{"id":471783,"date":"2021-04-06T09:03:39","date_gmt":"2021-04-06T13:03:39","guid":{"rendered":"http:\/\/www.marketnewsdesk.com\/?p=471783"},"modified":"2021-04-06T09:03:39","modified_gmt":"2021-04-06T13:03:39","slug":"announcing-zero-trust-authentication-for-managed-devices-and-byod","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/","title":{"rendered":"Announcing Zero Trust Authentication for Managed Devices and BYOD"},"content":{"rendered":"<h2>\nBeyond Identity Now Integrates With Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Collecting Additional Device Attributes to Further Expand Risk-Based Authentication Decisions<br \/>\n<\/h2>\n<div class=\"mw_release\">\n<p>NEW YORK, April  06, 2021  (GLOBE NEWSWIRE) &#8212; <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=VPJ6DYeDGRY1zpW_33bCYF0E7_qGTUX7WT2GAQH2CjB8_FLZVv8zbDM-Zal2JpbRjbpRZfroQ31i3mIZHI4111mjD03Ww179TFB76CdW91E=\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Beyond Identity<\/a> today announced the addition of new device security data to further bolster risk-based authentication decisions \u2013 continuing the company\u2019s mission to provide the world\u2019s most secure authentication available. By collecting additional security device posture attributes on its own, as well as attributes from new integrations with industry-leading mobile device management (MDM) solutions, including Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Beyond Identity now enables security teams to check real-time risk signals from every user, every device, at every authentication.<\/p>\n<p>\u201cIt\u2019s well-understood that passwords are inherently insecure and that account takeover attacks are the leading cybersecurity threat to organizations today,\u201d said Jasson Casey, CTO at Beyond Identity. \u201cIt\u2019s especially difficult to manage access to cloud applications. With SaaS and other cloud resources, anyone can login from any web browser on any device, if they have access to the password. We all know that passwords are completely compromised. Our zero trust authentication solution was built to help security teams close this gap and ensure only authorized users and devices are able to access the organization\u2019s data and resources.\u201d<\/p>\n<p>The most secure way to control access is to replace passwords with fundamentally secure authentication factors and to stop users from logging in from unauthorized devices. The first step is to go completely passwordless with Beyond Identity\u2019s advanced authenticator, which positively identifies users with multiple secure authentication factors. The second step is to screen each device at the time of login to ensure that it meets security and compliance requirements before allowing access. This enables organizations to actively control that only validated users and appropriately secure devices have access to company resources. With Beyond Identity, users and devices need to go through real-time security and behavioral checks.<\/p>\n<p>With zero trust authentication, Beyond Identity\u2019s passwordless authenticator now natively collects more than 25 attributes from users, devices, and applications, including granular device security data from all computers, tablets, and phones. These risk signals are collected from every device during every authentication, including managed and unmanaged devices such as bring your own device (BYOD). This new approach to passwordless authentication is purpose-built to secure organizations with distributed, hybrid workforces requiring secure access to cloud applications and resources.<\/p>\n<p>For organizations that have already deployed MDM software, Beyond Identity has direct integrations with solutions such as Jamf, Microsoft Intune, and VMware Workspace ONE UEM to enhance the data set available in the creation of risk policies used during real-time authentication decisions. For those without an existing MDM provider, Beyond Identity can still gather a significant amount of device security posture data for use in risk-based authentication.<\/p>\n<p>For more information, please:<\/p>\n<ul type=\"disc\">\n<li>\n          <a href=\"https:\/\/www.beyondidentity.com\/blog\/introducing-new-device-context-and-MDM-integrations?utm_source=press_release&amp;utm_medium=web&amp;utm_campaign=auth0&amp;utm_term=&amp;utm_content=blog\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Learn about Beyond Identity\u2019s passwordless authentication<\/a>\n        <\/li>\n<li>\n          <a href=\"https:\/\/www.beyondidentity.com\/go-passwordless?utm_source=press_release&amp;utm_medium=web&amp;utm_campaign=risk_policy&amp;utm_term=&amp;utm_content=free_passwordless\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Set up free passwordless authentication<\/a>\n        <\/li>\n<li>\n          <a href=\"https:\/\/www.beyondidentity.com\/get-demo?utm_source=press_release&amp;utm_medium=web&amp;utm_campaign=risk_policy&amp;utm_term=&amp;utm_content=demo\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Request a demo<\/a><br \/>\n          \n        <\/li>\n<\/ul>\n<p>\n        <strong>About Beyond Identity<\/strong><br \/>\n        <br \/>Headquartered in New York City, Beyond Identity was founded by industry legends Jim Clark and Tom Jermoluk to eliminate passwords and radically change the way the world logs in, without requiring organizations to radically change their technology stack or processes. Funded by leading investors, including Koch Disruptive Technologies (KDT) and New Enterprise Associates (NEA), Beyond Identity\u2019s mission is to empower the next generation of secure digital business by replacing passwords with fundamentally secure X.509-based certificates. This patents-pending approach creates an extended Chain of Trust\u2122 that includes user and device identity and a real-time snapshot of the device\u2019s security posture for adaptive risk-based authentication and authorization. Beyond Identity\u2019s cloud-native solution enables customers to increase business velocity, implement new business models, reduce operating costs, and achieve complete passwordless identity management. Visit <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=rYbOx07QGjd0MVWFngIC2BeXqbiRGe2CIRONKDflD9jvfMMcow-bBUA0qj0ZgdZfZaVocehN-v3R_L_oRJRMexfl58FAYLWjSgy6mWR8kGk=\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">www.beyondidentity.com<\/a> for more information.<\/p>\n<p>\n        <em>All product and company names herein may be trademarks of their respective owners.<\/em>\n      <\/p>\n<p>\ufeff<strong>Contact:<\/strong><br \/>Claire Mutty<br \/>CHEN PR for Beyond Identity <br \/><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=VDF4jJB8MTEWkvJdwYdmLZ-CXAbmGRxhSnHgWdiuGugtLMgbZ1Yp1LDmaCHqTBhDnQ5ban7kUsn-qyziR_KPIA==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">cmutty@chenpr.com<\/a><br \/>781-672-3113<\/p>\n<p>      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=\" width=\"1\" height=\"1\" \/><br \/>\n      <br \/>\n      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/ml.globenewswire.com\/release\/track\/4dbe2475-88a9-4f54-b483-9584dcef3842\" width=\"1\" height=\"1\" \/>\n    <\/div>\n<div class=\"mw_contactinfo\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Beyond Identity Now Integrates With Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Collecting Additional Device Attributes to Further Expand Risk-Based Authentication Decisions NEW YORK, April 06, 2021 (GLOBE NEWSWIRE) &#8212; Beyond Identity today announced the addition of new device security data to further bolster risk-based authentication decisions \u2013 continuing the company\u2019s mission to provide the world\u2019s most secure authentication available. By collecting additional security device posture attributes on its own, as well as attributes from new integrations with industry-leading mobile device management (MDM) solutions, including Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Beyond Identity now enables security teams to check real-time risk signals from every user, every device, at every authentication. \u201cIt\u2019s well-understood that passwords are inherently insecure &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Announcing Zero Trust Authentication for Managed Devices and BYOD&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-471783","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Announcing Zero Trust Authentication for Managed Devices and BYOD - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Announcing Zero Trust Authentication for Managed Devices and BYOD - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"Beyond Identity Now Integrates With Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Collecting Additional Device Attributes to Further Expand Risk-Based Authentication Decisions NEW YORK, April 06, 2021 (GLOBE NEWSWIRE) &#8212; Beyond Identity today announced the addition of new device security data to further bolster risk-based authentication decisions \u2013 continuing the company\u2019s mission to provide the world\u2019s most secure authentication available. By collecting additional security device posture attributes on its own, as well as attributes from new integrations with industry-leading mobile device management (MDM) solutions, including Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Beyond Identity now enables security teams to check real-time risk signals from every user, every device, at every authentication. \u201cIt\u2019s well-understood that passwords are inherently insecure &hellip; Continue reading &quot;Announcing Zero Trust Authentication for Managed Devices and BYOD&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-06T13:03:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"Announcing Zero Trust Authentication for Managed Devices and BYOD\",\"datePublished\":\"2021-04-06T13:03:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/\"},\"wordCount\":659,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/\",\"name\":\"Announcing Zero Trust Authentication for Managed Devices and BYOD - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=\",\"datePublished\":\"2021-04-06T13:03:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=\",\"contentUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/announcing-zero-trust-authentication-for-managed-devices-and-byod\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Announcing Zero Trust Authentication for Managed Devices and BYOD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Announcing Zero Trust Authentication for Managed Devices and BYOD - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/","og_locale":"en_US","og_type":"article","og_title":"Announcing Zero Trust Authentication for Managed Devices and BYOD - Market Newsdesk","og_description":"Beyond Identity Now Integrates With Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Collecting Additional Device Attributes to Further Expand Risk-Based Authentication Decisions NEW YORK, April 06, 2021 (GLOBE NEWSWIRE) &#8212; Beyond Identity today announced the addition of new device security data to further bolster risk-based authentication decisions \u2013 continuing the company\u2019s mission to provide the world\u2019s most secure authentication available. By collecting additional security device posture attributes on its own, as well as attributes from new integrations with industry-leading mobile device management (MDM) solutions, including Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Beyond Identity now enables security teams to check real-time risk signals from every user, every device, at every authentication. \u201cIt\u2019s well-understood that passwords are inherently insecure &hellip; Continue reading \"Announcing Zero Trust Authentication for Managed Devices and BYOD\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/","og_site_name":"Market Newsdesk","article_published_time":"2021-04-06T13:03:39+00:00","og_image":[{"url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"Announcing Zero Trust Authentication for Managed Devices and BYOD","datePublished":"2021-04-06T13:03:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/"},"wordCount":659,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/","name":"Announcing Zero Trust Authentication for Managed Devices and BYOD - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=","datePublished":"2021-04-06T13:03:39+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/#primaryimage","url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk=","contentUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODIxMTczOCM0MTA2MTQyIzIxOTY0MTk="},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/announcing-zero-trust-authentication-for-managed-devices-and-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"Announcing Zero Trust Authentication for Managed Devices and BYOD"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/471783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=471783"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/471783\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=471783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=471783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=471783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}