{"id":53309,"date":"2024-05-06T15:24:53","date_gmt":"2024-05-06T13:24:53","guid":{"rendered":"https:\/\/www.telelogos.com\/?p=53309"},"modified":"2024-05-06T15:24:54","modified_gmt":"2024-05-06T13:24:54","slug":"mdm-geofencing-to-maximize-your-device-security","status":"publish","type":"post","link":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/","title":{"rendered":"MDM: Geofencing to Maximize Your Device Security"},"content":{"rendered":"<div id=\"pl-53309\"  class=\"panel-layout\" ><div id=\"pg-53309-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-53309-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-53309-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img decoding=\"async\" class=\"alignnone size-full wp-image-53065\" src=\"https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/t-and-l-photography-application-delivery-man-in-truck-boxes-unfocused-c-jpg.jpg\" alt=\"\" width=\"1448\" height=\"412\" srcset=\"https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/t-and-l-photography-application-delivery-man-in-truck-boxes-unfocused-c-jpg.jpg 1448w, https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/t-and-l-photography-application-delivery-man-in-truck-boxes-unfocused-c-jpg-300x85.jpg 300w, https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/t-and-l-photography-application-delivery-man-in-truck-boxes-unfocused-c-jpg-1024x291.jpg 1024w, https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/t-and-l-photography-application-delivery-man-in-truck-boxes-unfocused-c-jpg-195x55.jpg 195w\" sizes=\"(max-width: 1448px) 100vw, 1448px\" \/><\/p>\n<p>Geofencing is one of the key features of\u00a0<a href=\"https:\/\/www.telelogos.com\/en\/solutions\/clyd-mobile-device-management\/\">Mobile Device Management (MDM) solutions<\/a>. It's a tool that ensures <strong>data and device security easily<\/strong>, often used in transportation, logistics, industry, and retail sectors. By combining geographical location technology with mobile device management, geofencing allows companies to better control their fleets of devices.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>What is Geofencing in MDM Solutions?<\/h2>\n<p>Geofencing, also known as geofencing, is a technique that uses GPS, Wi-Fi signals, or cellular networks to create <strong>virtual boundaries<\/strong> around predefined geographical areas. MDM solutions integrate this technology to define perimeters around corporate sites, warehouses, delivery locations, stores, etc. <strong>Automated actions can be triggered<\/strong> once a mobile device equipped with the MDM solution enters or exits these defined zones.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>How Does Geofencing Work in an MDM Solution?<\/h2>\n<p>&nbsp;<\/p>\n<p>With an\u00a0<a href=\"https:\/\/www.telelogos.com\/en\/solutions\/clyd-mobile-device-management\/\">MDM solution\u2014such as Clyd<\/a>\u00a0- that includes a geofencing feature, it's easy to define one or multiple geographical zones by <strong>drawing a circle <\/strong>on a map. You can then visualize the geographic position of your devices and <strong>choose automatic actions<\/strong> to take when these devices exit the defined zones. Several possible actions upon exiting the zone include:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><img decoding=\"async\" class=\" wp-image-53059 alignright\" src=\"https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/Geofencing-MDM.png\" alt=\"Interface du menu geofencing d'un solution MDM\" width=\"618\" height=\"336\" srcset=\"https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/Geofencing-MDM.png 605w, https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/Geofencing-MDM-300x163.png 300w, https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/04\/Geofencing-MDM-195x106.png 195w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/>Ensuring the security of your application <strong>data by cleaning,<\/strong> deactivating, or even uninstalling them automatically when the concerned device is identified outside its authorized zone.<\/li>\n<li><strong>Locking the phone<\/strong> with a unique code without which the device cannot be used. You can retrieve this code at any time from the device profile in the Clyd mobile device management solution.<\/li>\n<li><strong>Resetting the phone<\/strong> clears all stored data on the device and restores it to factory settings.<\/li>\n<li>In general, <strong>executing any type of system command<\/strong> on the device is possible.<\/li>\n<li>Additionally, you can choose to be notified by email and Clyd notification.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>What are the Benefits of Geofencing?<\/h2>\n<ul>\n<li><strong>Overall Cost Reduction: <\/strong>By monitoring mobile device movements and alerting in case of unauthorized zone exits, companies can prevent material losses, potential thefts, or accidental damages. This can be particularly beneficial for organizations with valuable mobile assets, such as ruggedized warehouse terminals for the logistics or transportation sectors or sales or information devices (for retail, tourism, or the public sector).<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Data Security: <\/strong>Geofencing allows for automated actions when a device exits the predefined zone. Thus, it's possible to delete data or simply block the device in case of zone exit. This is an essential issue in sectors where data privacy is a priority and an increasingly current concern for all organizations in an environment of increased cyber threats. Finally, such a solution can adapt to policies in force depending on the location: defining specific security policies according to location, country, or type of point of sale.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Operation Optimization: <\/strong>Geofencing allows for better management of the number of mobile devices. For example, actions or alerts can be defined as soon as a device exits a zone. This allows for more precise tracking of the geographical distribution of hardware resources and for quick response to the specific needs of each location or project.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Regulatory Compliance: <\/strong>For regulated industries such as healthcare or finance, geofencing can help companies comply with regulatory requirements by configuring each terminal differently according to its destination zone and applying strict privacy policies.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Real-Time Tracking: <\/strong>Geofencing via MDM relies on devices' geolocation and allows for real-time fleet tracking. This is particularly useful for companies operating in dynamic environments such as logistics or transportation. Managers can monitor device movements and react instantly to unexpected situations.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Conclusion<\/h2>\n<p>Geofencing in MDM solutions offers numerous advantages to organizations, <strong>regardless of industry<\/strong>. By combining geographical location technology with mobile device management, companies can improve operational efficiency, strengthen security, and reduce costs. Adopting geofencing in MDM solutions has become imperative for many organizations in an ever-evolving business environment.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-53309-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-53309-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-53309-1-0-0\" class=\"widget_text so-panel widget widget_custom_html panel-first-child panel-last-child\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"so-iframe-wrapper <?php if (!wp_is_mobile()) { echo 'no-padding'; } ?>\">\n<iframe src=\"https:\/\/business.telelogos.com\/form-actu-en\">height=\"825px\" width=\"1200px\"style=\"border:0px #ffffff none;\" <\/iframe>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Geofencing is one of the key features of\u00a0Mobile Device Management (MDM) solutions. It&#8217;s a tool that ensures data and device security easily, often used in transportation, logistics, industry, and [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":53310,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[469,301],"tags":[],"class_list":["post-53309","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-device-management-en","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MDM: Geofencing to Maximize Your Device Security<\/title>\n<meta name=\"description\" content=\"Geofencing utilizes the GPS signals of devices to create virtual boundaries around defined geographical areas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arthur Letheule\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/\"},\"author\":{\"name\":\"Arthur Letheule\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#\\\/schema\\\/person\\\/02df920e9edd32afbfbb4914e78196cf\"},\"headline\":\"MDM: Geofencing to Maximize Your Device Security\",\"datePublished\":\"2024-05-06T13:24:53+00:00\",\"dateModified\":\"2024-05-06T13:24:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/\"},\"wordCount\":646,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.telelogos.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Article-FLEX-1-mdm-securite-3.png\",\"articleSection\":[\"Device Management\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/\",\"url\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/\",\"name\":\"MDM: Geofencing to Maximize Your Device Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.telelogos.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Article-FLEX-1-mdm-securite-3.png\",\"datePublished\":\"2024-05-06T13:24:53+00:00\",\"dateModified\":\"2024-05-06T13:24:54+00:00\",\"description\":\"Geofencing utilizes the GPS signals of devices to create virtual boundaries around defined geographical areas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.telelogos.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Article-FLEX-1-mdm-securite-3.png\",\"contentUrl\":\"https:\\\/\\\/www.telelogos.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Article-FLEX-1-mdm-securite-3.png\",\"width\":1199,\"height\":699,\"caption\":\"MDM: Geofencing to Maximize Your Device Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/news\\\/mdm-geofencing-to-maximize-your-device-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MDM: Geofencing to Maximize Your Device Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/\",\"name\":\"Telelogos\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#organization\",\"name\":\"Telelogos\",\"url\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.telelogos.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Logo-Telelogos-e1664355618654.png\",\"contentUrl\":\"https:\\\/\\\/www.telelogos.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Logo-Telelogos-e1664355618654.png\",\"width\":100,\"height\":35,\"caption\":\"Telelogos\"},\"image\":{\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/telelogos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.telelogos.com\\\/en\\\/#\\\/schema\\\/person\\\/02df920e9edd32afbfbb4914e78196cf\",\"name\":\"Arthur Letheule\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b849c66d4f2469f37f99c8d97beafd73856397490b651bcccdc9504c92f9317b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b849c66d4f2469f37f99c8d97beafd73856397490b651bcccdc9504c92f9317b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b849c66d4f2469f37f99c8d97beafd73856397490b651bcccdc9504c92f9317b?s=96&d=mm&r=g\",\"caption\":\"Arthur Letheule\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MDM: Geofencing to Maximize Your Device Security","description":"Geofencing utilizes the GPS signals of devices to create virtual boundaries around defined geographical areas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/","twitter_misc":{"Written by":"Arthur Letheule","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/#article","isPartOf":{"@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/"},"author":{"name":"Arthur Letheule","@id":"https:\/\/www.telelogos.com\/en\/#\/schema\/person\/02df920e9edd32afbfbb4914e78196cf"},"headline":"MDM: Geofencing to Maximize Your Device Security","datePublished":"2024-05-06T13:24:53+00:00","dateModified":"2024-05-06T13:24:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/"},"wordCount":646,"commentCount":0,"publisher":{"@id":"https:\/\/www.telelogos.com\/en\/#organization"},"image":{"@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/05\/Article-FLEX-1-mdm-securite-3.png","articleSection":["Device Management","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/","url":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/","name":"MDM: Geofencing to Maximize Your Device Security","isPartOf":{"@id":"https:\/\/www.telelogos.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/#primaryimage"},"image":{"@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/05\/Article-FLEX-1-mdm-securite-3.png","datePublished":"2024-05-06T13:24:53+00:00","dateModified":"2024-05-06T13:24:54+00:00","description":"Geofencing utilizes the GPS signals of devices to create virtual boundaries around defined geographical areas.","breadcrumb":{"@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/#primaryimage","url":"https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/05\/Article-FLEX-1-mdm-securite-3.png","contentUrl":"https:\/\/www.telelogos.com\/wp-content\/uploads\/2024\/05\/Article-FLEX-1-mdm-securite-3.png","width":1199,"height":699,"caption":"MDM: Geofencing to Maximize Your Device Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.telelogos.com\/en\/news\/mdm-geofencing-to-maximize-your-device-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.telelogos.com\/en\/"},{"@type":"ListItem","position":2,"name":"MDM: Geofencing to Maximize Your Device Security"}]},{"@type":"WebSite","@id":"https:\/\/www.telelogos.com\/en\/#website","url":"https:\/\/www.telelogos.com\/en\/","name":"Telelogos","description":"","publisher":{"@id":"https:\/\/www.telelogos.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.telelogos.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.telelogos.com\/en\/#organization","name":"Telelogos","url":"https:\/\/www.telelogos.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.telelogos.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.telelogos.com\/wp-content\/uploads\/2022\/07\/Logo-Telelogos-e1664355618654.png","contentUrl":"https:\/\/www.telelogos.com\/wp-content\/uploads\/2022\/07\/Logo-Telelogos-e1664355618654.png","width":100,"height":35,"caption":"Telelogos"},"image":{"@id":"https:\/\/www.telelogos.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/telelogos"]},{"@type":"Person","@id":"https:\/\/www.telelogos.com\/en\/#\/schema\/person\/02df920e9edd32afbfbb4914e78196cf","name":"Arthur Letheule","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b849c66d4f2469f37f99c8d97beafd73856397490b651bcccdc9504c92f9317b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b849c66d4f2469f37f99c8d97beafd73856397490b651bcccdc9504c92f9317b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b849c66d4f2469f37f99c8d97beafd73856397490b651bcccdc9504c92f9317b?s=96&d=mm&r=g","caption":"Arthur Letheule"}}]}},"_links":{"self":[{"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/posts\/53309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/comments?post=53309"}],"version-history":[{"count":3,"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/posts\/53309\/revisions"}],"predecessor-version":[{"id":53315,"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/posts\/53309\/revisions\/53315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/media\/53310"}],"wp:attachment":[{"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/media?parent=53309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/categories?post=53309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.telelogos.com\/en\/wp-json\/wp\/v2\/tags?post=53309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}