{"id":13801,"date":"2021-10-26T07:57:48","date_gmt":"2021-10-26T12:57:48","guid":{"rendered":"https:\/\/sterling.com\/?p=13801"},"modified":"2021-10-26T07:57:48","modified_gmt":"2021-10-26T12:57:48","slug":"top-ten-reasons-to-choose-dell-emc-powerprotect-cyber-recovery","status":"publish","type":"post","link":"https:\/\/sterling.com\/stargazer\/?p=13801","title":{"rendered":"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery"},"content":{"rendered":"<p><strong><em>Cyberattacks endanger data-driven businesses<\/em><\/strong><strong><em> \u2013 and today all businesses are data driven<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li style=\"padding-bottom: 16px;\"><strong>Dedicated hardened digital vault with physical and operational air gap<br \/>\n<\/strong>Dell EMC PowerProtect Cyber Recovery has a secure digital vault that is physically and logically isolated from the product and backup network with an operational air gap. Critical data is protected within the vault in an immutable format with retention periods locked. This gives you the best possible chance for recovery if your primary backups have been compromised or your DR location has been breached or infected. As an additional safeguard, an automated operational air gap provides network isolation and eliminates management interfaces that could be compromised.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong>Protects against insider attacks by requiring multiple separate logins to access the vault<br \/>\n<\/strong>PowerProtect Cyber Recovery offers multiple layers of protection to provide resilience against cyberattacks \u2014 even from an insider threat. It moves critical data away from the attack surface, physically isolating it within a protected part of the data center and requires separate security credentials and multi-factor authentication for access.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong>Data written to the vault is immutable and unchangeable<br \/>\n<\/strong>PowerProtect Cyber Recovery automates the synchronization of data between production systems and the vault, creating immutable copies with locked retention policies. If a cyberattack occurs, you can quickly identify a clean copy of data, recover your critical systems, and get your business back up and running.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong>Malware may enter the vault but does <em>not <\/em>have the ability to execute or infect data outside of the vault<br \/>\n<\/strong>PowerProtect Cyber Recovery solution protects the most critical data in a vault environment. The vault is ideally physically isolated \u2014 a locked cage or room \u2014 and is always logically isolated via an operational air gap. The vault components are never accessible from production, and access to the vault target \u2014 when the air gap is unlocked \u2014 is extremely limited preventing instances for malware to enter.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong><em>First<\/em><\/strong><strong> to integrate full content indexing, intelligent analytics, machine learning, and forensic tools<br \/>\n<\/strong>PowerProtect Cyber Recovery is the first solution to fully integrate CyberSense, which adds an intelligent layer of protection to help find data corruption when an attack penetrates the data center. This innovative approach provides full content indexing and uses machine learning (ML) to analyze and identify over 100 content-based statistics and detect any suspicious activity or signs of corruption due to malware or ransomware.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong>\u00a0<\/strong><strong>Quickly identify and restore last-known good file or data set for rapid recovery<\/strong> PowerProtect Cyber Recovery\u2019s machine-learning identifies and allows you to recover known good data and resume normal business operations with confidence. CyberSense finds corruption with up to 99.5% confidence, helping you identify threats and diagnose attack vectors while protecting your business-critical content \u2014 all within the security of the vault.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong>Full recovery workflow automation to quickly resume business operations<br \/>\n<\/strong>PowerProtect Cyber Recovery provides automated restore-and-recovery procedures to bring business-critical systems back online quickly and with confidence. As part of PowerProtect Data Manager, and for customers running Dell EMC NetWorker, Cyber Recovery enables automated recovery from the vault. Dell EMC and its ecosystem partners provide a comprehensive methodology for protecting data, as well as perform damage assessments and forensics to either recover your systems or remediate and remove the offending malware.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong><em>First<\/em><\/strong><strong> technology-solution provider to join the Sheltered Harbor Alliance Partner Program<br \/>\n<\/strong>The Sheltered Harbor standard incorporates a set of cyber-resilience and data-protection best practices and safeguards for protecting U.S financial data and the financial industry. Sheltered Harbor enhances U.S. financial stability and institutions\u2019 cyber resilience by isolating critical customer-account records and other data, immutably, within a digital vault. If an institution\u2019s primary or backup systems are compromised by cyberattack or other event, rapid recovery of critical data is enabled, facilitating the continuity of critical banking services.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong><em>First<\/em><\/strong><strong> technology-solution provider developing a Sheltered Harbor Turn-key Data Vaulting Solution<br \/>\n<\/strong>PowerProtect Cyber Recovery for Sheltered Harbor is the first on-premises turn-key, data-vaulting solution designed to meet all technical product requirements for participants implementing the Sheltered Harbor standard. Nightly backups of critical data in the Sheltered Harbor standard format are created by the participating institution or service provider. The data vault is encrypted, unchangeable and isolated from the institution\u2019s infrastructure, including backup, disaster recovery and other data protection systems. An isolated, secure environment disconnected from corporate networks restricts users other than those with proper clearance. Automated data copy and air-gap management assure preservation of data integrity, security, and confidentiality. If a Sheltered Harbor Resilience Plan is activated, the participating institution can quickly recover data from the vault to enable the fastest restoration and resumption of banking operations.<\/li>\n<li style=\"padding-bottom: 16px;\"><strong>Single source for solution design, implementation, and support for Cyber Recovery, Cybersense, and Sheltered Harbor Solution<br \/>\n<\/strong>Dell EMC PowerProtect Cyber Recovery for Sheltered Harbor is being developed to provide participating institutions with a fast, cost-effective and efficient alternative to each institution building a one-off proprietary vault in order to maintain compliance with the Sheltered Harbor Specification. Banks, credit unions, and brokerage firms choosing to implement the Sheltered Harbor standard will soon be able to turn to Dell Technologies for a fully supported turn-key solution. With the added benefit of leveraging a mature vault-based technology, Sheltered Harbor participants choosing PowerProtect Cyber Recovery for Sheltered Harbor can confidently meet their immediate deployment needs, as well as establish a foothold for their future data-vaulting requirements. The participating institution has a path to survival, and public confidence in the U.S. financial system is maintained.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong><br \/>\nInterested in learning more about Dell Technologies PowerProtect Cyber Recovery? <a href=\"mailto:connect@sterling.com?subject=Dell PowerProtect Cyber Recovery\">Connect with a Sterling expert! <\/a><\/strong><\/p>\n<p>Or watch the Sterling demo <a href=\"https:\/\/sterling.com\/stargazer\/performance\/demos\/dell-technologies-powerprotect-cyber-recovery-preview\/\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h5><a href=\"https:\/\/www.delltechnologies.com\/en-us\/data-protection\/cyber-recovery-solution.htm\"><span style=\"color: #999999;\">Source<\/span><\/a><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks endanger data-driven businesses \u2013 and today all businesses are data driven &nbsp; Dedicated hardened digital vault with physical and operational air gap Dell EMC PowerProtect Cyber Recovery has a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13802,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,15,16,17],"tags":[58,59,60,61],"class_list":["post-13801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cloud","category-data-center","category-managed-services","category-security","tag-cyber-recovery","tag-dell","tag-dell-technologies","tag-powerprotect"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery - Sterling<\/title>\n<meta name=\"description\" content=\"Cyberattacks endanger data-driven businesses \u2013 and today all businesses are data driven\u00a0Dedicated hardened digital vault with physical and operational air gap Dell EMC PowerProtect Cyber Recovery has a secure digital vault that is physically and logically isolated from the product and backup network with an operational air gap. Critical data is protected within the vault in an immutable format with retention periods locked. This gives you the best possible chance for recovery if your primary backups have been compromised or your DR location has been breached or infected. As an additional safeguard, an automated operational air gap provides network isolation and eliminates management interfaces that could be compromised.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery - Sterling\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks endanger data-driven businesses \u2013 and today all businesses are data driven\u00a0Dedicated hardened digital vault with physical and operational air gap Dell EMC PowerProtect Cyber Recovery has a secure digital vault that is physically and logically isolated from the product and backup network with an operational air gap. Critical data is protected within the vault in an immutable format with retention periods locked. This gives you the best possible chance for recovery if your primary backups have been compromised or your DR location has been breached or infected. As an additional safeguard, an automated operational air gap provides network isolation and eliminates management interfaces that could be compromised.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sterling.com\/stargazer\/?p=13801\" \/>\n<meta property=\"og:site_name\" content=\"Sterling\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/SterlingComp\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-26T12:57:48+00:00\" \/>\n<meta name=\"author\" content=\"Sterling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:site\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sterling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801\"},\"author\":{\"name\":\"Sterling\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\"},\"headline\":\"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery\",\"datePublished\":\"2021-10-26T12:57:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801\"},\"wordCount\":927,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"cyber recovery\",\"dell\",\"Dell Technologies\",\"PowerProtect\"],\"articleSection\":[\"Blog\",\"Cloud\",\"Data Center\",\"Managed Services\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801\",\"name\":\"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery - Sterling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2021-10-26T12:57:48+00:00\",\"description\":\"Cyberattacks endanger data-driven businesses \u2013 and today all businesses are data driven\u00a0Dedicated hardened digital vault with physical and operational air gap Dell EMC PowerProtect Cyber Recovery has a secure digital vault that is physically and logically isolated from the product and backup network with an operational air gap. Critical data is protected within the vault in an immutable format with retention periods locked. This gives you the best possible chance for recovery if your primary backups have been compromised or your DR location has been breached or infected. As an additional safeguard, an automated operational air gap provides network isolation and eliminates management interfaces that could be compromised.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13801#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"name\":\"Sterling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\",\"name\":\"Sterling\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"width\":399,\"height\":145,\"caption\":\"Sterling\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/facebook.com\\\/SterlingComp\\\/\",\"https:\\\/\\\/x.com\\\/sterlingcomp\",\"https:\\\/\\\/www.instagram.com\\\/sterlingcomputers\\\/\",\"http:\\\/\\\/youtube.com\\\/@sterlingcomp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sterling-computers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\",\"name\":\"Sterling\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"caption\":\"Sterling\"},\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery - Sterling","description":"Cyberattacks endanger data-driven businesses \u2013 and today all businesses are data driven\u00a0Dedicated hardened digital vault with physical and operational air gap Dell EMC PowerProtect Cyber Recovery has a secure digital vault that is physically and logically isolated from the product and backup network with an operational air gap. Critical data is protected within the vault in an immutable format with retention periods locked. This gives you the best possible chance for recovery if your primary backups have been compromised or your DR location has been breached or infected. As an additional safeguard, an automated operational air gap provides network isolation and eliminates management interfaces that could be compromised.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery - Sterling","og_description":"Cyberattacks endanger data-driven businesses \u2013 and today all businesses are data driven\u00a0Dedicated hardened digital vault with physical and operational air gap Dell EMC PowerProtect Cyber Recovery has a secure digital vault that is physically and logically isolated from the product and backup network with an operational air gap. Critical data is protected within the vault in an immutable format with retention periods locked. This gives you the best possible chance for recovery if your primary backups have been compromised or your DR location has been breached or infected. As an additional safeguard, an automated operational air gap provides network isolation and eliminates management interfaces that could be compromised.","og_url":"https:\/\/sterling.com\/stargazer\/?p=13801","og_site_name":"Sterling","article_publisher":"http:\/\/facebook.com\/SterlingComp\/","article_published_time":"2021-10-26T12:57:48+00:00","author":"Sterling","twitter_card":"summary_large_image","twitter_creator":"@sterlingcomp","twitter_site":"@sterlingcomp","twitter_misc":{"Written by":"Sterling","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sterling.com\/stargazer\/?p=13801#article","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13801"},"author":{"name":"Sterling","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d"},"headline":"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery","datePublished":"2021-10-26T12:57:48+00:00","mainEntityOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13801"},"wordCount":927,"commentCount":0,"publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13801#primaryimage"},"thumbnailUrl":"","keywords":["cyber recovery","dell","Dell Technologies","PowerProtect"],"articleSection":["Blog","Cloud","Data Center","Managed Services","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sterling.com\/stargazer\/?p=13801","url":"https:\/\/sterling.com\/stargazer\/?p=13801","name":"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery - Sterling","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13801#primaryimage"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13801#primaryimage"},"thumbnailUrl":"","datePublished":"2021-10-26T12:57:48+00:00","description":"Cyberattacks endanger data-driven businesses \u2013 and today all businesses are data driven\u00a0Dedicated hardened digital vault with physical and operational air gap Dell EMC PowerProtect Cyber Recovery has a secure digital vault that is physically and logically isolated from the product and backup network with an operational air gap. Critical data is protected within the vault in an immutable format with retention periods locked. This gives you the best possible chance for recovery if your primary backups have been compromised or your DR location has been breached or infected. As an additional safeguard, an automated operational air gap provides network isolation and eliminates management interfaces that could be compromised.","breadcrumb":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13801#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sterling.com\/stargazer\/?p=13801"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/?p=13801#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/sterling.com\/stargazer\/?p=13801#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sterling.com\/stargazer\/"},{"@type":"ListItem","position":2,"name":"Top Ten Reasons to Choose Dell EMC PowerProtect Cyber Recovery"}]},{"@type":"WebSite","@id":"https:\/\/sterling.com\/stargazer\/#website","url":"https:\/\/sterling.com\/stargazer\/","name":"Sterling","description":"","publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sterling.com\/stargazer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sterling.com\/stargazer\/#organization","name":"Sterling","url":"https:\/\/sterling.com\/stargazer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","width":399,"height":145,"caption":"Sterling"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/SterlingComp\/","https:\/\/x.com\/sterlingcomp","https:\/\/www.instagram.com\/sterlingcomputers\/","http:\/\/youtube.com\/@sterlingcomp","https:\/\/www.linkedin.com\/company\/sterling-computers"]},{"@type":"Person","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d","name":"Sterling","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","caption":"Sterling"},"url":"https:\/\/sterling.com\/stargazer\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/13801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13801"}],"version-history":[{"count":0,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/13801\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}