{"id":74629,"date":"2026-04-09T12:27:19","date_gmt":"2026-04-09T16:27:19","guid":{"rendered":"https:\/\/www.tpx.com\/?p=74629"},"modified":"2026-04-09T12:27:19","modified_gmt":"2026-04-09T16:27:19","slug":"sase-isnt-the-decision-the-sequence-is","status":"publish","type":"post","link":"https:\/\/www.tpx.com\/blog\/sase-isnt-the-decision-the-sequence-is\/","title":{"rendered":"SASE Isn\u2019t the Decision. The Sequence Is."},"content":{"rendered":"<p><span data-contrast=\"auto\">Secure Access Service Edge, otherwise known as\u00a0<\/span><a href=\"https:\/\/www.tpx.com\/blog\/talk-sase-to-me\/\"><span data-contrast=\"none\">SASE,<\/span><\/a><span data-contrast=\"auto\">\u00a0doesn\u2019t\u00a0usually start as a strategy.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It starts as a realization. Something\u00a0isn\u2019t\u00a0working the way it used to. Remote access feels heavier than it should, but no one can point\u00a0to\u00a0a single\u00a0reason why.\u00a0Access works one way for some users and\u00a0a different way\u00a0for others, depending on how and where they connect. Policies exist, but they\u00a0don\u2019t\u00a0always behave consistently. And when something breaks,\u00a0it\u2019s\u00a0not\u00a0immediately\u00a0clear whether the issue sits with identity, the network, or the tools\u00a0layered in\u00a0between.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">But\u00a0there\u2019s\u00a0a problem that\u00a0isn\u2019t\u00a0being talked about enough.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">When organizations react\u00a0to pressure without fully defining the\u00a0problem\u00a0they\u2019re\u00a0trying to solve, SASE gets treated like a product decision instead of what it really is:\u00a0<\/span><b><span data-contrast=\"auto\">an architectural shift that\u00a0requires deliberate sequencing.\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">That distinction is where most implementations either gain\u00a0traction&#8230;or\u00a0stall out.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>SASE\u00a0Isn\u2019t\u00a0a Starting Point<\/h2>\n<p><span data-contrast=\"auto\">It&#8217;s\u00a0rare to\u00a0wake up\u00a0one day\u00a0and\u00a0decide\u00a0you\u00a0need SASE.\u00a0That decision is\u00a0usually the result of\u00a0accumulation, but not in a way that presents itself cleanly.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What began as isolated adjustments\u00a0start\u00a0to overlap, and this\u00a0is where\u00a0the initiative starts to\u00a0go\u00a0off track. The conversation shifts too quickly from \u201cwhat\u2019s breaking\u201d to \u201cwhat platform should we use,\u201d and once that happens, architecture takes a back seat to features.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SASE is often treated like a product category, but in practice\u00a0it\u2019s\u00a0an\u00a0<\/span><a href=\"https:\/\/www.tpx.com\/resources\/product-literature\/tpx-managed-sase-technical-deep-dive\/\"><span data-contrast=\"none\">architectural model<\/span><\/a><span data-contrast=\"auto\">.\u00a0\u00a0It\u2019s\u00a0the convergence of cloud-delivered security and modern\u00a0networking, bringing identity-based access, direct-to-application connectivity, and inline inspection into a\u00a0unified\u00a0model.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">That model is powerful, but it assumes the\u00a0environment underneath is ready to support it.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>What Most Vendors\u00a0Don\u2019t\u00a0Say<\/h2>\n<p><span data-contrast=\"auto\">The industry has done\u00a0a good job\u00a0of explaining what SASE is. It has not done\u00a0a good job\u00a0of explaining\u00a0<\/span><a href=\"https:\/\/www.tpx.com\/resources\/videos\/sase-overview\/\"><span data-contrast=\"none\">what it takes to make it work<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SASE is designed to simplify how access and security are delivered, but too\u00a0often the\u00a0focus\u00a0narrows\u00a0on platform capabilities instead of the conditions required for those capabilities to deliver value.\u00a0It\u2019s\u00a0often positioned as something you \u201cmove to,\u201d rather than something you build toward.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The gap is where expectations and reality diverge.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>What\u00a0SASE\u00a0Changes<\/h2>\n<p><span data-contrast=\"auto\">SASE changes how access and security decisions are made.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Access is no longer granted because a user is on the network. Instead, it is continuously evaluated based on identity, device posture, and context. Traffic is no longer routed through a centralized perimeter. It\u00a0now\u00a0moves directly\u00a0between users and applications, with security enforced along the way.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In practical terms, that means the systems that sit beneath your architecture begin to matter more.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Identity becomes the control plane. Application behavior\u00a0determines\u00a0how access policies are enforced. Visibility\u00a0shifts from appliance-based logging to distributed telemetry across users, devices, and cloud services.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">When those elements are aligned, <a href=\"https:\/\/www.tpx.com\/solutions\/networking\/managed-sase\/\">SASE simplifies the environment<\/a>. When they are not, it exposes gaps that\u00a0were\u00a0easy to ignore in a perimeter-based model.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This is why so many projects slow down midstream. SASE forces organizations to confront architectural realities they have been able to work\u00a0around for years.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>The Pattern Behind Successful SASE Deployments<\/h2>\n<p><span data-contrast=\"auto\">The difference becomes clear when you look at how successful implementations approach SASE.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It&#8217;s\u00a0not treated\u00a0as a single initiative or a deadline-driven rollout.\u00a0Instead,\u00a0it\u2019s\u00a0treated\u00a0as a sequence of changes that need to be introduced in the right order.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">That sequence usually begins with identity. Without consistent authentication, clear user lifecycle management, and well-defined access policies, Zero Trust models quickly become inconsistent in practice.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">From there, attention shifts to applications. Cloud-native services tend to align well with identity-based access, but legacy applications often rely on assumptions that break under Zero Trust\u00a0enforcement. Understanding that landscape early prevents disruption later.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Network architecture follows. As traffic patterns change, routing and security enforcement need to evolve together. When they\u00a0don\u2019t,\u00a0you risk\u00a0introducing\u00a0gaps between connectivity and control that are\u00a0difficult to manage.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">None of this\u00a0requires\u00a0a full\u00a0overhaul of your current\u00a0strategy. One of the advantages of a managed approach is the ability to introduce SASE capabilities in phases, integrating with existing identity providers and networking\u00a0environments rather than forcing immediate transformation.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>Why Execution Feels Harder Than It Should<\/h2>\n<p><span data-contrast=\"auto\">There is a reason SASE can feel more complicated\u00a0than expected.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It\u2019s\u00a0because most internal teams are not structured to implement and\u00a0operate\u00a0the architecture on their own.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SASE requires coordination across identity, networking, and security teams, which often\u00a0operate\u00a0with different priorities and different tools.\u00a0One team is focused on access, another on performance, another on risk, and none of them own the entire experience end to end.\u00a0\u00a0As a result, aligning policy, understanding application behavior, and continuously tuning the environment becomes an ongoing effort rather than a one-time task, and one that does not map cleanly to traditional operating models.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.tpx.com\/resources\/product-literature\/tpx-managed-sase-what-to-expect-in-the-first-45-days\/\"><span data-contrast=\"none\">A structured implementation model<\/span><\/a><span data-contrast=\"auto\">, for example, introduces alignment early by defining applications, use cases, and ownership before any configuration begins. From there, the process moves through\u00a0design, validation, and rollout in a controlled way that reduces risk\u00a0and accelerates adoption.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">When that structure is in place, SASE becomes predictable. Without it, even well-planned initiatives can lose momentum.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>From Perspective to Action<\/h2>\n<p><span data-contrast=\"auto\">For most organizations,\u00a0the move toward\u00a0SASE\u00a0is\u00a0directionally right.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The real question is whether your environment is ready for the way it works, and more importantly, where to start.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The SASE Decision Framework was built to answer that exact question. It walks through the architectural realities that\u00a0determine\u00a0whether SASE will move forward smoothly or stall, helping\u00a0you evaluate identity maturity, application dependencies, network alignment, and operational readiness before\u00a0committing\u00a0to\u00a0a path, so you can move forward with clarity instead of assumption.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Explore the\u00a0<\/span><\/b><a href=\"https:\/\/www.tpx.com\/resources\/playbook\/sase-decision-framework\/\"><b><span data-contrast=\"none\">SASE Decision Framework<\/span><\/b><\/a><b><span data-contrast=\"auto\">\u00a0to evaluate where your architecture stands and what needs to happen next.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure Access Service Edge, otherwise known as\u00a0SASE,\u00a0doesn\u2019t\u00a0usually start as a strategy.\u00a0 It starts as a realization. Something\u00a0isn\u2019t\u00a0working the way it used to. Remote access feels [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":74631,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2499,156,158],"tags":[],"class_list":["post-74629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sase","category-business-cybersecurity","category-network"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/posts\/74629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/comments?post=74629"}],"version-history":[{"count":1,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/posts\/74629\/revisions"}],"predecessor-version":[{"id":74630,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/posts\/74629\/revisions\/74630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/media\/74631"}],"wp:attachment":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/media?parent=74629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/categories?post=74629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/tags?post=74629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}