>Tracking and monitoring content collaboration and communications is essential to prevent sensitive content from falling into the wrong hands. Our solution allows organizations to discover, classify, monitor, and protect data, track and control sensitive content, and audit user behavior\u2014mitigating data loss.<\/li>\n<\/ol>\n\n\n\n<p>This \u201ctrust no content\u201d approach addresses all content security gaps. It provides organizations with assurances that the content their users are reading, sharing, and using is well-protected and free of malware.<\/p>\n\n\n\n<p>Moreover, it makes implementing and managing zero trust content security an easy, frictionless experience for both administrators and users alike. Admins have everything they need to manage content security from a central location, and users will not experience any delays or inhibitions in their ability to collaborate or communicate.<\/p>\n\n\n\n<p><em><strong><a href=\"https:\/\/www.carahsoft.com\/forcepoint\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"ForcePoint Kiteworks - Zero Trust for Content Blog - 2023 - Bottom CTA\">Contact a member of our team today<\/a> to learn more about Forcepoint\u2019s and Kiteworks\u2019 new solution and schedule a demo to start taking the steps necessary to bring zero trust security to your content.<\/strong><\/em><\/p>\n<head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\"><\/head>","protected":false},"excerpt":{"rendered":"<p>As organizations adopt zero trust architectures, there\u2019s one key area that seems to be overlooked: the content layer. And yet, security vulnerabilities at this layer pose significant, and extremely common threats. In fact, research reveals that a large portion of &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":9931,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1493,952],"tags":[768,1539,443],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 Steps to Applying Zero Trust to Content Security | Carahsoft<\/title>\n<meta name=\"description\" content=\"Forcepoint\u2019s new partnership with Kiteworks, a leader in data privacy and compliance for sensitive content communications, changes everything. Together, we\u2019ve developed the industry\u2019s most powerful solution for true zero trust security at the content layer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Steps to Applying Zero Trust to Content Security | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Forcepoint\u2019s new partnership with Kiteworks, a leader in data privacy and compliance for sensitive content communications, changes everything. Together, we\u2019ve developed the industry\u2019s most powerful solution for true zero trust security at the content layer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-16T21:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T16:34:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1215\" \/>\n\t<meta property=\"og:image:height\" content=\"882\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Carahsoft Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Carahsoft Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/\"},\"author\":{\"name\":\"The Carahsoft Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"4 Steps to Applying Zero Trust to Content Security\",\"datePublished\":\"2023-06-16T21:35:00+00:00\",\"dateModified\":\"2025-04-03T16:34:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/\"},\"wordCount\":569,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg\",\"keywords\":[\"ForcePoint\",\"Kiteworks\",\"Zero Trust\"],\"articleSection\":[\"Partners\",\"Zero Trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/\",\"name\":\"4 Steps to Applying Zero Trust to Content Security | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg\",\"datePublished\":\"2023-06-16T21:35:00+00:00\",\"dateModified\":\"2025-04-03T16:34:10+00:00\",\"description\":\"Forcepoint\u2019s new partnership with Kiteworks, a leader in data privacy and compliance for sensitive content communications, changes everything. Together, we\u2019ve developed the industry\u2019s most powerful solution for true zero trust security at the content layer.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg\",\"width\":1215,\"height\":882,\"caption\":\"Forcepoint Kiteworks Collaboration Zero Trust Blog Preview Image 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Steps to Applying Zero Trust to Content Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The Carahsoft Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The Carahsoft Team\"},\"description\":\"The Digital Media team at Carahsoft.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 Steps to Applying Zero Trust to Content Security | Carahsoft","description":"Forcepoint\u2019s new partnership with Kiteworks, a leader in data privacy and compliance for sensitive content communications, changes everything. Together, we\u2019ve developed the industry\u2019s most powerful solution for true zero trust security at the content layer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/","og_locale":"en_US","og_type":"article","og_title":"4 Steps to Applying Zero Trust to Content Security | Carahsoft","og_description":"Forcepoint\u2019s new partnership with Kiteworks, a leader in data privacy and compliance for sensitive content communications, changes everything. Together, we\u2019ve developed the industry\u2019s most powerful solution for true zero trust security at the content layer.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/","og_site_name":"| Carahsoft","article_published_time":"2023-06-16T21:35:00+00:00","article_modified_time":"2025-04-03T16:34:10+00:00","og_image":[{"width":1215,"height":882,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg","type":"image\/jpeg"}],"author":"The Carahsoft Team","twitter_misc":{"Written by":"The Carahsoft Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/"},"author":{"name":"The Carahsoft Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"4 Steps to Applying Zero Trust to Content Security","datePublished":"2023-06-16T21:35:00+00:00","dateModified":"2025-04-03T16:34:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/"},"wordCount":569,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg","keywords":["ForcePoint","Kiteworks","Zero Trust"],"articleSection":["Partners","Zero Trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/","url":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/","name":"4 Steps to Applying Zero Trust to Content Security | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg","datePublished":"2023-06-16T21:35:00+00:00","dateModified":"2025-04-03T16:34:10+00:00","description":"Forcepoint\u2019s new partnership with Kiteworks, a leader in data privacy and compliance for sensitive content communications, changes everything. Together, we\u2019ve developed the industry\u2019s most powerful solution for true zero trust security at the content layer.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/06\/Forcepoint-and-Kiteworks-Collaboration-Zero-Trust-Vendor-Focused-Blog_875x635.jpg","width":1215,"height":882,"caption":"Forcepoint Kiteworks Collaboration Zero Trust Blog Preview Image 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/forcepoint-kiteworks-applying-zero-trust-content-security-blog-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"4 Steps to Applying Zero Trust to Content Security"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The Carahsoft Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The Carahsoft Team"},"description":"The Digital Media team at Carahsoft.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9178"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=9178"}],"version-history":[{"count":3,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9178\/revisions"}],"predecessor-version":[{"id":9403,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9178\/revisions\/9403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/9931"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=9178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=9178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=9178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}