{"id":5711,"date":"2023-11-28T06:56:25","date_gmt":"2023-11-28T06:56:25","guid":{"rendered":"https:\/\/cobweb.com\/ae\/?p=5711"},"modified":"2023-12-11T07:28:22","modified_gmt":"2023-12-11T07:28:22","slug":"security-compliance-and-automation-with-tricent","status":"publish","type":"post","link":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/","title":{"rendered":"Learn about Security Compliance &amp; Automation with Tricent."},"content":{"rendered":"\n<div class=\"wp-block-cover has-white-color has-text-color has-small-font-size wp-duotone-000000-f4f4f4-1\" style=\"min-height:428px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-cobweb-teal-background-color has-background-dim-0 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1921\" height=\"561\" class=\"wp-block-cover__image-background wp-image-1664\" alt=\"\" src=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/2022\/07\/Teal-Lined-Circle-Background.png\" style=\"object-position:75% 45%\" data-object-fit=\"cover\" data-object-position=\"75% 45%\" srcset=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background.png 1921w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-300x88.png 300w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-1024x299.png 1024w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-768x224.png 768w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-1536x449.png 1536w\" sizes=\"auto, (max-width: 1921px) 100vw, 1921px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-columns has-white-color has-cobweb-dark-teal-background-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-color has-text-color is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h1 class=\"wp-block-heading has-text-align-center has-white-color has-text-color\" style=\"font-size:60px\"><strong>3 Major Trends Are Driving External Collaboration<\/strong><\/h1>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<section id='content-container-block_8f53b26ae60d2904eedd373fe1488b7f' class='content-container pt-none pb-none' style=\"background-color: #def3f5;\">\n\t\t<div class=\"full-width\">\n\t\n\t\t\t    \t\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/cobweb.com\/ae\/\">Home<\/a><\/span> \u00bb <span class=\"breadcrumb_last\" aria-current=\"page\">Learn about Security Compliance &amp; Automation with Tricent.<\/span><\/span><\/div><\/div>\n<\/div>\n\n\n\t\t\t\t<\/div>\n\n\t\t<\/div>\n<\/section>\n\n\n<section id='post-info-block_8ef241d4ebc330654e95348a6ba75ba8' class='post-info'>\n    <div class=\"grid-container\">\n    \t<div class=\"grid-x\">\n    \t\t<div class=\"small-12 medium-12 large-12 cell\">\n    \t\t\t<div class=\"post-info-container\">\n\t    \t\t\t\t    \t\t\t<div class=\"post-info-author\">\n\t    \t\t\t\t<p class=\"post-info-title\">Written By<\/p>\n\t    \t\t\t\t<p class=\"post-info-detail\">\n\t    \t\t\t\t\tAnne Aketch\t    \t\t\t\t\t\t    \t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/anne-aketch-9b340547\/\">\n\t    \t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"\/><\/svg>\n\t    \t\t\t\t\t\t<\/a>\n\t    \t\t\t\t\t\t    \t\t\t\t<\/p>\n\t    \t\t\t<\/div>\n\t    \t\t\t<div class=\"post-info-date\">\n\t    \t\t\t\t<p class=\"post-info-title\">Publish Date<\/p>\n\t    \t\t\t\t<p class=\"post-info-detail\">\n\t    \t\t\t\t\t28\/11\/2023\t    \t\t\t\t<\/p>\n\t    \t\t\t<\/div>\n\t    \t\t\t\t    \t\t\t\t<div class=\"post-info-category\">\n\t\t    \t\t\t\t<p class=\"post-info-title\">Categories<\/p>\n\t\t    \t\t\t\t<p class=\"post-info-categories\">\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t\t\t<span>Blogs<\/span>\t\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t\t\t<span>Hot Topic<\/span>\t\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t<\/p>\n\t\t    \t\t\t<\/div>\n\t    \t\t\t\t    \t\t<\/div>\n    \t\t<\/div>\n    \t<\/div>\n    <\/div>\n<\/section>\n\n\n\n\n<section id='content-container-block_746875e4039fe3838021c373b830f4ce' class='content-container pt-none pb-none' style=\"background-color: #ffffff;\">\n\t\t\n\t<div class=\"grid-container\">\n\t\t<div class=\"inner-content grid-x grid-margin-x\">\n\t\t\t<div class=\"large-8 large-offset-2 cell\">\n\t\t\t    \t\n\n<p><strong>Learn about Security Compliance &amp; Automation with Tricent<\/strong> <strong>and 5 Sharing Risks in its Wake!<\/strong><\/p>\n\n\n\n<p>Collaboration is key to business growth. It\u2019s a vital clog in today\u2019s remote and hybrid working world, aiding efficiency, and enhancing staff recruitment and retention. And research shows collaboration is here to stay. Here\u2019s why:<\/p>\n\n\n\n<p>Collaborative companies are 30% more innovative and 36% more productive. Most importantly, they perform five times better than those who don\u2019t collaborate.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>75% of employees value workplace collaboration.<\/li>\n\n\n\n<li>17% of employees who collaborate regularly have more job satisfaction and stay put.<\/li>\n\n\n\n<li>50% of employees working collaboratively are more effective compared to those working independently.<\/li>\n<\/ul>\n\n\n\n<p>There are three major trends now driving external collaboration:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud Adoption<\/strong><\/li>\n\n\n\n<li><strong>The Rise of the \u2018Sharing Generation\u2019<\/strong><\/li>\n\n\n\n<li><strong>Globalization &amp; Digitalization<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Yet the sharing, collaborative landscape is getting riskier, according to \u2018The State of Sharing 2023\u2019 report from Tricent, creators of THE file sharing governance solution. <\/p>\n\n\n\n<p>The report recognises the complexity of data governance. Although, it is essential and underlines how ungoverned file sharing presents serious business risks with sensitive data. This also includes business plans and medical records exposed to the wrong people.<\/p>\n\n\n\n<p>The findings show:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The average employee shares 2 files per day &#8211; that is over 500 a year!<\/li>\n\n\n\n<li>75% of shared files are given with editing permission<\/li>\n\n\n\n<li>52% of an organization\u2019s sensitive data is in SharePoint<\/li>\n\n\n\n<li>63% of IT respondents say employees have accidentally shared files with unauthorized people.<\/li>\n<\/ul>\n\n\n\n<p>File sharing is essential in today\u2019s collaborative economy and Tricent advocates that it should be done in a manner aligned to company policy. This policy is integral and must take into consideration 5 top risks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security vulnerabilities<\/strong><\/li>\n\n\n\n<li><strong>Data Leaks and Breaches<\/strong><\/li>\n\n\n\n<li><strong>Data loss and un-governance<\/strong><\/li>\n\n\n\n<li><strong>Employee data theft<\/strong><\/li>\n\n\n\n<li><strong>Privacy issues<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>The Safer With Tricent Way:<\/strong><\/p>\n\n\n\n<p>Tricent has now focussed its solution to deliver Security, Compliance &amp; Automation In Microsoft365.Microsoft&#8217;s robust security and Tricent&#8217;s secure solution complement your IT environment because of the dual secure layer that is provided. It complements Microsoft\u2019s robust security and collaboration features by delivering:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visibility of what is shared in OneDrive, Teams, &amp; SharePoint<\/li>\n\n\n\n<li>Automatic or bulk removal of external file access<\/li>\n\n\n\n<li>Insights on files shared with external domains<\/li>\n\n\n\n<li>Cleansing of orphaned teams, files and folders<\/li>\n\n\n\n<li>Great employee accountability and awareness<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Want to Know More:<\/strong><\/h5>\n\n\n\n<p>Just call our security experts and learn about Security Compliance &amp; Automation with Tricent. Because we want to help make your M365 collaborators safer than ever.<\/p>\n\n\n\n<p>Your Team, Extended.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>To reach out to us, email at: sales.uae@cobweb.com or call us on +971 4 455 3100.<\/p>\n\n\n\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n    \t<\/div>\n\t\t<\/div>\n<\/section>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":5721,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3,12],"tags":[66,65,64,63],"class_list":["post-5711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","category-hot-topic","tag-data-loss-governance","tag-data-security","tag-filesharing","tag-tricent","product_service-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Compliance &amp; Automation with Tricent<\/title>\n<meta name=\"description\" content=\"Tricent:The file sharing governance solution for optimum security on Data, Security Compliance &amp; Automation In Microsoft365\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Health Bridge by Tiger Technology\" \/>\n<meta property=\"og:description\" content=\"Tricent:The file sharing governance solution for optimum security on Data, Security Compliance &amp; Automation In Microsoft365\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/\" \/>\n<meta property=\"og:site_name\" content=\"Cobweb MENA\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-28T06:56:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-11T07:28:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Health Bridge by Tiger Technology\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Learn about Security Compliance &amp; Automation with Tricent.\",\"datePublished\":\"2023-11-28T06:56:25+00:00\",\"dateModified\":\"2023-12-11T07:28:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/\"},\"wordCount\":430,\"image\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png\",\"keywords\":[\"Data loss &amp; Governance\",\"Data security\",\"Filesharing\",\"Tricent\"],\"articleSection\":[\"Blogs\",\"Hot Topic\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/\",\"url\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/\",\"name\":\"Security Compliance & Automation with Tricent\",\"isPartOf\":{\"@id\":\"https:\/\/cobweb.com\/ae\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png\",\"datePublished\":\"2023-11-28T06:56:25+00:00\",\"dateModified\":\"2023-12-11T07:28:22+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"Tricent:The file sharing governance solution for optimum security on Data, Security Compliance & Automation In Microsoft365\",\"breadcrumb\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#primaryimage\",\"url\":\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png\",\"contentUrl\":\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png\",\"width\":350,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cobweb.com\/ae\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn about Security Compliance &amp; Automation with Tricent.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cobweb.com\/ae\/#website\",\"url\":\"https:\/\/cobweb.com\/ae\/\",\"name\":\"Cobweb MENA\",\"description\":\"Cobweb MENA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cobweb.com\/ae\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/cobweb.com\/ae\/content-hub\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Compliance & Automation with Tricent","description":"Tricent:The file sharing governance solution for optimum security on Data, Security Compliance & Automation In Microsoft365","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/","og_locale":"en_US","og_type":"article","og_title":"Health Bridge by Tiger Technology","og_description":"Tricent:The file sharing governance solution for optimum security on Data, Security Compliance & Automation In Microsoft365","og_url":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/","og_site_name":"Cobweb MENA","article_published_time":"2023-11-28T06:56:25+00:00","article_modified_time":"2023-12-11T07:28:22+00:00","og_image":[{"width":350,"height":300,"url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Health Bridge by Tiger Technology","twitter_image":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png","twitter_misc":{"Written by":"","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#article","isPartOf":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/"},"author":{"name":"","@id":""},"headline":"Learn about Security Compliance &amp; Automation with Tricent.","datePublished":"2023-11-28T06:56:25+00:00","dateModified":"2023-12-11T07:28:22+00:00","mainEntityOfPage":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/"},"wordCount":430,"image":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#primaryimage"},"thumbnailUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png","keywords":["Data loss &amp; Governance","Data security","Filesharing","Tricent"],"articleSection":["Blogs","Hot Topic"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/","url":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/","name":"Security Compliance & Automation with Tricent","isPartOf":{"@id":"https:\/\/cobweb.com\/ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#primaryimage"},"image":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#primaryimage"},"thumbnailUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png","datePublished":"2023-11-28T06:56:25+00:00","dateModified":"2023-12-11T07:28:22+00:00","author":{"@id":""},"description":"Tricent:The file sharing governance solution for optimum security on Data, Security Compliance & Automation In Microsoft365","breadcrumb":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#primaryimage","url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png","contentUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2023\/11\/Tricent-File-sharing.png","width":350,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/security-compliance-and-automation-with-tricent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cobweb.com\/ae\/"},{"@type":"ListItem","position":2,"name":"Learn about Security Compliance &amp; Automation with Tricent."}]},{"@type":"WebSite","@id":"https:\/\/cobweb.com\/ae\/#website","url":"https:\/\/cobweb.com\/ae\/","name":"Cobweb MENA","description":"Cobweb MENA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cobweb.com\/ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"","url":"https:\/\/cobweb.com\/ae\/content-hub\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/5711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/comments?post=5711"}],"version-history":[{"count":41,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/5711\/revisions"}],"predecessor-version":[{"id":5908,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/5711\/revisions\/5908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/media\/5721"}],"wp:attachment":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/media?parent=5711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/categories?post=5711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/tags?post=5711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}