{"id":5430,"date":"2025-01-28T10:00:00","date_gmt":"2025-01-28T10:00:00","guid":{"rendered":"https:\/\/www.easydcim.com\/blog\/?p=5430"},"modified":"2025-01-28T11:50:35","modified_gmt":"2025-01-28T11:50:35","slug":"easydcim-v1-15-0","status":"publish","type":"post","link":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0","title":{"rendered":"Security at the core of EasyDCIM v1.15.0"},"content":{"rendered":"<p style=\"text-align: justify;\">Security seems to be one of those buzzwords that\u2019s impossible to avoid these days. Scroll through LinkedIn, or browse an industry blog, and you\u2019ll find someone promoting the latest and greatest ways to secure your business. We can\u2019t speak for every flashy new tool on the market, but here\u2019s what we <em>can<\/em> promise: the tools we\u2019ve added to the new <strong style=\"color: #3a6651;\">EasyDCIM v1.15.0<\/strong> release weren\u2019t picked at random. They\u2019ve been carefully selected, meticulously tested, and built to deal with direct threats you face daily &#8211; not just to follow the latest trend.<\/p>\n<p style=\"text-align: left; font-size: 24px; padding-top: 40px;\"><strong style=\"color: #35975c;\">System Security: A clear view of your setup<\/strong><\/p>\n<p style=\"text-align: justify;\">For years, EasyDCIM has set the bar high with features like <strong>IP-based restrictions<\/strong> for backend and API access, as well as <strong>client area controls<\/strong> for when integrated with external billing systems such as WHMCS or HostBill.<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Security-Settings-EasyDCIM-v1.15.0.png\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" width=\"1748\" height=\"1100\" src=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Security-Settings-EasyDCIM-v1.15.0.png\" alt=\"Security Settings - EasyDCIM v1.15.0\" class=\"wp-image-5462\" srcset=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Security-Settings-EasyDCIM-v1.15.0.png 1748w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Security-Settings-EasyDCIM-v1.15.0-300x189.png 300w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Security-Settings-EasyDCIM-v1.15.0-1024x644.png 1024w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Security-Settings-EasyDCIM-v1.15.0-768x483.png 768w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Security-Settings-EasyDCIM-v1.15.0-1536x967.png 1536w\" sizes=\"(max-width: 1748px) 100vw, 1748px\" \/><\/a><\/figure>\n\n\n<p style=\"text-align: justify;\">But when it comes to security, standing still is just another way of falling behind. That\u2019s why version 1.15.0 debuts a dedicated <strong style=\"color: #3a6651;\">System Security<\/strong> section with <strong>clear and actionable advice<\/strong> based on configuration checks handled across EasyDCIM at 5-minute intervals.<\/p>\n<p style=\"text-align: justify;\">This specific area acts as your guide to keeping your system safe, highlighting:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong style=\"color: #3a6651;\">Successful security checks<\/strong> so you can rest easy knowing the basics are covered.<\/li>\n<li style=\"padding-top: 10px;\"><strong style=\"color: #3a6651;\">Warnings<\/strong> that guide you toward proactive improvements.<\/li>\n<li style=\"padding-top: 10px;\"><strong style=\"color: #3a6651;\">Critical alerts<\/strong> that demand immediate action to prevent potential vulnerabilities.<\/li>\n<\/ul>\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/System-Security-EasyDCIM-v1.15.0.png\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" width=\"1748\" height=\"1100\" src=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/System-Security-EasyDCIM-v1.15.0.png\" alt=\"System Security - EasyDCIM v1.15.0\" class=\"wp-image-5464\" srcset=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/System-Security-EasyDCIM-v1.15.0.png 1748w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/System-Security-EasyDCIM-v1.15.0-300x189.png 300w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/System-Security-EasyDCIM-v1.15.0-1024x644.png 1024w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/System-Security-EasyDCIM-v1.15.0-768x483.png 768w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/System-Security-EasyDCIM-v1.15.0-1536x967.png 1536w\" sizes=\"(max-width: 1748px) 100vw, 1748px\" \/><\/a><\/figure>\n\n\n<p style=\"text-align: justify;\">The same critical knowledge is served up in bite-sized form directly on the <strong>dashboard<\/strong> and within the <strong>menu view<\/strong>, offering you a quick and easy way to see if anything requires your immediate attention.<\/p>\n<p style=\"text-align: left; font-size: 24px; padding-top: 40px;\"><strong style=\"color: #35975c;\">Advanced firewall with ModSecurity<\/strong><\/p>\n<p style=\"text-align: justify;\">When it comes to fighting off unauthorized access, the new support for <a href=\"https:\/\/modsecurity.org\" target=\"_blank\" rel=\"noopener\"><strong style=\"color: #3a6651!important; text-decoration: underline;\">ModSecurity<\/strong><\/a> adds an advanced layer of defense for Debian-based systems.<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Advanced-Firewall-Settings-EasyDCIM-v1.15.0.png\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" width=\"1748\" height=\"1100\" src=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Advanced-Firewall-Settings-EasyDCIM-v1.15.0.png\" alt=\"Advanced Firewall Settings - EasyDCIM v1.15.0\" class=\"wp-image-5466\" srcset=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Advanced-Firewall-Settings-EasyDCIM-v1.15.0.png 1748w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Advanced-Firewall-Settings-EasyDCIM-v1.15.0-300x189.png 300w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Advanced-Firewall-Settings-EasyDCIM-v1.15.0-1024x644.png 1024w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Advanced-Firewall-Settings-EasyDCIM-v1.15.0-768x483.png 768w, https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/Advanced-Firewall-Settings-EasyDCIM-v1.15.0-1536x967.png 1536w\" sizes=\"(max-width: 1748px) 100vw, 1748px\" \/><\/a><\/figure>\n\n\n<p style=\"text-align: justify;\">This <strong>web application firewall (WAF)<\/strong> engine goes beyond the basics in more ways than one:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong style=\"color: #3a6651;\">Automatic HTTP traffic filtering<\/strong> blocks requests from unknown IP addresses.<\/li>\n<li style=\"padding-top: 10px;\"><strong style=\"color: #3a6651;\">Predefined IP whitelisting<\/strong> ensures smooth operation for trusted connections.<\/li>\n<li style=\"padding-top: 10px;\"><strong style=\"color: #3a6651;\">Customizable rules<\/strong> let you define additional safe IP addresses to meet your specific needs.<\/li>\n<li style=\"padding-top: 10px;\"><strong style=\"color: #3a6651;\">Default Coreruleset v4.10.0<\/strong> brings high-tech protections right out of the box.<\/li>\n<\/ul>\n<p style=\"text-align: left; font-size: 24px; padding-top: 40px;\"><strong style=\"color: #35975c;\">All proven practices in one place<\/strong><\/p>\n<p style=\"text-align: justify;\">We know security can feel overwhelming, especially when the sheer volume of tips leaves you more confused than informed. That\u2019s why we\u2019ve combined all <strong>expert security insights<\/strong> for EasyDCIM into one <a href=\"https:\/\/www.easydcim.com\/documentation\/basic-information\/application-security\/\" target=\"_blank\" rel=\"noopener\"><strong style=\"color: #3a6651!important; text-decoration: underline;\">easy-to-follow guide<\/strong><\/a>. Clear, practical, and step-by-step, it\u2019s built to give you the confidence to create defenses that stand the test of time.<\/p>\n<p style=\"-webkit-border-radius: 25px; -moz-border-radius: 25px; border-radius: 25px; border: 2px dotted #35975C; text-align: justify; padding: 30px;\"><strong>Why now?<\/strong> Because cybersecurity threats aren\u2019t rare disruptions anymore &#8211; they are the new normal. Bots are getting smarter, breaches more frequent, and the line between safe and vulnerable grows thinner by the day. It\u2019s no longer about <em>if<\/em> your defenses will be tested, but <em>when<\/em>. Keeping watch and staying ready has become a core part of doing business today.<\/p>\n<p style=\"text-align: left; font-size: 24px; padding-top: 40px;\"><strong style=\"color: #35975c;\">Fedora Server support extended<\/strong><\/p>\n<p style=\"text-align: justify;\">Security might lead the charge in EasyDCIM v1.15.0, but the work done in other areas is just as noteworthy. The update to <a href=\"https:\/\/www.easydcim.com\/extensions\/os-installation\" target=\"_blank\" rel=\"noopener\"><strong style=\"color: #3a6651!important; text-decoration: underline;\">OS Installation<\/strong><\/a> extension has brought a new alternative to the choice of system templates, allowing <strong>Fedora Server 41<\/strong> to be installed automatically. Streamlined and efficient, this Linux-based operating system proves to be the perfect foundation for modern server setups.<\/p>\n<p style=\"-webkit-border-radius: 25px; -moz-border-radius: 25px; border-radius: 25px; border: 2px dotted #35975C; text-align: justify; padding: 30px;\">And with all this talk about security, let\u2019s not forget that Fedora Server 41 includes <strong>SELinux (Security-Enhanced Linux)<\/strong> along with other advanced security features designed to safeguard your system from vulnerabilities and unauthorized access.<\/p>\n<p style=\"text-align: left; font-size: 24px; padding-top: 40px;\"><strong style=\"color: #35975c;\">Confidence beyond EasyDCIM<\/strong><\/p>\n<p style=\"text-align: justify;\">In tune with the main focus of this release, let this serve as a crucial reminder: the modules behind EasyDCIM\u2019s core integrations have lately received a <strong>critical set of security updates<\/strong>, resulting in the following new releases:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.modulesgarden.com\/products\/whmcs\/easydcim-dedicated-servers#changelog\" target=\"_blank\" rel=\"noopener\"><strong style=\"color: #3a6651!important; text-decoration: underline;\">Dedicated Servers For WHMCS v2.4.1<\/strong><\/a><\/li>\n<li style=\"padding-top: 10px;\"><a href=\"https:\/\/www.modulesgarden.com\/products\/whmcs\/easydcim-colocation#changelog\" target=\"_blank\" rel=\"noopener\"><strong style=\"color: #3a6651!important; text-decoration: underline;\">Colocation For WHMCS v2.2.1<\/strong><\/a><\/li>\n<li style=\"padding-top: 10px;\"><a href=\"https:\/\/www.easydcim.com\/extensions\/dedicated-servers-hostbill#changelog\" target=\"_blank\" rel=\"noopener\"><strong style=\"color: #3a6651!important; text-decoration: underline;\">Dedicated Servers For HostBill v1.3.7<\/strong><\/a><\/li>\n<li style=\"padding-top: 10px;\"><a href=\"https:\/\/www.easydcim.com\/extensions\/colocation-hostbill#changelog\" target=\"_blank\" rel=\"noopener\"><strong style=\"color: #3a6651!important; text-decoration: underline;\">Colocation For HostBill v1.0.2<\/strong><\/a><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">We can\u2019t stress this enough &#8211; update your modules to the latest versions to ensure you are fully equipped with all the latest improvements. It\u2019s a simple step that goes a long way in keeping your setup well-protected and up-to-date.<\/p>\n<p style=\"text-align: left; font-size: 24px; padding-top: 40px;\"><strong style=\"color: #35975c;\">From hype to help<\/strong><\/p>\n<p style=\"text-align: justify;\">Our approach is simple: we believe in solutions that don\u2019t just look good on paper but actually make your life better. While the buzz around security continues to grow, we prioritize what genuinely works in real-world settings &#8211; the tools you can trust to protect your day-to-day operations, your data, and your peace of mind. So, if security is on your agenda &#8211; and it should be &#8211; <strong>EasyDCIM v1.15.0<\/strong> is your new best friend.<\/p>\n<p style=\"text-align: justify;\"><span style=\"display: block; text-align: center; padding-bottom: 0px;\"><a style=\"display: inline-block; margin: 45px 0px 30px;\" href=\"https:\/\/www.easydcim.com\/changelog\" target=\"_blank\" rel=\"noopener\"><span style=\"-webkit-border-radius: 5px; -moz-border-radius: 5px; border-radius: 5px; background: linear-gradient(to top, #35975C, #2DC69E); color: #fff; padding: 15px 20px;\"><strong>View the Changelog!<\/strong><\/span><\/a><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Security seems to be one of those buzzwords that\u2019s impossible to avoid these days. Scroll through LinkedIn, or browse an industry blog, and you\u2019ll find someone promoting the latest and greatest ways to secure your business. We can\u2019t speak for every flashy new&#8230;<\/p>\n","protected":false},"author":7,"featured_media":5453,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security at the core of EasyDCIM v1.15.0 - EasyDCIM<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security at the core of EasyDCIM v1.15.0 - EasyDCIM\" \/>\n<meta property=\"og:description\" content=\"Security seems to be one of those buzzwords that\u2019s impossible to avoid these days. Scroll through LinkedIn, or browse an industry blog, and you\u2019ll find someone promoting the latest and greatest ways to secure your business. We can\u2019t speak for every flashy new...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0\" \/>\n<meta property=\"og:site_name\" content=\"EasyDCIM Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDCIM\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/EasyDCIM\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-28T11:50:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/EasyDCIM-v1.15.0.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1052\" \/>\n\t<meta property=\"og:image:height\" content=\"582\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Joanna Byjo\u015b\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joanna Byjo\u015b\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0\",\"url\":\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0\",\"name\":\"Security at the core of EasyDCIM v1.15.0 - EasyDCIM\",\"isPartOf\":{\"@id\":\"https:\/\/www.easydcim.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/EasyDCIM-v1.15.0.png\",\"datePublished\":\"2025-01-28T10:00:00+00:00\",\"dateModified\":\"2025-01-28T11:50:35+00:00\",\"author\":{\"@id\":\"https:\/\/www.easydcim.com\/blog\/#\/schema\/person\/c7ff2532f7d8eab6dd88016fb49f5682\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#primaryimage\",\"url\":\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/EasyDCIM-v1.15.0.png\",\"contentUrl\":\"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/EasyDCIM-v1.15.0.png\",\"width\":1052,\"height\":582,\"caption\":\"EasyDCIM v1.15.0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.easydcim.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security at the core of EasyDCIM v1.15.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.easydcim.com\/blog\/#website\",\"url\":\"https:\/\/www.easydcim.com\/blog\/\",\"name\":\"EasyDCIM Blog\",\"description\":\"Automated Bare Metal Server Provisioning and Remote Data Center Management - Official EasyDCIM Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.easydcim.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.easydcim.com\/blog\/#\/schema\/person\/c7ff2532f7d8eab6dd88016fb49f5682\",\"name\":\"Joanna Byjo\u015b\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.easydcim.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0025222efd44df58af48d2c277d32034?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0025222efd44df58af48d2c277d32034?s=96&d=mm&r=g\",\"caption\":\"Joanna Byjo\u015b\"},\"description\":\"EasyDCIM Marketing Team Leader\",\"sameAs\":[\"https:\/\/www.easydcim.com\",\"https:\/\/www.facebook.com\/EasyDCIM\",\"https:\/\/www.linkedin.com\/company\/easydcim\",\"https:\/\/twitter.com\/EasyDCIM\",\"https:\/\/www.youtube.com\/@EasyDCIM\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security at the core of EasyDCIM v1.15.0 - EasyDCIM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0","og_locale":"en_US","og_type":"article","og_title":"Security at the core of EasyDCIM v1.15.0 - EasyDCIM","og_description":"Security seems to be one of those buzzwords that\u2019s impossible to avoid these days. Scroll through LinkedIn, or browse an industry blog, and you\u2019ll find someone promoting the latest and greatest ways to secure your business. We can\u2019t speak for every flashy new...","og_url":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0","og_site_name":"EasyDCIM Blog","article_publisher":"https:\/\/www.facebook.com\/EasyDCIM","article_author":"https:\/\/www.facebook.com\/EasyDCIM","article_published_time":"2025-01-28T10:00:00+00:00","article_modified_time":"2025-01-28T11:50:35+00:00","og_image":[{"width":1052,"height":582,"url":"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/EasyDCIM-v1.15.0.png","type":"image\/png"}],"author":"Joanna Byjo\u015b","twitter_misc":{"Written by":"Joanna Byjo\u015b","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0","url":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0","name":"Security at the core of EasyDCIM v1.15.0 - EasyDCIM","isPartOf":{"@id":"https:\/\/www.easydcim.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#primaryimage"},"image":{"@id":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#primaryimage"},"thumbnailUrl":"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/EasyDCIM-v1.15.0.png","datePublished":"2025-01-28T10:00:00+00:00","dateModified":"2025-01-28T11:50:35+00:00","author":{"@id":"https:\/\/www.easydcim.com\/blog\/#\/schema\/person\/c7ff2532f7d8eab6dd88016fb49f5682"},"breadcrumb":{"@id":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#primaryimage","url":"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/EasyDCIM-v1.15.0.png","contentUrl":"https:\/\/www.easydcim.com\/blog\/wp-content\/uploads\/2025\/01\/EasyDCIM-v1.15.0.png","width":1052,"height":582,"caption":"EasyDCIM v1.15.0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.easydcim.com\/blog\/easydcim-v1-15-0#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.easydcim.com\/blog"},{"@type":"ListItem","position":2,"name":"Security at the core of EasyDCIM v1.15.0"}]},{"@type":"WebSite","@id":"https:\/\/www.easydcim.com\/blog\/#website","url":"https:\/\/www.easydcim.com\/blog\/","name":"EasyDCIM Blog","description":"Automated Bare Metal Server Provisioning and Remote Data Center Management - Official EasyDCIM Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.easydcim.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.easydcim.com\/blog\/#\/schema\/person\/c7ff2532f7d8eab6dd88016fb49f5682","name":"Joanna Byjo\u015b","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.easydcim.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0025222efd44df58af48d2c277d32034?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0025222efd44df58af48d2c277d32034?s=96&d=mm&r=g","caption":"Joanna Byjo\u015b"},"description":"EasyDCIM Marketing Team Leader","sameAs":["https:\/\/www.easydcim.com","https:\/\/www.facebook.com\/EasyDCIM","https:\/\/www.linkedin.com\/company\/easydcim","https:\/\/twitter.com\/EasyDCIM","https:\/\/www.youtube.com\/@EasyDCIM"]}]}},"_links":{"self":[{"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/posts\/5430"}],"collection":[{"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/comments?post=5430"}],"version-history":[{"count":30,"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/posts\/5430\/revisions"}],"predecessor-version":[{"id":5476,"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/posts\/5430\/revisions\/5476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/media\/5453"}],"wp:attachment":[{"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/media?parent=5430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/categories?post=5430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.easydcim.com\/blog\/wp-json\/wp\/v2\/tags?post=5430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}