{"id":5844,"date":"2026-02-25T09:59:03","date_gmt":"2026-02-25T09:59:03","guid":{"rendered":"https:\/\/www.pax8.com\/blog\/?p=5844"},"modified":"2026-02-25T19:01:34","modified_gmt":"2026-02-25T19:01:34","slug":"pax8-security-coverage","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/","title":{"rendered":"Going Beyond Stop-Gap Solutions: All About Pax8 Security Coverage"},"content":{"rendered":"<p>In an era of constant phishing attempts and AI-generated cyber threats, offering comprehensive cybersecurity coverage can be a challenge. As a managed service provider (MSP) or managed intelligence provider (MIP), you can\u2019t deliver the same solutions as years\u2019 past and assume your clients are secure. Luckily, there\u2019s a way to make sure your clients are covered against modern threats: Pax8 <a href=\"https:\/\/app.pax8.com\/security-assessment\" target=\"_blank\" rel=\"noopener\">Security Coverage<\/a>.<\/p>\n<p>Security Coverage is a new feature nestled inside Opportunity Explorer in the <a href=\"https:\/\/www.pax8.com\/en-us\/marketplace\/\" target=\"_blank\" rel=\"noopener\">Pax8 Marketplace<\/a>. It helps you evaluate your clients\u2019 security posture through the lens of the <a href=\"https:\/\/www.pax8.com\/blog\/implementing-cis-controls\/\" target=\"_blank\" rel=\"noopener\">CIS Critical Security Controls<\/a> (CIS Controls), which offer global best practices for cybersecurity.<\/p>\n<h3>Moving From Piecemeal Solutions to Intelligent Defense<\/h3>\n<p>Security Coverage flips the traditional process of selling security. Instead of starting with solutions and trying to justify their value, you can now start with a trusted framework and see exactly how your clients measure up.<\/p>\n<p>Security Coverage helps you:<\/p>\n<ul>\n<li><strong>Follow a trusted framework by<\/strong> choosing a CIS Control and seeing which Pax8 Marketplace solutions meet it.<\/li>\n<li><strong>Evaluate your clients\u2019 security posture by<\/strong> instantly identifying which safeguards are covered, partially covered or exposed.<\/li>\n<li><strong>Act with confidence by<\/strong> turning those insights into clear, data-backed recommendations for your clients.<\/li>\n<\/ul>\n<p>Security Coverage makes transparency actionable and is available directly within Opportunity Explorer in the Pax8 Marketplace.<\/p>\n<h3>Why This Matters Right Now<\/h3>\n<p>We\u2019re entering a new era in which <a href=\"https:\/\/pages.pax8.com\/agentic-inflection.html\" target=\"_blank\" rel=\"noopener\">intelligence<\/a> and outcomes define value in the eyes of your clients.<\/p>\n<p>They no longer want a list of tools. They want clarity. In a time when nearly every SMB has faced cyber threats but <a href=\"https:\/\/www.connectwise.com\/company\/press\/releases\/connectwise-research-finds-78-of-smbs-concerned-a-cyber-attack-could-put-their-organizations-out-of-business\" target=\"_blank\" rel=\"noopener\">76%<\/a> of SMBs lack the necessary skills to properly address security issues, clients want proof that their technology partner understands how to strengthen their security and compliance.<\/p>\n<p>Security Coverage helps you deliver that proof while creating new business opportunities:<\/p>\n<ul>\n<li><strong>Grow Revenue:<\/strong> Every identified gap becomes a reason to help clients improve their protection.<\/li>\n<li><strong>Increase Efficiency:<\/strong> Automated mapping saves hours of manual research and analysis.<\/li>\n<li><strong>Reduce Risk:<\/strong> By aligning with CIS Controls, you bring transparency and confidence to every client conversation, helping build long-lasting trust.<\/li>\n<\/ul>\n<p>When you can show, not just tell, why your recommendations matter, you elevate the entire client relationship.<\/p>\n<h3>Future-Proofing Businesses with Data and Intelligence<\/h3>\n<p>Security Coverage represents an important step in Pax8\u2019s broader intelligence strategy \u2014 using data to help our partners make smarter, faster and more informed decisions.<\/p>\n<p>Connecting the global best practices laid out in the CIS Controls with Marketplace insights about your clients\u2019 coverage lays the groundwork for partners like you to offer intelligent recommendations. In the future, this will evolve into automated suggestions that help you deliver value to your clients faster and at scale. Our goal is to create an intelligent Marketplace that anticipates your clients\u2019 needs to help you be proactive and serve them with clarity and confidence.<\/p>\n<h3>Your Next Step<\/h3>\n<p>The path to <a href=\"https:\/\/pages.pax8.com\/agentic-inflection.html\" target=\"_blank\" rel=\"noopener\">Managed Intelligence<\/a> starts with understanding what you already have and where you need to grow. Navigate to Security Coverage within Opportunity Explorer to visualize your clients\u2019 current security posture by each of the 18 CIS Controls. This gives you the backing you need to make recommendations that are aligned to industry standards, helping create trust, transparency and \u2014 most importantly \u2014 comprehensive security coverage.<\/p>\n<p>Remember, it\u2019s not about what products you sell. It\u2019s about providing measurable value and proof that your clients are truly protected. Explore Security Coverage today in the <strong>Pax8 Marketplace<\/strong>.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/en-us\/marketplace\/\" target=\"_blank\" rel=\"noopener\">Discover Security Coverage<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover how Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.<\/p>\n","protected":false},"author":171,"featured_media":5858,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[11,5],"tags":[],"class_list":["post-5844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pax8-marketplace","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>All About Pax8 Security Coverage | Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Learn how Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Pax8 Security Coverage Helps MSPs Go Beyond Products\" \/>\n<meta property=\"og:description\" content=\"Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-25T09:59:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T19:01:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2025\/11\/pax8-marketplace-security-coverage-opportunity-explorer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pmysliviec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Pax8 Security Coverage Helps MSPs Go Beyond Products\" \/>\n<meta name=\"twitter:description\" content=\"Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pmysliviec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/\"},\"author\":{\"name\":\"pmysliviec\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4796ce0b7f3895c287f8d742d950b4a8\"},\"headline\":\"Going Beyond Stop-Gap Solutions: All About Pax8 Security Coverage\",\"datePublished\":\"2026-02-25T09:59:03+00:00\",\"dateModified\":\"2026-02-25T19:01:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/\"},\"wordCount\":577,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2025\\\/11\\\/pax8-marketplace-security-coverage-opportunity-explorer.jpg\",\"articleSection\":[\"Pax8 Marketplace\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/\",\"name\":\"All About Pax8 Security Coverage | Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2025\\\/11\\\/pax8-marketplace-security-coverage-opportunity-explorer.jpg\",\"datePublished\":\"2026-02-25T09:59:03+00:00\",\"dateModified\":\"2026-02-25T19:01:34+00:00\",\"description\":\"Learn how Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2025\\\/11\\\/pax8-marketplace-security-coverage-opportunity-explorer.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2025\\\/11\\\/pax8-marketplace-security-coverage-opportunity-explorer.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Pax8 Marketplace showing security coverage in opportunity explorer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/pax8-security-coverage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Going Beyond Stop-Gap Solutions: All About Pax8 Security Coverage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4796ce0b7f3895c287f8d742d950b4a8\",\"name\":\"pmysliviec\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/pmysliviec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"All About Pax8 Security Coverage | Pax8 Blog","description":"Learn how Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/","og_locale":"en_US","og_type":"article","og_title":"How Pax8 Security Coverage Helps MSPs Go Beyond Products","og_description":"Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.","og_url":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/","og_site_name":"Pax8 Blog","article_published_time":"2026-02-25T09:59:03+00:00","article_modified_time":"2026-02-25T19:01:34+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2025\/11\/pax8-marketplace-security-coverage-opportunity-explorer.jpg","type":"image\/jpeg"}],"author":"pmysliviec","twitter_card":"summary_large_image","twitter_title":"How Pax8 Security Coverage Helps MSPs Go Beyond Products","twitter_description":"Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.","twitter_misc":{"Written by":"pmysliviec","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/"},"author":{"name":"pmysliviec","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4796ce0b7f3895c287f8d742d950b4a8"},"headline":"Going Beyond Stop-Gap Solutions: All About Pax8 Security Coverage","datePublished":"2026-02-25T09:59:03+00:00","dateModified":"2026-02-25T19:01:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/"},"wordCount":577,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2025\/11\/pax8-marketplace-security-coverage-opportunity-explorer.jpg","articleSection":["Pax8 Marketplace","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/","url":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/","name":"All About Pax8 Security Coverage | Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2025\/11\/pax8-marketplace-security-coverage-opportunity-explorer.jpg","datePublished":"2026-02-25T09:59:03+00:00","dateModified":"2026-02-25T19:01:34+00:00","description":"Learn how Pax8 Security Coverage helps MSPs and MIPs assess client security posture, uncover gaps and deliver data-driven recommendations to build trust.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2025\/11\/pax8-marketplace-security-coverage-opportunity-explorer.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2025\/11\/pax8-marketplace-security-coverage-opportunity-explorer.jpg","width":1200,"height":630,"caption":"Pax8 Marketplace showing security coverage in opportunity explorer"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/pax8-security-coverage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Going Beyond Stop-Gap Solutions: All About Pax8 Security Coverage"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4796ce0b7f3895c287f8d742d950b4a8","name":"pmysliviec","url":"https:\/\/www.pax8.com\/blog\/author\/pmysliviec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/5844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=5844"}],"version-history":[{"count":1,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/5844\/revisions"}],"predecessor-version":[{"id":5845,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/5844\/revisions\/5845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/5858"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=5844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=5844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=5844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}