{"id":76036,"date":"2024-03-07T12:45:54","date_gmt":"2024-03-07T04:45:54","guid":{"rendered":"https:\/\/version-2.com\/?p=76036"},"modified":"2024-03-01T12:51:21","modified_gmt":"2024-03-01T04:51:21","slug":"future-trends-for-msps-evolving-network-security-with-sse","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/03\/future-trends-for-msps-evolving-network-security-with-sse\/","title":{"rendered":"Future trends for MSPs: evolving network security with SSE"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"76036\" class=\"elementor elementor-76036\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/J7d5NcBj9rlqbei97sF1Y\/89d92a7ba9b9e1f49e77b5295b6658f7\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"617\" \/><\/p><div class=\"Grid_item__8Wd1v Grid_col8Md__zJ2a8\"><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In the evolving MSP market, network security is undergoing a revolution thanks to Security Service Edge (SSE). This new approach, vital in a cloud-centric world, replaces outdated perimeter-based models with a more integrated, flexible strategy.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">SSE combines multiple security services for comprehensive protection across all locations. This shift towards agility, scalability, and user focus is crucial for MSPs to meet their clients&#8217; changing needs.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Let\u2019s see what trends emerge in the future of the MSPs market and what experts have to say about it.<\/p><h2 id=\"is-the-msp-market-growing\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Is the MSP market growing?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Managed services involve outsourcing various IT and computing processes like cloud computing, IT infrastructure, and managed IT security.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In 2022, the value of the global managed services market <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.statista.com\/statistics\/590884\/worldwide-managed-services-market-size\/\" target=\"_blank\" rel=\"noopener\">approached<\/a> $279 billion, with North America leading (a share of 36.6% in 2022 and a projected CAGR of 10.6%) and Asia Pacific emerging (a projected CAGR of 11.2%) as the fastest-growing region. <b>By 2026, this market is projected to surpass $400 billion<\/b>.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The managed services market is <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/market.us\/report\/managed-services-market\/\" target=\"_blank\" rel=\"noopener\">projected<\/a> to expand to $680.08 billion by 2030, <b>advancing at a Compound Annual Growth Rate (CAGR) of 11.9% from 2023 to 2033<\/b>.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In 2022, the <b>Banking, Financial Services, and Insurance (BFSI) sector dominated the managed services market<\/b> with the largest revenue share of 18%, and it is anticipated to grow at a CAGR of 11.6% during its forecast period of 2023-2033.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">What products will MSPs focus on selling?<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In terms of popular products, security, and business applications lead in Europe and North America as of 2023.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">These services offer the advantages of extensive IT infrastructure without requiring substantial in-house hardware. Additionally, managed services in the cloud are poised for growth due to their increasing adoption in organizations&#8217; digital transformation strategies worldwide.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">IT security services encompass various sectors, including:<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">cloud security<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">data protection<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">identity access management.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">These tailored managed security services are essential for businesses globally to defend against cyber threats, comply with regulations, and secure their digital assets.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In 2023, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.statista.com\/statistics\/544772\/north-america-emea-survey-it-services-budget-allocation\/\" target=\"_blank\" rel=\"noopener\">Statista survey<\/a> participants from North America and Europe indicated that they plan to allocate, on average, <b>12 percent of their 2024 IT managed services budget to both security and hosting services<\/b>. Conversely, data analytics is expected to receive a smaller portion, with an average allocation of just 6 percent of their companies&#8217; managed services budgets.<\/p><h2 id=\"what-are-the-trends-for-msps-in-2024\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">What are the trends for MSPs in 2024?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The future of MSPs, driven by technological advancements and evolving business needs, indicates a strategic shift toward more sophisticated, integrated, and efficient approaches, such as adopting the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/sase\/security-service-edge\/\">SSE framework<\/a>.<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2Y93letjYVt1gVoqIwOCjU\/70ec82b80a78ccf129c6fa05a0e3c73e\/3_1400x570.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"440\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">From the surge in automation and cloud-based security services to the harmonization of diverse tools and infrastructures, these developments signal a new era of agility and resilience for MSPs.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Automation<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Embracing technologies like AI for improved efficiency and task management. This trend indicates a shift towards automated processes for routine tasks, enhancing operational productivity.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Moreover, tools that provide automation solutions besides AI also help minimize repetitive tasks and increase attention to detail. It allows security administrators to avoid overlooking or missing important indications that may lead to a data breach.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">MSPs as service providers will benefit from platforms that allow bulk onboarding of an organization&#8217;s users, whether tens or hundreds of them.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">From the security perspective, for instance, setting up internal rules, if a non-compliant device tries to access the company network with a feature like <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/features\/always-on-vpn\/\">Always On VPN<\/a>, it will be automatically rejected, and the user account will be blocked until further admin action is taken. Such functionalities help reduce manual monitoring and resources, preventing human errors that could lead to incidents.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Reliance on security as a service<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">With cybersecurity threats evolving, MSPs will likely increase reliance on cloud-based security services. This shift highlights the importance of robust, scalable cybersecurity measures in a digitally interconnected landscape.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud-based solutions like a <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/features\/cloud-firewall\/\">cloud firewall<\/a> help transition existing infrastructure to a more modern and up-to-date setup, adapted to contemporary technological and security challenges. These solutions are easy to deploy as they don\u2019t require hardware or manual labor, and they can be launched and operational without needing on-site presence.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">More importantly, security as a service is instant. When the right solution to the existing problem is selected, MSPs can onboard entire organizations within hours, if not minutes, rapidly shrinking the attack surface and enforcing security policies to protect a business. Meanwhile, MSP customers are safe without having specific knowledge of network security.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Cross-platform tools and infrastructure deployment<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The anticipated growth in integrating diverse tools and infrastructure systems indicates a move towards more cohesive and flexible IT solutions. In this case, smooth integrations of different vendors\u2019 tools and solutions are critical for seamless implementation, ensuring successful business continuity.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Compatibility with existing tools is beneficial, for example, to simplify the process of user management. <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/blog\/nordlayer-with-scim-user-management\/\">SCIM user management<\/a> with market leaders Okta and Azure AD (now Entra ID) allows smoother user provisioning by reducing manual handling time case by case and improving security levels by sorting access right effectively.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Besides user onboarding and offboarding processes, integrations with JumpCloud, OneLogin, Google, or the same Okta and Entra ID enable more secure access to the systems as Multi-factor authentication (MFA) and Single sign-on (SSO) are implemented for strong user authentication.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Adoption of managed cloud security services<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">There&#8217;s an expected rise in the adoption of cloud-based security services, reflecting the growing need for specialized security solutions in cloud environments. This trend underscores the recognition that cloud security needs specialized solutions beyond standard IT security measures.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Multi-cloud strategies, hybrid models, and an array of diverse services and apps require stepping up the game in cloud security to meet the specific needs of these environments.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">There&#8217;s an increasing need for continuous monitoring, real-time threat detection, and rapid response mechanisms. Managed cloud security services are equipped to handle these demands, offering round-the-clock surveillance and immediate action against potential breaches to protect sensitive data and ensure uninterrupted business operations in the cloud.<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/47JQmd6pZEEcqMWJIll0YW\/40de4075b9348c26a91f4725d24ca07d\/4_1400x650.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"501\" \/><\/p><h2 id=\"solutions-that-reflect-msp-trends\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Solutions that reflect MSP trends<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Tendencies clearly direct us to cloud-based services and infrastructures. SSE framework fully addresses projected needs, so more and more managed service providers will incorporate it into their client offerings.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">SSE dominance naturally raises questions about its potential to replace a VPN and what its strongest attributes are that MSPs can benefit from.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">We asked our internal experts on the matter to understand the benefits and potential of the SSE framework for <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/partner-program\/msp\/\">MSP partners<\/a>. One thing is clear: the framework in question holds the future of cybersecurity. It supports various business models and needs, providing an integral approach to security challenges.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/zero-trust\/\">Zero Trust<\/a>, and more specifically, Zero Trust Network Access (ZTNA), is one of the core SSE framework components. Alongside <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/secure-web-gateway\/\">Secure Web Gateway (SWG)<\/a>, Firewall as a Service (FWaaS), and Cloud Access Security Broker (CASB), ZTNA is the most advanced and prominent part of the framework.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/hP90sGlgNUnv38wp7QamR\/e6f049237598abf99fc328b74aca29d7\/1_1400x750.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"579\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The following question is whether the SSE framework is capable of replacing Virtual Private Network (VPN) tools. While both solutions ultimately serve the same purpose of securing the network, they have quite different roles in cybersecurity.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/tcEnyS3yKDExKJerZFWIA\/4e415ee2927d68f207a401ac6b08b3b3\/2_1400x750.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"579\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A VPN tool connects devices, while SSE ensures overall security layers essential for devices\u2019 and, ultimately, networks\u2019 security. They complement rather than replace each other. Thus, VPN tools that go beyond primary connection and encryption but evolve into solutions with functionalities of SSE ensure more robust protection against digital threats.<\/p><h2 id=\"industry-experts-perspectives\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Industry experts\u2019 perspectives<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">We asked major MSPs in the industry to share their view regarding SSE adoption in a modern business environment.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">With the subject focusing on SSE popularity and adoption, experts reveal what tendencies show clients\u2019 demand for cloud security services and what implications create the need for such technology integration in the infrastructure.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Has adopting remote work and cloud services impacted MSP clients&#8217; demand for SSE solutions?<\/h4><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Impact of remote work and cloud services on Managed Security Service Provider clients' demand for SSE solutions\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3Iy3tWnuN8peI2nlTemdRU\/0f378429c58fee6de61b9c45ce5512c4\/5_1400x718.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"554\" \/><\/p><p>Are there any specific industries, sectors, or types of businesses where SSE adoption will be particularly critical in the near future?<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4ICztB90u62qAhKQjrKfSV\/9f913a26edec9e5794f195b97e8134a5\/6_1400x642.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"495\" \/><\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">What are the predictions for cloud and network security in the next 5 years? How can MSPs prepare for this change?<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"642\" \/><\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1bR6JgebwNP3nuxQdrj2ny\/e6dc26bced60fd48c559fb9ee2b5f1bf\/7_1400x832.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Experts predictions and MSP industry trends for the next 5 years\" width=\"0\" height=\"0\" data-nimg=\"future\" \/>Why should MSPs offer solutions to their clients based on an SSE framework?<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"495\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/meXoaYT5QHo1G6zuRcjoo\/81a44d7f82d2ebb4f5788b8ce5eec3bf\/8_1400x642.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Explanations why MSPs should offer solutions to their clients based on an SSE framework\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The experts\u2019 insights highlight the growing demand for SSE solutions among MSP clients, driven by the widespread adoption of remote work and cloud services.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Both TEKRiSQ and Sequentur emphasized that while remote access increases vulnerability to security breaches, implementing SSE frameworks can mitigate these risks through layered security controls, such as phishing-resistant MFA and stringent device usage policies.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Key expert insights<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">1.<b> Increased demand for security<\/b>: the shift to remote work has made SSE solutions more critical for ensuring secure access to networks and protecting against breaches.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">2.<b> Industry-specific needs<\/b>: sectors with sensitive data, like healthcare, finance, and accounting, face higher regulatory pressures, making SSE adoption crucial for compliance and protection against financial penalties.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">3. <b>Future security trends<\/b>: the next five years will see a focus on enforcing basic security measures, such as phishing-resistant MFA and tighter controls on how employees use their devices. Regular cyber risk assessments will become essential for identifying and addressing security gaps.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">4. <b>MSP engagement and compliance<\/b>: MSPs must regularly reassess their clients&#8217; security needs in light of technological changes and regulatory requirements. Ensuring the implementation of recommended security measures is crucial, rather than merely suggesting them.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">5. <b>Layered security approach<\/b>: with hackers employing increasingly sophisticated tactics, MSPs need to offer solutions that provide multiple layers of security, addressing both digital and physical vulnerabilities.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">6. <b>Staying relevant<\/b>: offering SSE solutions is not just about enhancing security. It&#8217;s also critical for MSPs to remain competitive and relevant in the industry.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The insights underscore the importance of proactive security management, the need for continuous reassessment of security protocols, and the critical role of MSPs in guiding their clients through these challenges to ensure robust protection against evolving threats.<\/p><h2 id=\"how-nordlayer-solutions-align-with-these-msp-trends\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How NordLayer solutions align with these MSP trends<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The primary goal of <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/blog\/what-is-mssp-in-cybersecurity\/\">Managed Security Services Providers<\/a> (MSSPs) is to proactively protect organizations from cyber threats and ensure regulatory compliance through a blend of technology and expert analysis.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Implementing SSE framework-based tools into the clients &#8216; infrastructure is an effective and trusty way to achieve these goals. Luckily, NordLayer&#8217;s secure remote network access solution is built using technology-forward SSE design. It makes the tool comprehensive and robust for securing and enabling businesses of all sizes and industries.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">A cloud-based network security tool for data protection and access control<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Since MSPs will mainly focus on cloud security, data protection, and identity access management in 2024, NordLayer offers a solution that is exactly for it.<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Being a cloud-native solution, NordLayer is hardware-free, thus deployable remotely from any location to any setup.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Built on the SSE framework, NordLayer&#8217;s design combines security services based on SSE\u2019s components like <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/zero-trust\/network-access\/\">ZTNA<\/a>, SWG, and FWaaS.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The features and capabilities can scale and add up to create a layered network security shell against digital internal and external threats.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Seamless integration with identity management tools enables smooth user identification and robust access controls.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The ability to set up and implement a set of security rules and policies allows automated monitoring and actionable network protection.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Functionalities that are based on automation ensure every connection is encrypted and secure from malicious actors whether the team is working remotely or in a hybrid setup.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Online browsing on untrusted networks is secure whether employees work from a coffee shop, home, or hotel while on a business trip.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">24\/7 active tech-savvy customer support and an extensive materials base don\u2019t leave partners and users alone in the unknown.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Easily deployable and manageable, NordLayer doesn\u2019t require manual work and maintenance, letting it optimize resources and not rely on the user\u2019s extensive expertise.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer helps companies adhere to ISO 27001, GDPR, HIPAA, SOC 2 Type 2, and PCI-DSS regulatory requirements and stay compliant in the market.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The key takeaway is that NordLayer is extremely easy to use, manage, and deploy while ensuring stress-free and robust security implementation to any infrastructure, industry sector, or organization size.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Try it yourself\u2014<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/partner-program\/\">book a demo call<\/a> with our tech-savvy experts and get all the answers you need to <b>become a member of the NordLayer Partner Program<\/b>.<\/p><\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a493c elementor-widget elementor-widget-text-editor\" data-id=\"c6a493c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In the evolving MSP market, network security is undergo [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1130,61],"tags":[974,1132,1272],"class_list":["post-76036","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordlayer","category-press-release","tag-nord-security","tag-nordlayer","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Future trends for MSPs: evolving network security with SSE - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/future-msp-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Future trends for MSPs: evolving network security with SSE - Version 2\" \/>\n<meta property=\"og:description\" content=\"In the evolving MSP market, network security is undergo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/future-msp-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-07T04:45:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/J7d5NcBj9rlqbei97sF1Y\/89d92a7ba9b9e1f49e77b5295b6658f7\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/future-trends-for-msps-evolving-network-security-with-sse\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Future trends for MSPs: evolving network security with SSE\",\"datePublished\":\"2024-03-07T04:45:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/future-trends-for-msps-evolving-network-security-with-sse\\\/\"},\"wordCount\":2052,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/J7d5NcBj9rlqbei97sF1Y\\\/89d92a7ba9b9e1f49e77b5295b6658f7\\\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"NordLayer\",\"2024\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/future-trends-for-msps-evolving-network-security-with-sse\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/\",\"name\":\"Future trends for MSPs: evolving network security with SSE - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/J7d5NcBj9rlqbei97sF1Y\\\/89d92a7ba9b9e1f49e77b5295b6658f7\\\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-03-07T04:45:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/J7d5NcBj9rlqbei97sF1Y\\\/89d92a7ba9b9e1f49e77b5295b6658f7\\\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/J7d5NcBj9rlqbei97sF1Y\\\/89d92a7ba9b9e1f49e77b5295b6658f7\\\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/future-msp-trends\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Future trends for MSPs: evolving network security with SSE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Future trends for MSPs: evolving network security with SSE - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/","og_locale":"en_US","og_type":"article","og_title":"Future trends for MSPs: evolving network security with SSE - Version 2","og_description":"In the evolving MSP market, network security is undergo [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/","og_site_name":"Version 2","article_published_time":"2024-03-07T04:45:54+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/J7d5NcBj9rlqbei97sF1Y\/89d92a7ba9b9e1f49e77b5295b6658f7\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/03\/future-trends-for-msps-evolving-network-security-with-sse\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Future trends for MSPs: evolving network security with SSE","datePublished":"2024-03-07T04:45:54+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/03\/future-trends-for-msps-evolving-network-security-with-sse\/"},"wordCount":2052,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/J7d5NcBj9rlqbei97sF1Y\/89d92a7ba9b9e1f49e77b5295b6658f7\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","NordLayer","2024"],"articleSection":["2024","Nord Security","NordLayer","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/03\/future-trends-for-msps-evolving-network-security-with-sse\/","url":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/","name":"Future trends for MSPs: evolving network security with SSE - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/J7d5NcBj9rlqbei97sF1Y\/89d92a7ba9b9e1f49e77b5295b6658f7\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-03-07T04:45:54+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/future-msp-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/J7d5NcBj9rlqbei97sF1Y\/89d92a7ba9b9e1f49e77b5295b6658f7\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/J7d5NcBj9rlqbei97sF1Y\/89d92a7ba9b9e1f49e77b5295b6658f7\/Future_trends_for_MSPs_web_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/future-msp-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Future trends for MSPs: evolving network security with SSE"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jMo","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=76036"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76036\/revisions"}],"predecessor-version":[{"id":76044,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76036\/revisions\/76044"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=76036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=76036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=76036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}