{"id":244,"date":"2015-04-07T19:15:22","date_gmt":"2015-04-07T19:15:22","guid":{"rendered":"https:\/\/www.securekloud.com\/blog\/?p=244"},"modified":"2025-07-25T11:47:40","modified_gmt":"2025-07-25T11:47:40","slug":"eziam-moving-your-identities-to-the-cloud-an-analysis","status":"publish","type":"post","link":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/","title":{"rendered":"A Complete Guide to Move Identities to Cloud (How EzIAM Helps)"},"content":{"rendered":"<p>Before an enterprise implements an on-premise IDM (Identity Management) solution, there are a lots of factors to consider. These considerations go way up, if the enterprise were to implement a new cloud IDM solution (i.e decide to move their identities partially or fully to a cloud like AWS, Azure or Google and manage these identities using a&nbsp;cloud IDM&nbsp;solution like the EzIAM<sup>TM<\/sup>&nbsp;solution). I will touch upon these items.<\/p>\n<p>There could be 3 types of movers to the cloud.<\/p>\n<ul>\n<li style=\"font-weight:400;\">New enterprise (or a start-up) that is planning to start their operations with a cloud IDM itself straightaway. These enterprises may not have an on-premise presence at all (Neo IDM Movers).<\/li>\n<li style=\"font-weight:400;\">Some other enterprises might be planning to move only some of their existing IDM parts to the cloud and keep the rest of them on-premise (they are generally called the Hybrid IDM Movers).<\/li>\n<li style=\"font-weight:400;\">While a few others could try to move their entire on-premise IDM operations to the cloud (Total IDM Movers). Although there will be some common considerations for these 3 categories of movers, before they decide to move to Cloud IDM, they individually will have some unique issues to deal with.<\/li>\n<\/ul>\n<p><strong>New Movers to a cloud IDM Infrastructure \u2013 companies starting their operations in the Cloud &amp; hence want to have all their identities in the new cloud IDM infrastructure from day 1 of their operations:<\/strong><\/p>\n<p>These are the companies that start their identity management in the cloud itself straightway. The number of questions that these enterprises would want to be answered would be far less compared to the other 2 category of enterprises. Prime considerations for these type of organizations would be:<\/p>\n<ul>\n<li style=\"font-weight:400;\">Will the cloud IDM solution be safe to implement (i.e safe to have my corporate users &amp; identities exist in there) ?<\/li>\n<li style=\"font-weight:400;\">Will the cloud IDM solution be able to address the day-to-day IDM operations\/workflows that each user is going to go through?<\/li>\n<li style=\"font-weight:400;\">Will the cloud IDM solution be able to scale for the number of users ?<\/li>\n<li style=\"font-weight:400;\">What are the connectivity options (from a provisioning standpoint) that the cloud-idm system provides ? (i.e connecting to their applications\/db\u2019s\/directories that are existing on the cloud, assuming they are a complete cloud organization)?<\/li>\n<li style=\"font-weight:400;\">How robust these connections are (i.e in terms of number of concurrent users, data transport safety) ?<\/li>\n<li style=\"font-weight:400;\">What are the Single Sign-On connectivity options that the solution provides ?<\/li>\n<li style=\"font-weight:400;\">What are the advanced authentication mechanisms that the solution provides ?<\/li>\n<li style=\"font-weight:400;\">What are the compliance and regulatory mechanisms in place ?<\/li>\n<li style=\"font-weight:400;\">What are the data backup and recovery technologies in place ?<\/li>\n<li style=\"font-weight:400;\">What are the log and audit mechanisms in place ?<\/li>\n<\/ul>\n<p>If the organization can get convincing answers to the above questions, I think it is prudent for them to move their identities to the cloud. EzIAM<sup>TM<\/sup>, as a cloud IDM solution (from SecureKloud Inc.) has the best possible answers to the above questions in the market today. It is definetly an identity-safe, data-safe and a transport-safe solution, meaning identities stored within EzIAM<sup>TM<\/sup>&nbsp;directories and databases stay there in a secure manner and when transported either within the cloud or outside, always go through a TLS tunnel. Each component of EzIAM<sup>TM<\/sup>&nbsp;(there are 7 components\/servers) is load-balanced and are tuned for high scale performance.<\/p>\n<p>There are more than 30 out-of-the-box provisioning connectors available to connect to various directories, databases and software applications. The Single Sign-On connectivity options are innumerable with support for SAML2.0, OpenID 2.0 and OAuth 2.0. Varied advanced authentication mechanisms are supported that ranges from X509 cert\/smart card based tokens &amp; OTP\/mobile-based authentications. Being in the AWS cloud the backup process and recovery process is as efficient as any back process can be. Daily backups of snapshots and data are taken, with ability to recover within minutes.<\/p>\n<p><strong>Hybrid Movers to a cloud IDM infrastructure \u2013 companies moving their on-premise identities &amp; applications to the cloud but not fully yet :<\/strong><\/p>\n<p>Most of the companies would fall into this category. These kind of movers, move only a few parts of their IDM infrastructure to the cloud. They would initially move their applications to the cloud to start with. Then they would probably move their user stores\/directories and along with that their identities to the cloud. They would still have some applications on-premise, which they would need to connect from the cloud IDM solution. They would also want to perform the daily identity workflow process from the cloud IDM solution. This way they can streamline their operations especially if they have offices in multiple locations, with users in multiple Organizational Units (OUs), accessing multiple on-premise and cloud applications.<\/p>\n<p>Hybrid movers would have the maximum expectations from their cloud IDM solution, as the solution needs to address both their on-premise and cloud assets. Generally if these movers can get answers to the following tough questions, they will be much satisfied, before they move their IDM assets to the cloud.<\/p>\n<ul>\n<li style=\"font-weight:400;\">Will the cloud IDM solution enable me to have a single primary Corporate Directory in the cloud? How will it enable the move of my current on-premise primary directory\/user database to the cloud?<\/li>\n<li style=\"font-weight:400;\">Will the solution allow me to provision users from our existing on-premise endpoints to the cloud?<\/li>\n<li style=\"font-weight:400;\">Will the solution help me keep my on-premise endpoints (that contain user identities) in tact and move these endpoints in stages to the cloud.<\/li>\n<li style=\"font-weight:400;\">I have applications, on-premise whose access is controlled by on-premise Access Control software. How can I continue to have these applications on-premise and enable access control to them via the cloud IDM solution?<\/li>\n<li style=\"font-weight:400;\">How will the solution provide access control to the applications that I am going to move to the cloud?<\/li>\n<li style=\"font-weight:400;\">Will the cloud IDM solution help me chalk out a new administrator\/group\/role\/user base structure?<\/li>\n<li style=\"font-weight:400;\">Will the solution help me control my entire IDM life-cycle management (from the day a user joins the org to the time any user leaves the org) through the cloud IDM ?<\/li>\n<li style=\"font-weight:400;\">How exhaustive will the cloud IDM solution allow my access permission levels to be?<\/li>\n<li style=\"font-weight:400;\">How often would the cloud IDM solution allow me to do a bulk-load of users from an on-premise directory or db?<\/li>\n<li style=\"font-weight:400;\">What will the performance of the system when I perform other IDM operations with the system, during this bulk-load of users?<\/li>\n<li style=\"font-weight:400;\">Will the solution allow us to have a separate HR application which we would want to be connected and synched up with the cloud IDM Corporate Directory?<\/li>\n<li style=\"font-weight:400;\">What are the security benefits in connectivity, transport, access control, IDM life cycle operations, provisioning, admin-access etc. that the solution offers?<\/li>\n<li style=\"font-weight:400;\">What are the connectivity options (i.e connecting to other enterprise applications across that enterprise\u2019s firewall\u2019s?)<\/li>\n<li style=\"font-weight:400;\">What SaaS applications that the solution would allow the users to connect to in the future? How would the solution control those connections through a standard universal access administration for my company?<\/li>\n<\/ul>\n<p>Total Movers to a cloud IDM infrastructure \u2013 companies that move 100% of their identity infrastructure to the cloud from an on-premise datacenter :<\/p>\n<p>The primary motivation behind the \u201cTotal Movers\u201d of IDM to the cloud would be the following:<\/p>\n<ul>\n<li style=\"font-weight:400;\">How can I move my entire IDM infrastructure without loosing data, application access control, identity workflows, Endpoint Identity Data, Connectors ?<\/li>\n<li style=\"font-weight:400;\">How long would it take for my move ?<\/li>\n<li style=\"font-weight:400;\">Would I be able to setup a QA environment and test the system thoroughly before moving to production in the cloud?<\/li>\n<li style=\"font-weight:400;\">How can I transition from my on-premise IDM software to a different cloud IDM software like EzIAM<sup>TM<\/sup>?<\/li>\n<li style=\"font-weight:400;\">What is the learning curve for my users to use this system?<\/li>\n<li style=\"font-weight:400;\">How can I customize the cloud IDM user interface, so it depicts my organizations profile &amp; IDM goals\/strategies ?<\/li>\n<li style=\"font-weight:400;\">How much can I save in trained IDM skilled personnel and on-premise infrastructure costs when I move my IDM to the cloud in its entirety?<\/li>\n<\/ul>\n<p>For all the 3 kinds of cloud movers described above, EzIAM<sup>TM<\/sup>&nbsp;would be a perfect solution. Pretty much all the questions posted above for all the types of movers, can be answered by the deployment of EzIAM<sup>TM<\/sup>. The solution is very versatile, customizable and has great connectivity options to all types of endpoints that an enterprise can have. The learning curve to get used to the screens is very minimal, as the screens are intuitive. Mobile access is enabled. The feature of integrating EzIAM<sup>TM<\/sup>&nbsp;with a cloud Governance Service solution is an added incentive for the movers, as this option would be extremely helpful to govern their identity environment efficiently.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before an enterprise implements an on-premise IDM (Identity Management) solution, there are a lots of factors to consider. These considerations go way up, if the enterprise were to implement a new cloud IDM solution (i.e decide to move their identities partially or fully to a cloud like AWS, Azure or Google and manage these identities [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":246,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[40],"tags":[],"class_list":["post-244","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-access-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Moving Identity Management to the Cloud with EzIAM Insights<\/title>\n<meta name=\"description\" content=\"Gain a complete overview of the three types of IDM movers and their key considerations for doing so. Also, learn how EzIAM helps all the identity movers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Moving Identity Management to the Cloud with EzIAM Insights\" \/>\n<meta property=\"og:description\" content=\"Gain a complete overview of the three types of IDM movers and their key considerations for doing so. Also, learn how EzIAM helps all the identity movers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"SecureKloud\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-07T19:15:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-25T11:47:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2015\/04\/eziam-moving-your-identities-to-the-cloud-an-analysis_v1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mary Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mary Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/\"},\"author\":{\"name\":\"Mary Alex\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/7524ca6f87f0caef09a82712a67e3674\"},\"headline\":\"A Complete Guide to Move Identities to Cloud (How EzIAM Helps)\",\"datePublished\":\"2015-04-07T19:15:22+00:00\",\"dateModified\":\"2025-07-25T11:47:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/\"},\"wordCount\":1421,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\"},\"articleSection\":[\"Identity Access Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/\",\"name\":\"Moving Identity Management to the Cloud with EzIAM Insights\",\"isPartOf\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#website\"},\"datePublished\":\"2015-04-07T19:15:22+00:00\",\"dateModified\":\"2025-07-25T11:47:40+00:00\",\"description\":\"Gain a complete overview of the three types of IDM movers and their key considerations for doing so. Also, learn how EzIAM helps all the identity movers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securekloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Complete Guide to Move Identities to Cloud (How EzIAM Helps)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#website\",\"url\":\"https:\/\/www.securekloud.com\/blog\/\",\"name\":\"SecureKloud\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securekloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\",\"name\":\"SecureKloud\",\"url\":\"https:\/\/www.securekloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png\",\"contentUrl\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png\",\"width\":240,\"height\":48,\"caption\":\"SecureKloud\"},\"image\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/7524ca6f87f0caef09a82712a67e3674\",\"name\":\"Mary Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/mary-alex-150x150.png\",\"contentUrl\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/mary-alex-150x150.png\",\"caption\":\"Mary Alex\"},\"description\":\"A versatile content writer with deep domain knowledge and experience in delivering results-driven content. With an endless fascination for words, she is an aspiring business storyteller.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/mary-alex\/\"],\"url\":\"https:\/\/www.securekloud.com\/blog\/author\/mary-alex-thelleeran\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Moving Identity Management to the Cloud with EzIAM Insights","description":"Gain a complete overview of the three types of IDM movers and their key considerations for doing so. Also, learn how EzIAM helps all the identity movers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Moving Identity Management to the Cloud with EzIAM Insights","og_description":"Gain a complete overview of the three types of IDM movers and their key considerations for doing so. Also, learn how EzIAM helps all the identity movers.","og_url":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/","og_site_name":"SecureKloud","article_published_time":"2015-04-07T19:15:22+00:00","article_modified_time":"2025-07-25T11:47:40+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2015\/04\/eziam-moving-your-identities-to-the-cloud-an-analysis_v1.jpg","type":"image\/jpeg"}],"author":"Mary Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mary Alex","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/#article","isPartOf":{"@id":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/"},"author":{"name":"Mary Alex","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/7524ca6f87f0caef09a82712a67e3674"},"headline":"A Complete Guide to Move Identities to Cloud (How EzIAM Helps)","datePublished":"2015-04-07T19:15:22+00:00","dateModified":"2025-07-25T11:47:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/"},"wordCount":1421,"commentCount":0,"publisher":{"@id":"https:\/\/www.securekloud.com\/blog\/#organization"},"articleSection":["Identity Access Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/","url":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/","name":"Moving Identity Management to the Cloud with EzIAM Insights","isPartOf":{"@id":"https:\/\/www.securekloud.com\/blog\/#website"},"datePublished":"2015-04-07T19:15:22+00:00","dateModified":"2025-07-25T11:47:40+00:00","description":"Gain a complete overview of the three types of IDM movers and their key considerations for doing so. Also, learn how EzIAM helps all the identity movers.","breadcrumb":{"@id":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.securekloud.com\/blog\/eziam-moving-your-identities-to-the-cloud-an-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securekloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Complete Guide to Move Identities to Cloud (How EzIAM Helps)"}]},{"@type":"WebSite","@id":"https:\/\/www.securekloud.com\/blog\/#website","url":"https:\/\/www.securekloud.com\/blog\/","name":"SecureKloud","description":"","publisher":{"@id":"https:\/\/www.securekloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securekloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.securekloud.com\/blog\/#organization","name":"SecureKloud","url":"https:\/\/www.securekloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png","contentUrl":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png","width":240,"height":48,"caption":"SecureKloud"},"image":{"@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/7524ca6f87f0caef09a82712a67e3674","name":"Mary Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/mary-alex-150x150.png","contentUrl":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/mary-alex-150x150.png","caption":"Mary Alex"},"description":"A versatile content writer with deep domain knowledge and experience in delivering results-driven content. With an endless fascination for words, she is an aspiring business storyteller.","sameAs":["https:\/\/www.linkedin.com\/in\/mary-alex\/"],"url":"https:\/\/www.securekloud.com\/blog\/author\/mary-alex-thelleeran\/"}]}},"_links":{"self":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/comments?post=244"}],"version-history":[{"count":4,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/244\/revisions"}],"predecessor-version":[{"id":1044,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/244\/revisions\/1044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/media?parent=244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/categories?post=244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/tags?post=244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}