{"version":"1.0","provider_name":"Commvault - English - United States","provider_url":"https:\/\/www.commvault.com","author_name":"unguyen","author_url":"https:\/\/www.commvault.com\/blogs\/author\/unguyen","title":"ESG Technical Summary: A Roadmap to Future-proof Cyber Resilience- Elements of a Blueprint","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"l7LjY1aDog\"><a href=\"https:\/\/www.commvault.com\/resources\/analyst-report\/future-proof-cyber-resilience-elements-of-a-blueprint\">ESG Technical Summary: A Roadmap to Future-proof Cyber Resilience- Elements of a Blueprint<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.commvault.com\/resources\/analyst-report\/future-proof-cyber-resilience-elements-of-a-blueprint\/embed#?secret=l7LjY1aDog\" width=\"600\" height=\"338\" title=\"&#8220;ESG Technical Summary: A Roadmap to Future-proof Cyber Resilience- Elements of a Blueprint&#8221; &#8212; Commvault - English - United States\" data-secret=\"l7LjY1aDog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"This Technical Summary of the Technical Review by Tech Target\u2019s Enterprise Strategy Group outlines criteria to assist organizations in achieving results similar to the significant business and financial impact reported by customers and documented in the Economic Validation","thumbnail_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","thumbnail_width":1200,"thumbnail_height":628}