{"id":2994,"date":"2018-02-12T08:00:27","date_gmt":"2018-02-12T16:00:27","guid":{"rendered":""},"modified":"2023-05-31T16:29:44","modified_gmt":"2023-05-31T23:29:44","slug":"behavioral-biometrics-authentication-repairing-the-digital-infrastructure","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/","title":{"rendered":"Behavioral biometrics authentication: repairing the digital infrastructure"},"content":{"rendered":"<p>Along with the advent of the internet and mobile devices has come the construction of a vast global digital infrastructure. This infrastructure has made us more connected, productive, and agile than we have ever been. We now have the ability to pay bills, schedule medical appointments, go shopping, and bank \u2013 all at our fingertips. Operating within this infrastructure, however, requires sharing Personally Identifiable Information (PII) such as credit card and bank account numbers and dates of birth. We willingly surrender our personal information in the name of convenience \u2013 even though frequent hacks and data breaches prove many companies do not invest deeply enough in security<\/p>\n<p>The security measures that protect PII are often inadequate and expose consumers to a staggering number of ever-evolving threats every day. Retailers, e-commerce giants, and even financial institutions are frequently in the news for suffering hacks and data breaches. These weaknesses enable fraudsters to steal PII for use in all manner of criminal acts \u2013 and financial institutions are a primary target. In the current environment, it is critical that digital identity verification move beyond the use of PII and two-factor authentication and toward forms of identification that cannot be stolen, copied, or lost.<\/p>\n<p>Investing in new and improved security strategies will show returns for targeted organizations, like financial institutions, and the global digital infrastructure. These returns will be in more areas than just minimizing the cost of data breaches and reducing the number of expensive false alarms, they also will improve the user experience. Enhanced security will help rebuild consumer trust and repair perceptions that are damaged every time another breach occurs or another customer is swindled.<\/p>\n<h2>Lack of effective PII security has taken a toll on consumer trust<\/h2>\n<p>In 2016 alone, more than 1 billion records were stolen in data breaches.<sup>1<\/sup>\u00a0Today, more than 5 million records are lost or stolen daily.<sup>2\u00a0<\/sup>For organizations that don\u2019t invest in advanced and innovative security solutions, the question is no longer \u201cif\u201d they have been breached \u2013 it\u2019s \u201chow\u201d or \u201cwhen.\u201d And, with stolen PII, financial fraud soon follows.<\/p>\n<p>This scale of PII exposure creates problems not only for consumers\u2019 financial dealings \u2013 it has ramifications in other areas of their lives. Information such as names, Social Security numbers, and addresses are the same information individuals use when they apply for jobs, pay taxes, and receive healthcare. The issue has become so rampant that regulatory bodies across the globe have started enacting laws to modernize and strengthen protections for customers\u2019 data.<\/p>\n<h2>Traditional security approaches are ineffective and costly<\/h2>\n<p>Traditional means of security are unable to keep pace with the increasingly sophisticated avenues of attack introduced by fraudsters every day. Even with two-factor authentication, innovative hackers continue to gain access to user accounts, utilizing social engineering schemes or spoofed \u201cman-in-the-middle\u201d login websites. Traditional security approaches are not only ineffective, they are expensive and cause enormous downstream operational costs from handling false positives and authentication failures.<\/p>\n<p>Organizations leveraging traditional malware detection systems reported that 40% of investigated malware alerts turn out to be false positives.<sup>3<\/sup>\u00a0Chasing these erroneous leads requires time and manpower, neither of which is cheap. Authentication failures also place a strain on operations. Authentication mechanisms underpin many fraud prevention efforts, but when users fail their authentication test for one reason or another, they are often contacted by a call center for assistance. Each of these calls to customers costs an average of four dollars \u2013 whether the user answers their phone or not \u2013 so it\u2019s easy to see why the costs add up quickly for even a big financial institution.<sup>4<\/sup><\/p>\n<p>The effects of data breaches are far-reaching, so the onus is on all of us to do what we can to prevent data breaches and minimize the impact of stolen PII \u2013 but financial institutions are among those with the most to lose. When fraudsters succeed, financial institutions suffer significant reputational damage and legal risk from customers on top of the intense operational burden they already bear. To avoid these harsh realities, minimize the risks of PII exposure, and regain the confidence of consumers, they must revisit their approaches to security and use information that can never be lost, stolen, or copied.<\/p>\n<h2>Behavioral biometrics is the key to repairing our digital infrastructure<\/h2>\n<p>Digital innovation opens new possibilities and offers new solutions to the challenge of securing our global digital infrastructure. A significant advance is the use of behavioral biometric authentication and security protocols. Behavioral biometrics creates profiles based on users\u2019 unique ways of interacting with their devices, such as how they scroll, type, and navigate web pages and mobile applications. These solutions run in the background of online user sessions and require no personal information, providing a frictionless and more secure approach to protecting consumers.<\/p>\n<p>Adding behavioral biometrics to the security arsenal not only enables financial institutions to better protect their customers and reduce fraud, it also drastically <a href=\"https:\/\/www.biocatch.com\/blog\/the-roi-of-behavioral-biometrics\" target=\"_blank\" rel=\"noopener\">cuts costs and enhances operational efficiency<\/a>. Applying continuous authentication processes reduces fraud and friction throughout the customer experience, which helps minimize the risk of losing clientele. Behavioral biometric authentication also reduces the number of false positives that are surfaced by traditional fraud prevention systems, enabling a higher degree of operational efficiency and huge cost savings.<\/p>\n<h2>BioCatch is poised to transform your business today<\/h2>\n<p>BioCatch is a pioneer in the field of behavioral biometrics and enables institutions to take a new approach to protecting the digital identity of consumers. The BioCatch solution, built on Microsoft Cloud technology, is an advanced behavioral biometrics platform that recognizes a wide range of human and non-human cybersecurity threats. With BioCatch, institutions can leverage an unparalleled portfolio of more than 50 patents and 2,000 identity proofing parameters to drive accuracy and resilience in securing online sessions. The solution brings the added benefit of the insight and scale that comes from monitoring over 5 billion transactions every month, enabling institutions to can minimize the financial impact fraud has on their business.<\/p>\n<p>If you\u2019re ready to invest in an approach that will pay dividends in terms of consumer trust, reduced fraud, and enhanced identity proofing infrastructure, visit <a href=\"https:\/\/appsource.microsoft.com\/en-us\/?industry=finance\" target=\"_blank\" rel=\"noopener\">Microsoft AppSource<\/a> and try the BioCatch demo today.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><sup>1\u00a0Ponemon Institute, 2016<\/sup><\/p>\n<p><sup>2\u00a0BioCatch, 2017<\/sup><\/p>\n<p><sup>3\u00a0Breach Level Index, 2017<\/sup><\/p>\n<p><sup>4\u00a0Breach Level Index, 2017<\/sup><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how behavioral biometric authentication enhances security to address weaknesses in the global digital infrastructure and help rebuild consumer trust.<\/p>\n","protected":false},"author":0,"featured_media":10825,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1523],"post_tag":[],"content-type":[1483],"coauthors":[1323],"class_list":["post-2994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-financial-services","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Behavioral biometrics authentication: repairing the digital infrastructure - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Behavioral biometrics authentication: repairing the digital infrastructure - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Learn how behavioral biometric authentication enhances security to address weaknesses in the global digital infrastructure and help rebuild consumer trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-12T16:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T23:29:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 min read\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Andr\u00e9 K. Burrell\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/andre-k-burrell-director\/\",\"@type\":\"Person\",\"@name\":\"Andr\u00e9 K. Burrell\"}],\"headline\":\"Behavioral biometrics authentication: repairing the digital infrastructure\",\"datePublished\":\"2018-02-12T16:00:27+00:00\",\"dateModified\":\"2023-05-31T23:29:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/\"},\"wordCount\":1029,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg\",\"articleSection\":[\"Financial services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/\",\"name\":\"Behavioral biometrics authentication: repairing the digital infrastructure - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg\",\"datePublished\":\"2018-02-12T16:00:27+00:00\",\"dateModified\":\"2023-05-31T23:29:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg\",\"width\":960,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Behavioral biometrics authentication: repairing the digital infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Behavioral biometrics authentication: repairing the digital infrastructure - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Behavioral biometrics authentication: repairing the digital infrastructure - Microsoft Industry Blogs","og_description":"Learn how behavioral biometric authentication enhances security to address weaknesses in the global digital infrastructure and help rebuild consumer trust.","og_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2018-02-12T16:00:27+00:00","article_modified_time":"2023-05-31T23:29:44+00:00","og_image":[{"width":960,"height":300,"url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 min read","Written by":"Andr\u00e9 K. Burrell"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/andre-k-burrell-director\/","@type":"Person","@name":"Andr\u00e9 K. Burrell"}],"headline":"Behavioral biometrics authentication: repairing the digital infrastructure","datePublished":"2018-02-12T16:00:27+00:00","dateModified":"2023-05-31T23:29:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/"},"wordCount":1029,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg","articleSection":["Financial services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/","name":"Behavioral biometrics authentication: repairing the digital infrastructure - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg","datePublished":"2018-02-12T16:00:27+00:00","dateModified":"2023-05-31T23:29:44+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/CLO17_carBackseat_001_feature.jpg","width":960,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/financial-services\/2018\/02\/12\/behavioral-biometrics-authentication-repairing-the-digital-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Behavioral biometrics authentication: repairing the digital infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=2994"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2994\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/10825"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=2994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=2994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=2994"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=2994"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=2994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}