{"id":71,"date":"2025-04-14T00:00:00","date_gmt":"2025-04-14T00:00:00","guid":{"rendered":"http:\/\/localhost\/23520-ideal.co.uk\/dist\/index.php\/2025\/03\/02\/assumenda-eos-iure-et\/"},"modified":"2025-07-14T08:56:41","modified_gmt":"2025-07-14T08:56:41","slug":"platform-approach-vs-point-solutions","status":"publish","type":"post","link":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/","title":{"rendered":"Cybersecurity Strategy: Platform Approach vs. Point Solutions"},"content":{"rendered":"\n<section class=\"container insight-container\">\n    <div class=\"row\">\n        <div class=\"col\">\n            <div class=\"insight-content__text-block\">\n                <p class=\"p-intro\">The Evolving Landscape of Cybersecurity Defence.<\/p>\n<p>Organisations today face an unprecedented challenge in cybersecurity. As digital threats evolve in sophistication and scale, security teams must continuously adapt their defensive strategies to protect critical assets and data. This adaptation has created a fundamental strategic question: is it better to deploy multiple specialised point solutions or adopt an integrated platform approach?<\/p>\n<div class=\"et_pb_row et_pb_row_0\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><em>By Aaron Tunnicliff, Head of Engineering, Ideal<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"banner-image\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"position-relative\">\n                    <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/03\/Cybersecurity-Strategy-02.jpg\" alt=\"Banner Image\" class=\"img-fluid w-100\">\n                                            <span class=\"banner-image__info col-6\">Caption here if needed<\/span>\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"container insight-container\">\n    <div class=\"row\">\n        <div class=\"col\">\n            <div class=\"insight-content__text-block\">\n                <h2><strong>The Point Solution Dilemma<\/strong><\/h2>\n<p>Many organisations have historically built their security infrastructure through incremental adoption of specialised tools, each addressing specific security challenges. According to a recent Gartner survey of 162 large enterprises, organisations use an average of 45 cybersecurity tools. *<\/p>\n<p>Supporters of the \u2018best-of-breed\u2019 viewpoint site the following reasons:<\/p>\n<ul>\n<li><strong>Specialised Capabilities<\/strong>: Point solutions can provide superior performance in their specific domains<\/li>\n<li><strong>Flexibility<\/strong>: Organisations can select the exact tools that match their unique security requirements<\/li>\n<li><strong>Innovation Adoption<\/strong>: Teams can quickly implement cutting-edge solutions as they emerge<\/li>\n<\/ul>\n<p>However, this approach has created significant challenges for security teams:<\/p>\n<h3>Integration Complexity<\/h3>\n<p>Tools with different interfaces, protocols, and requirements create integration nightmares, causing substantial time and resource strain on IT teams. These disconnected systems can result in security gaps between tools that attackers can exploit.<\/p>\n<h3>Data Overload<\/h3>\n<p>Multiple security tools generate overwhelming volumes of alerts and data, much of it disconnected. Security teams struggle to correlate information across platforms, potentially missing critical security incidents while drowning in noise.<\/p>\n<h3>Budget Inefficiency<\/h3>\n<p>Investing in numerous specialised tools often results in organisations overspending on multiple cybersecurity licenses, often with overlapping capabilities, that provide diminishing returns or become redundant as organisational needs evolve.<\/p>\n<h3>Skills Fragmentation<\/h3>\n<p>Each point solution requires specialised knowledge to deploy and maintain effectively, spreading technical expertise thin and creating potential security blind spots when key personnel are unavailable or leave the organisation.<\/p>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"banner-image banner-image--s4\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"position-relative\">\n                    <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/04\/Cybersecurity-Strategy-01.jpg\" alt=\"Banner Image\" class=\"img-fluid w-100\">\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"container insight-container\">\n    <div class=\"row\">\n        <div class=\"col\">\n            <div class=\"insight-content__text-block\">\n                <h2><strong>The Platform Approach Alternative<\/strong><\/h2>\n<p>The single-vendor \u2013 a.k.a. \u2018platform\u2019 \u2013 approach to cybersecurity, introduced by vendors in the late 2010s, continues to gain momentum. It\u2019s prominently featured in Gartner\u2019s \u201cTop Cybersecurity Trends for 2025\u201d as Trend 4: Cybersecurity Technology Optimisation.<\/p>\n<p>For CISOs and CTOs focused on operational efficiency, cost control, and effective incident management, a platform approach offers compelling advantages:<\/p>\n<h3>Reduced Complexity<\/h3>\n<p>A unified platform consolidates multiple security functions into a single \u2018pane of glass\u2019 and management framework. This simplification reduces the risk of human error and provides a clearer operational picture for security teams.<\/p>\n<h3>Seamless Integration<\/h3>\n<p>Purpose-built platforms offer natively integrated components designed to work together. This designed-in integration enables automation of repetitive tasks and provides comprehensive visibility across the entire infrastructure, enhancing the effectiveness of security measures.<\/p>\n<h3>Unified Response Capabilities<\/h3>\n<p>With a platform approach, organisations can implement consistent security policies and rapidly respond to emerging threats across their entire digital estate. Threat intelligence flows seamlessly between components, enabling faster detection and response.<\/p>\n<h3>Advanced Analytics Through Centralisation<\/h3>\n<p>By centralising security data collection and analysis, platforms can more effectively leverage AI and machine learning to detect anomalies, predict threats, and automate responses \u2013 capabilities that are difficult to implement across multiple disconnected point solutions.<\/p>\n<h3>Long-Term Cost Efficiency<\/h3>\n<p>While point solutions might appear cost-effective initially, their cumulative expenses often escalate due to licensing fees, maintenance requirements, operational overhead and specialised training needs. A unified platform can significantly reduce long-term costs by streamlining operations and consolidating tool management.<\/p>\n<p>Furthermore, with the right vendor, platform solutions are not an all-or-nothing proposition. They are an \u00e0 la carte offering where allowing organisations to pick and choose the components required for their specific circumstances by activating only the licensing elements they require.<\/p>\n<h2><strong>Finding Your Optimal Security Strategy<\/strong><\/h2>\n<p>The decision between a platform approach and point solutions isn\u2019t binary. Many organisations benefit from a hybrid strategy that leverages the strengths of both approaches based on specific security domains and organisational requirements.<\/p>\n<p>Key considerations for your strategy include:<\/p>\n<ul>\n<li>Assessing your current security architecture and identifying integration pain points<\/li>\n<li>Evaluating the operational burden of managing multiple tools versus potential capability trade-offs<\/li>\n<li>Understanding your organisation\u2019s threat profile and specific security requirements<\/li>\n<li>Considering your security team\u2019s size, expertise, and operational capacity<\/li>\n<\/ul>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"container insight-container\">\n    <div class=\"row\">\n        <div class=\"col\">\n            <div class=\"insight-content__text-block\">\n                <div class=\"et_pb_module et_pb_cta_0 et_pb_promo et_pb_text_align_center et_pb_bg_layout_dark\">\n<div class=\"et_pb_button_wrapper\"><\/div>\n<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_3 et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><em>*&nbsp;<\/em><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-03-gartner-identifiesthe-top-cybersecurity-trends-for-2025#:~:text=According%20to%20a%20Gartner%20survey,efficient%20and%20effective%20security%20programs.\" data-mce-href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-03-gartner-identifiesthe-top-cybersecurity-trends-for-2025#:~:text=According%20to%20a%20Gartner%20survey,efficient%20and%20effective%20security%20programs.\"><em>Gartner, \u201cTop Cybersecurity Trends for 2025,\u201d March 2025<\/em><\/a><em>. According to a Gartner survey of 162 large enterprises, security teams deploy an average of 45 cybersecurity tools, contributing to inefficiencies that can be addressed through platform consolidation and optimisation.<\/em><\/p>\n<\/div>\n<\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organisations today face an unprecedented challenge in cybersecurity. As digital threats evolve in sophistication and scale, security teams must continuously adapt their defensive strategies to protect critical assets and data.<\/p>\n","protected":false},"author":5,"featured_media":955,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[26],"tags":[],"class_list":["post-71","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.5 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Strategy: Platform Approach vs. Point Solutions - Ideal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Strategy: Platform Approach vs. Point Solutions\" \/>\n<meta property=\"og:description\" content=\"Organisations today face an unprecedented challenge in cybersecurity. As digital threats evolve in sophistication and scale, security teams must continuously adapt their defensive strategies to protect critical assets and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Ideal\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-14T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T08:56:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/03\/Cybersecurity-Strategy-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2075\" \/>\n\t<meta property=\"og:image:height\" content=\"826\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ant Bullock\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ant Bullock\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/\"},\"author\":{\"name\":\"Ant Bullock\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#\\\/schema\\\/person\\\/7e3d69c4d07d8cbcc231ed76db349c6b\"},\"headline\":\"Cybersecurity Strategy: Platform Approach vs. Point Solutions\",\"datePublished\":\"2025-04-14T00:00:00+00:00\",\"dateModified\":\"2025-07-14T08:56:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/\"},\"wordCount\":7,\"image\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Cybersecurity-Strategy-02.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/\",\"name\":\"Cybersecurity Strategy: Platform Approach vs. Point Solutions - Ideal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Cybersecurity-Strategy-02.jpg\",\"datePublished\":\"2025-04-14T00:00:00+00:00\",\"dateModified\":\"2025-07-14T08:56:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#\\\/schema\\\/person\\\/7e3d69c4d07d8cbcc231ed76db349c6b\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Cybersecurity-Strategy-02.jpg\",\"contentUrl\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Cybersecurity-Strategy-02.jpg\",\"width\":2075,\"height\":826},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/platform-approach-vs-point-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Strategy: Platform Approach vs. Point Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#website\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/\",\"name\":\"Ideal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#\\\/schema\\\/person\\\/7e3d69c4d07d8cbcc231ed76db349c6b\",\"name\":\"Ant Bullock\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/litespeed\\\/avatar\\\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/litespeed\\\/avatar\\\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534\",\"contentUrl\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/litespeed\\\/avatar\\\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534\",\"caption\":\"Ant Bullock\"},\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/author\\\/ant\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Strategy: Platform Approach vs. Point Solutions - Ideal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Strategy: Platform Approach vs. Point Solutions","og_description":"Organisations today face an unprecedented challenge in cybersecurity. As digital threats evolve in sophistication and scale, security teams must continuously adapt their defensive strategies to protect critical assets and data.","og_url":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/","og_site_name":"Ideal","article_published_time":"2025-04-14T00:00:00+00:00","article_modified_time":"2025-07-14T08:56:41+00:00","og_image":[{"width":2075,"height":826,"url":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/03\/Cybersecurity-Strategy-02.jpg","type":"image\/jpeg"}],"author":"Ant Bullock","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ant Bullock"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/#article","isPartOf":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/"},"author":{"name":"Ant Bullock","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#\/schema\/person\/7e3d69c4d07d8cbcc231ed76db349c6b"},"headline":"Cybersecurity Strategy: Platform Approach vs. Point Solutions","datePublished":"2025-04-14T00:00:00+00:00","dateModified":"2025-07-14T08:56:41+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/"},"wordCount":7,"image":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/03\/Cybersecurity-Strategy-02.jpg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/","url":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/","name":"Cybersecurity Strategy: Platform Approach vs. Point Solutions - Ideal","isPartOf":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/#primaryimage"},"image":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/03\/Cybersecurity-Strategy-02.jpg","datePublished":"2025-04-14T00:00:00+00:00","dateModified":"2025-07-14T08:56:41+00:00","author":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#\/schema\/person\/7e3d69c4d07d8cbcc231ed76db349c6b"},"breadcrumb":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/#primaryimage","url":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/03\/Cybersecurity-Strategy-02.jpg","contentUrl":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/03\/Cybersecurity-Strategy-02.jpg","width":2075,"height":826},{"@type":"BreadcrumbList","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/platform-approach-vs-point-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.mintcreative.com\/ideal-test\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Strategy: Platform Approach vs. Point Solutions"}]},{"@type":"WebSite","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#website","url":"https:\/\/staging.mintcreative.com\/ideal-test\/","name":"Ideal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.mintcreative.com\/ideal-test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#\/schema\/person\/7e3d69c4d07d8cbcc231ed76db349c6b","name":"Ant Bullock","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/litespeed\/avatar\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534","url":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/litespeed\/avatar\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534","contentUrl":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/litespeed\/avatar\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534","caption":"Ant Bullock"},"url":"https:\/\/staging.mintcreative.com\/ideal-test\/author\/ant\/"}]}},"_links":{"self":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/posts\/71","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":2,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/posts\/71\/revisions"}],"predecessor-version":[{"id":959,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/posts\/71\/revisions\/959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/media\/955"}],"wp:attachment":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/media?parent=71"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/categories?post=71"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/tags?post=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}