{"version":"1.0","provider_name":"SaaSworthy Blog | Top Software, Statistics, Insights, Reviews &amp; Trends in SaaS","provider_url":"https:\/\/dev.saasworthy.com\/blog","author_name":"Rajnish Shankhar","author_url":"https:\/\/dev.saasworthy.com\/blog\/author\/rajnish","title":"Top Vulnerability Management Tools in 2022 - SaaSworthy Blog | Top Software, Statistics, Insights, Reviews &amp; Trends in SaaS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"nF0o5ad6oV\"><a href=\"https:\/\/dev.saasworthy.com\/blog\/top-vulnerability-management-tools\">Top Vulnerability Management Tools in 2022<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dev.saasworthy.com\/blog\/top-vulnerability-management-tools\/embed#?secret=nF0o5ad6oV\" width=\"600\" height=\"338\" title=\"&#8220;Top Vulnerability Management Tools in 2022&#8221; &#8212; SaaSworthy Blog | Top Software, Statistics, Insights, Reviews &amp; Trends in SaaS\" data-secret=\"nF0o5ad6oV\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/dev.saasworthy.com\/blog\/wp-content\/uploads\/2022\/04\/Vulnerability.jpg","thumbnail_width":770,"thumbnail_height":515,"description":"Here\u2019s how you can choose the best Vulnerability Management Tools for your enterprise. It is software that helps you to keep your network secure and off from vulnerabilities. Read to know more!"}