
{"id":2543,"date":"2013-07-26T00:00:00","date_gmt":"2013-07-26T00:00:00","guid":{"rendered":"http:\/\/otava.test\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/"},"modified":"2013-07-26T00:00:00","modified_gmt":"2013-07-26T00:00:00","slug":"enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/","title":{"rendered":"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability &#038; Availability Desired"},"content":{"rendered":"<p dir=\"ltr\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Private Cloud\" src=\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png\" alt=\"Private Cloud\" width=\"212\" height=\"212\" \/>According to a recent survey by IT research firm Neovise as reported by CIOInsight.com of over 800 IT decision-makers in the U.S., enterprise cloud infrastructure as a service (IaaS) is the most widely adopted form of cloud computing. Thirty-seven percent of organizations use private, on-premise IaaS, while 35 percent use private, off-premise IaaS clouds. Another 37 percent use public IaaS clouds.<\/p>\n<p dir=\"ltr\">When it comes to the importance of enterprise <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/private-cloud\/\">private cloud<\/a> attributes, security for sensitive data is rated as highly or somewhat important, at 93 percent of respondents. For concerns around security, check your cloud provider\u2019s dates and reports of independent audits, including <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SSAE 16<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SOC 2<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a> (for healthcare) and <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI DSS<\/a> (for ecommerce and retail). Or, ask for a tour of their facilities to verify their physical, administrative and technical security safeguards.<\/p>\n<figure style=\"width: 624px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" title=\"Enterprise Private Cloud\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Enterprise-Private-CLoud.png\" alt=\"Enterprise Private Cloud\" width=\"624\" height=\"474\" \/><figcaption class=\"wp-caption-text\">Enterprise Private Cloud; Source: CIOInsight.com<\/figcaption><\/figure>\n<p dir=\"ltr\">A close second in desired private cloud attributes is better provisioning (91 percent) and third, advanced management (87 percent). Ask your <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">cloud provider<\/a> what kind of access they give your organization for control &#8211; typically they will provide a <a href=\"https:\/\/portal.otava.com\">web portal<\/a> you can log into and use to start, stop, and take snapshots of your servers.<\/p>\n<p dir=\"ltr\">Ninety-four percent surveyed reported cloud application usage included <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\/\">disaster recovery<\/a>, while 93 percent used it for application testing. Another 92 percent used it for production of applications of average importance, and 88 used the cloud to support mission-critical applications.<\/p>\n<p dir=\"ltr\">For the public cloud, IT decision-makers favor reliability and availability at 67 percent (beyond security concerns). Consistency of performance is second at 64 percent, and performance is 63 percent. For a reliable and available cloud, check your cloud provider\u2019s infrastructure and <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\">data center<\/a> design for full redundancy of all critical components &#8211; including power, network, servers, switches, and more.<\/p>\n<p>Read more about cloud security and private cloud infrastructures:<br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/online-techs-hipaa-cloud-protects-phi-on-physician-software-as-a-service-saas\/\">How the HIPAA Cloud Protects PHI for Physician Software as a Service (SaaS)<\/a><\/em><br \/>\nHow does the HIPAA compliant cloud support and enable progression of health IT and patient care? By creating a high availability, reliable data and application hosting infrastructure that\u2019s secure enough to meet healthcare industry data security compliance regulations, like the Health \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/online-techs-hipaa-cloud-protects-phi-on-physician-software-as-a-service-saas\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/cloud-security-report-only-27-percent-rely-on-encrypted-cloud\/\">Cloud Security Report: Only 27 Percent Rely on Encrypted Cloud<\/a><\/em><br \/>\nA report released by the Ponemon Institute in Traverse City, Michigan reveals that nearly 74 percent of cloud consumers believe the cloud provider is the most responsible for protecting their data, while an alarming 63 percent of respondents aren\u2019t even \u2026<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/cloud-security-report-only-27-percent-rely-on-encrypted-cloud\/\"> Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/securing-regulated-data-with-a-private-cloud-infrastructure\/\">Securing Regulated Data with a Private Cloud Infrastructure<\/a><\/em><br \/>\nDr. Larry Ponemon, chairman and founder of the Ponemon Institute described how the shift of the attack surface from the mobile device is moving to unsecure places in the cloud environment with unsecure data, as reported by HealthITSecurity.com. More specifically, \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/securing-regulated-data-with-a-private-cloud-infrastructure\/\">Continue reading \u2192<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.cioinsight.com\/it-strategy\/cloud-virtualization\/slideshows\/enterprise-it-gains-cloud-sophistication-06\/\">Enterprise IT Gains Cloud Sophistication<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a recent survey by IT research firm Neovise as reported by CIOInsight.com of over 800 IT decision-makers in the U.S., enterprise cloud infrastructure as a service (IaaS) is the most widely adopted form of cloud computing. Thirty-seven percent of organizations use private, on-premise IaaS, while 35 percent use private, off-premise IaaS clouds. Another 37 percent use public IaaS clouds. When it comes to the importance of enterprise private cloud attributes, security for sensitive data is rated as highly or somewhat important, at 93 percent of respondents. For concerns around security, check your cloud provider\u2019s dates and reports of independent audits, including SSAE 16, SOC 2, HIPAA (for healthcare) and PCI DSS (for ecommerce and retail). Or, ask for a tour of their facilities to verify their physical, administrative and technical security safeguards. A close second in desired private cloud attributes is better provisioning (91 percent) and third, advanced management (87 percent). Ask your cloud provider what kind of access they give your organization for control &#8211; typically they will provide a web portal you can log into and use to start, stop, and take snapshots of your servers. Ninety-four percent surveyed reported cloud application usage included disaster recovery,&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[45],"tags":[],"other_category":[],"class_list":["post-2543","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability &amp; Availability Desired | OTAVA<\/title>\n<meta name=\"description\" content=\"When it comes to the importance of enterprise private cloud attributes, security for sensitive data is rated as highly or somewhat important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability &amp; Availability Desired\" \/>\n<meta property=\"og:description\" content=\"When it comes to the importance of enterprise private cloud attributes, security for sensitive data is rated as highly or somewhat important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-26T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability &#038; Availability Desired\",\"datePublished\":\"2013-07-26T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\"},\"wordCount\":474,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png\",\"articleSection\":[\"Cloud Computing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\",\"url\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\",\"name\":\"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability & Availability Desired | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png\",\"datePublished\":\"2013-07-26T00:00:00+00:00\",\"description\":\"When it comes to the importance of enterprise private cloud attributes, security for sensitive data is rated as highly or somewhat important.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#primaryimage\",\"url\":\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png\",\"contentUrl\":\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability &#038; Availability Desired\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability & Availability Desired | OTAVA","description":"When it comes to the importance of enterprise private cloud attributes, security for sensitive data is rated as highly or somewhat important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/","og_locale":"en_US","og_type":"article","og_title":"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability & Availability Desired","og_description":"When it comes to the importance of enterprise private cloud attributes, security for sensitive data is rated as highly or somewhat important.","og_url":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/","og_site_name":"OTAVA","article_published_time":"2013-07-26T00:00:00+00:00","og_image":[{"url":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability &#038; Availability Desired","datePublished":"2013-07-26T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/"},"wordCount":474,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#primaryimage"},"thumbnailUrl":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png","articleSection":["Cloud Computing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/","url":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/","name":"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability & Availability Desired | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#primaryimage"},"thumbnailUrl":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png","datePublished":"2013-07-26T00:00:00+00:00","description":"When it comes to the importance of enterprise private cloud attributes, security for sensitive data is rated as highly or somewhat important.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#primaryimage","url":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png","contentUrl":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/packages\/packages-dedicated-private-cloud.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability &#038; Availability Desired"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2543"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2543\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2543"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}