{"version":"1.0","provider_name":"irgNET","provider_url":"https:\/\/irg-net.com","author_name":"H. Cemre G\u00fcnay","author_url":"https:\/\/irg-net.com\/index.php\/author\/t3n9r1\/","title":"Crown Jewel Analysis in VMware Aria Operations... - irgNET","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"biOhYjMp30\"><a href=\"https:\/\/irg-net.com\/index.php\/crown-jewel-analysis-in-vmware-aria-operations\/\">Crown Jewel Analysis in VMware Aria Operations&#8230;<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/irg-net.com\/index.php\/crown-jewel-analysis-in-vmware-aria-operations\/embed\/#?secret=biOhYjMp30\" width=\"600\" height=\"338\" title=\"&#8220;Crown Jewel Analysis in VMware Aria Operations&#8230;&#8221; &#8212; irgNET\" data-secret=\"biOhYjMp30\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/irg-net.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Crown Jewel Analysis in VMware Aria Operations for Networks Crown Jewel Analysis in VMware Aria Operations&#8230; Crown Jewels are the most critical assets in your data center. Crown Jewel Analysis in VMware Aria Operations for Networks will provide insights into the reachability of these crucial objects in a security event. It will showcase the number [&hellip;]","thumbnail_url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/305ac555-c2d8-4724-b52d-90c68af7919c\/?size=Box320"}