{"id":17664,"date":"2020-02-06T18:00:35","date_gmt":"2020-02-07T02:00:35","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/02\/06\/news-11399\/"},"modified":"2020-02-06T18:00:35","modified_gmt":"2020-02-07T02:00:35","slug":"news-11399","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/06\/news-11399\/","title":{"rendered":"Visionary security partners to be honored at the very first Microsoft Security 20\/20 event"},"content":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Thu, 06 Feb 2020 17:00:13 +0000<\/strong><\/p>\n<p>Microsoft Security 20\/20 is nearly here and our team is putting the final touches on what we think will be a memorable event. Microsoft Security 20\/20 will put the spotlight on companies and individuals with a clear-eyed view of the security challenges we face and smart solutions to help solve them. By working together, we advance the vision of what\u2019s possible\u2014and our joint customers\u2019 security is stronger because of it.<\/p>\n<blockquote>\n<p>\u201cSolving our mutual customers&#8217; security challenges is very much a team sport. I\u2019m excited to recognize these leaders in the ecosystem at Microsoft\u2019s inaugural security awards.\u201d<br \/> \u2014Andrew Conway, General Manager, Security Product Marketing<\/p>\n<\/blockquote>\n<h3>About the event<\/h3>\n<p>At the inaugural Microsoft Security 20\/20 partner awards, we\u2019ll celebrate finalists in 16 award categories that span security integration partners, system integrators, and managed security service providers. The awards gala will take place February 23, 2020\u2014the Sunday before the RSA Conference in San Francisco. All finalists have been invited to attend this private event. Opening remarks from Ann Johnson, Corporate Vice President of the Cybersecurity Solutions Group, will center around Microsoft\u2019s vision for the security ecosystem and how\u2014together\u2014we\u2019ll help our customers get clarity on security.<\/p>\n<blockquote>\n<p>\u201cThe themes for Microsoft Security 20\/20 are vision and clarity. Microsoft is focused on protecting our customers\u00a0and there is no vision for the future that doesn\u2019t involve security partners. We\u2019re hosting the first Microsoft Security 20\/20 partner awards\u00a0gala to honor security partners that are making an impact through technology development and customer enablement.\u201d<br \/> \u2014Rob Lefferts, Corporate Vice President, Microsoft Threat Protection<\/p>\n<\/blockquote>\n<h3>Better together<\/h3>\n<p>I passionately believe that the security ecosystem must work together to realize a future where people, information, and companies are safer. Microsoft Security 20\/20 honors partners that have developed and delivered exceptional Microsoft-based solutions and services during the past year that put us on the path toward that vision.<\/p>\n<p>The award categories and finalists were selected by a cross functional group within Microsoft. These finalists were chosen among a global field of top Microsoft partners for demonstrating excellence in innovation, integration, and customer implementation. Winners will be chosen based on a vote from a broad swath of Microsoft Security experts, which includes engineers, marketers, partners, managers, security architects, and more.<\/p>\n<p>This blog would not be complete without showcasing each and every one of these amazing companies and visionary industry leaders, because in a kaleidoscope of security threats and news, these finalists offer an inspiring vision for the future.<\/p>\n<p><strong>ISV Partner of the Year<\/strong><\/p>\n<p>Software vendors that have shown innovation and the ability to drive revenue.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.f5.com\/?utm_medium=cpc&amp;utm_source=google&amp;utm_campaign=amer-crosspillar&amp;utm_content=page--generic&amp;campaignid=8702782952&amp;adgroupid=89185519322&amp;gclid=Cj0KCQiApaXxBRDNARIsAGFdaB_A85AK416rvXlt2uAKsR6RnoWdFrQIWZ-XnmbqkUIq4xXfaKy6Z_EaAjqUEALw_wcB\" target=\"_blank\" rel=\"noopener noreferrer\">F5 Networks<\/a><\/li>\n<li><a href=\"https:\/\/www.barracuda.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Barracuda<\/a><\/li>\n<li><a href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Check Point<\/a><\/li>\n<li><a href=\"https:\/\/www.citrix.com\/\">Citrix<\/a><\/li>\n<li><a href=\"https:\/\/www.zscaler.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zscaler<\/a><\/li>\n<\/ul>\n<p><strong>Emerging ISV Disruptor<\/strong><\/p>\n<p>Partners who show growth potential and have innovative emerging capabilities.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.silverfort.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Silverfort<\/a><\/li>\n<li><a href=\"https:\/\/onfido.com\/us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Onfido<\/a><\/li>\n<li><a href=\"https:\/\/hyas.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hyas<\/a><\/li>\n<li><a href=\"https:\/\/www.extrahop.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Extrahop<\/a><\/li>\n<li><a href=\"https:\/\/attackiq.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">AttackIQ<\/a><\/li>\n<\/ul>\n<p><strong>Most Prolific Integration Partner<\/strong><\/p>\n<p>Partners with numerous integrations across Azure and Microsoft 365 security.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.f5.com\/?utm_medium=cpc&amp;utm_source=google&amp;utm_campaign=amer-crosspillar&amp;utm_content=page--generic&amp;campaignid=8702782952&amp;adgroupid=89185519322&amp;gclid=Cj0KCQiApaXxBRDNARIsAGFdaB_A85AK416rvXlt2uAKsR6RnoWdFrQIWZ-XnmbqkUIq4xXfaKy6Z_EaAjqUEALw_wcB\" target=\"_blank\" rel=\"noopener noreferrer\">F5 Networks<\/a><\/li>\n<li><a href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Check Point<\/a><\/li>\n<li><a href=\"https:\/\/www.entrustdatacard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Entrust Datacard<\/a><\/li>\n<li><a href=\"https:\/\/www.cyberark.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberArk<\/a><\/li>\n<li><a href=\"https:\/\/www.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Symantec<\/a><\/li>\n<\/ul>\n<p><strong>Customer Impact<\/strong><\/p>\n<p>Independent software vendors (ISVs) that have driven a significant number of customers wins.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.barracuda.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Barracuda<\/a><\/li>\n<li><a href=\"https:\/\/www.f5.com\/?utm_medium=cpc&amp;utm_source=google&amp;utm_campaign=amer-crosspillar&amp;utm_content=page--generic&amp;campaignid=8702782952&amp;adgroupid=89185519322&amp;gclid=Cj0KCQiApaXxBRDNARIsAGFdaB_A85AK416rvXlt2uAKsR6RnoWdFrQIWZ-XnmbqkUIq4xXfaKy6Z_EaAjqUEALw_wcB\" target=\"_blank\" rel=\"noopener noreferrer\">F5 Networks<\/a><\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/en_us\/business.html\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro<\/a><\/li>\n<li><a href=\"https:\/\/www.zscaler.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zscaler<\/a><\/li>\n<li><a href=\"https:\/\/www.rsa.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">RSA<\/a><\/li>\n<\/ul>\n<p><strong>Identity Trailblazer<\/strong><\/p>\n<p>Partners that are driving major identity-related initiatives and educating the market on how to be protect identities.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.yubico.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Yubico<\/a><\/li>\n<li><a href=\"https:\/\/duo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Duo<\/a><\/li>\n<li><a href=\"https:\/\/www.ftsafe.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Feitian<\/a><\/li>\n<li><a href=\"https:\/\/www.hidglobal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HID Global<\/a><\/li>\n<li><a href=\"https:\/\/www.thalesgroup.com\/en\" target=\"_blank\" rel=\"noopener noreferrer\">Thales Group<\/a><\/li>\n<\/ul>\n<p><strong>Security Trailblazer<\/strong><\/p>\n<p>Partners that are driving major security-related initiatives and educating the market on how to be more secure.<\/p>\n<ul>\n<li><a href=\"https:\/\/swimlane.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Swimlane<\/a><\/li>\n<li><a href=\"https:\/\/www.servicenow.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ServiceNow<\/a><\/li>\n<li><a href=\"https:\/\/www.tenable.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tenable<\/a><\/li>\n<li><a href=\"https:\/\/www.facebook.com\/workplace\" target=\"_blank\" rel=\"noopener noreferrer\">Workplace from Facebook<\/a><\/li>\n<li><a href=\"https:\/\/www.valimail.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Valimail<\/a><\/li>\n<\/ul>\n<p><strong>Security Workshop Partner of the Year<\/strong><\/p>\n<p>Service partners that are driving the most high-quality security workshops.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.it-dev.pl\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">IT-Dev SP. Z O.O.<\/a><\/li>\n<li><a href=\"https:\/\/www.sulava.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sulava Oy<\/a><\/li>\n<li><a href=\"https:\/\/synergyadvisorsllc.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Synergy Advisors, LLC<\/a><\/li>\n<li><a href=\"https:\/\/akari.io\/\" target=\"_blank\" rel=\"noopener noreferrer\">Akari Solutions<\/a><\/li>\n<li><a href=\"https:\/\/www.catapultsystems.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Catapult Systems, LLC<\/a><\/li>\n<\/ul>\n<p><strong>Azure Security Deployment Partner of the Year<\/strong><\/p>\n<p>Service providers that are increasing usage and adoption rates for Azure security products.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.ascentclouds.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ascent Solutions, LLC<\/a><\/li>\n<li><a href=\"https:\/\/www.insight.com\/en_US\/home.html\" target=\"_blank\" rel=\"noopener noreferrer\">Insight<\/a><\/li>\n<li><a href=\"https:\/\/www.cyberproof.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberProof\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/go-planet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Planet Technologies<\/a><\/li>\n<li><a href=\"https:\/\/www.contentandcode.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Content and Code<\/a><\/li>\n<\/ul>\n<p><strong>Microsoft 365 Security Deployment Partner of the Year<\/strong><\/p>\n<p>Service providers that are increasing usage and adoption rates for Microsoft 365 security products.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.synergy-technical.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Synergy Technical<\/a><\/li>\n<li><a href=\"https:\/\/www.dell.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Dell<\/a><\/li>\n<li><a href=\"https:\/\/www.atea.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Atea Global<\/a><\/li>\n<li><a href=\"https:\/\/produhktiv.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">pro\u2022duhk\u2022tiv<\/a><\/li>\n<li><a href=\"https:\/\/www.binarytree.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Binary Tree Inc.<\/a><\/li>\n<\/ul>\n<p><strong>Security System Integrator of the Year<\/strong><\/p>\n<p>System Integrators that are working closely with the Cybersecurity Solutions Group to close deals and integrate Microsoft into customers&#8217; environments.<\/p>\n<ul>\n<li><a href=\"https:\/\/edgile.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Edgile<\/a><\/li>\n<li><a href=\"https:\/\/www.optiv.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Optiv<\/a><\/li>\n<li><a href=\"https:\/\/www.insight.com\/en_US\/home.html\" target=\"_blank\" rel=\"noopener noreferrer\">Insight<\/a><\/li>\n<li><a href=\"https:\/\/www.onevinn.se\/\" target=\"_blank\" rel=\"noopener noreferrer\">Onevinn<\/a><\/li>\n<li><a href=\"https:\/\/www.wipro.com\/en-US\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wipro<\/a><\/li>\n<\/ul>\n<p><strong>Security Advisory of the Year<\/strong><\/p>\n<p>Security advisory firms that are building core competencies on top of Microsoft Security solutions and working closely with the Cybersecurity Solutions Group to act as a trusted advisor to Microsoft customers.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.pwc.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">PwC<\/a><\/li>\n<li><a href=\"https:\/\/home.kpmg\/xx\/en\/home.html\" target=\"_blank\" rel=\"noopener noreferrer\">KPMG<\/a><\/li>\n<li><a href=\"https:\/\/www.ey.com\/en_gl\" target=\"_blank\" rel=\"noopener noreferrer\">EY<\/a><\/li>\n<li><a href=\"https:\/\/www.avanade.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Avanade<\/a><\/li>\n<li><a href=\"https:\/\/www.accenture.com\/us-en\" target=\"_blank\" rel=\"noopener noreferrer\">Accenture<\/a><\/li>\n<\/ul>\n<p><strong>Top Managed SOC\/MDR<\/strong><\/p>\n<p>Security operations centers that are supporting the largest customers in the world and building strong intellectual property that layers on top of Microsoft Security solutions.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.accenture.com\/us-en\" target=\"_blank\" rel=\"noopener noreferrer\">Accenture<\/a><\/li>\n<li><a href=\"https:\/\/www.optiv.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Optiv<\/a><\/li>\n<li><a href=\"https:\/\/www.borninthecloud.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Born in the Cloud<\/a><\/li>\n<li><a href=\"https:\/\/www.dxc.technology\/\" target=\"_blank\" rel=\"noopener noreferrer\">DXC Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.cyberproof.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberProof\u00a0<\/a><\/li>\n<\/ul>\n<p><strong>MSSP\/TDR Disrupter<\/strong><\/p>\n<p>Threat, detection, and response experts that are changing the game for managed security services.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.inspark.nl\/\" target=\"_blank\" rel=\"noopener noreferrer\">Inspark<\/a><\/li>\n<li><a href=\"https:\/\/www.criticalstart.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CRITICALSTART<\/a><\/li>\n<li><a href=\"https:\/\/www.infosys.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Infosys<\/a><\/li>\n<li><a href=\"https:\/\/www.trustwave.com\/en-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trustwave<\/a><\/li>\n<li><a href=\"https:\/\/www.secureworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Secureworks<\/a><\/li>\n<\/ul>\n<p><strong>Top Github Contributor<\/strong><\/p>\n<p>With input from the GitHub team, we identified individuals who are going above and beyond to support the open source community with their GitHub contributions.<\/p>\n<ul>\n<li>Brent Cook (busterb), <a href=\"https:\/\/www.rapid7.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Rapid7<\/a><\/li>\n<li>Ricardo van Zutphen (RicoVZ), <a href=\"https:\/\/hatching.io\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hatching International<\/a><\/li>\n<li>Teddy Reed (theopolis), <a href=\"http:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a><\/li>\n<li>Felipe Costa (zimmerle), <a href=\"https:\/\/www.trustwave.com\/en-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trustwave<\/a><\/li>\n<li>Sergi Alvarez (radare), <a href=\"https:\/\/www.nowsecure.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">NowSecure<\/a><\/li>\n<\/ul>\n<p><strong>Industry Changemaker<\/strong><\/p>\n<p>Individuals who are making a standout contribution to improving the security community.<\/p>\n<ul>\n<li>Stina Ehrensvard, <a href=\"https:\/\/www.yubico.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Yubico<\/a><\/li>\n<li>Parker Crockford, <a href=\"https:\/\/onfido.com\/us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Onfido<\/a><\/li>\n<li>Eva Chen, <a href=\"https:\/\/www.trendmicro.com\/en_us\/business.html\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro<\/a><\/li>\n<li>Tracie Martin, <a href=\"https:\/\/www.defendcon.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">DefendCon<\/a><\/li>\n<li>Paula Januszkiewicz, <a href=\"https:\/\/cqure.pl\/\" target=\"_blank\" rel=\"noopener noreferrer\">CQURE<\/a><\/li>\n<\/ul>\n<p><strong>Election Security Partner of the Year<\/strong><\/p>\n<p>Organizations that are effecting change for one of our most critical global security challenges\u2014election security.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.cisecurity.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Center for Internet Security (CIS)<\/a><\/li>\n<li><a href=\"https:\/\/voting.works\/\" target=\"_blank\" rel=\"noopener noreferrer\">VotingWorks<\/a><\/li>\n<li><a href=\"https:\/\/www.brennancenter.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Brennan Center for Justice<\/a><\/li>\n<li><a href=\"https:\/\/cdt.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Center for Democracy &amp; Technology (CDT)<\/a><\/li>\n<li><a href=\"https:\/\/www.belfercenter.org\/D3P\" target=\"_blank\" rel=\"noopener noreferrer\">Harvard&#8217;s Belfer Center&#8217;s Defending Digital Democracy Program<\/a><\/li>\n<\/ul>\n<h3>Learn more<\/h3>\n<p>To learn more about Microsoft Security partners, see our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/partnerships?rtc=1\" target=\"_blank\" rel=\"noopener noreferrer\">partners page<\/a>. To find out more about what Microsoft\u2019s up to at RSA Conference 2020, read this <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>.<\/p>\n<p>Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/06\/visionary-security-partners-honored-first-microsoft-security-20-20-event\/\">Visionary security partners to be honored at the very first Microsoft Security 20\/20 event<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/06\/visionary-security-partners-honored-first-microsoft-security-20-20-event\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Thu, 06 Feb 2020 17:00:13 +0000<\/strong><\/p>\n<p>Microsoft Security 20\/20 will put the spotlight on companies and individuals with a clear-eyed view of the security challenges we face and smart integrated solutions to help solve them.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/06\/visionary-security-partners-honored-first-microsoft-security-20-20-event\/\">Visionary security partners to be honored at the very first Microsoft Security 20\/20 event<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21500,4500,21481],"class_list":["post-17664","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-azure-security","tag-cybersecurity","tag-microsoft-365"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17664"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17664\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17664"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}