{"id":2220,"date":"2021-12-17T07:54:23","date_gmt":"2021-12-17T07:54:23","guid":{"rendered":"https:\/\/netwitne-1772.demosrv.review\/en-us\/offers\/eliminating-access-blind-spots-in-todays-modern-enterprise\/"},"modified":"2025-06-10T02:19:50","modified_gmt":"2025-06-10T06:19:50","slug":"eliminating-access-blind-spots-in-todays-modern-enterprise","status":"publish","type":"offers","link":"https:\/\/www.netwitness.com\/ko\/offers\/eliminating-access-blind-spots-in-todays-modern-enterprise\/","title":{"rendered":"Eliminating Access Blind Spots in Today&#8217;s Modern Enterprise"},"excerpt":{"rendered":"<p>Identity has emerged as the most consequential attack vector. As identity attacks continue to increase, protecting against them is getting to be more difficult with a disrupted perimeter, islands of identity and a dynamic user population. In this evolving threat environment, only an advanced multi-factor authentication solution can provide the visibility and control you need.<\/p>\n","protected":false},"featured_media":420,"template":"","class_list":["post-2220","offers","type-offers","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.netwitness.com\/ko\/wp-json\/wp\/v2\/offers\/2220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netwitness.com\/ko\/wp-json\/wp\/v2\/offers"}],"about":[{"href":"https:\/\/www.netwitness.com\/ko\/wp-json\/wp\/v2\/types\/offers"}],"version-history":[{"count":0,"href":"https:\/\/www.netwitness.com\/ko\/wp-json\/wp\/v2\/offers\/2220\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netwitness.com\/ko\/wp-json\/wp\/v2\/media\/420"}],"wp:attachment":[{"href":"https:\/\/www.netwitness.com\/ko\/wp-json\/wp\/v2\/media?parent=2220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}