{"id":7534,"date":"2025-07-11T12:47:33","date_gmt":"2025-07-11T12:47:33","guid":{"rendered":"https:\/\/anakage.com\/blog\/?p=7534"},"modified":"2025-10-03T16:53:12","modified_gmt":"2025-10-03T11:23:12","slug":"guide-to-itam","status":"publish","type":"post","link":"https:\/\/www.anakage.com\/blog\/guide-to-itam\/","title":{"rendered":"Ultimate Guide to ITAM in 2025"},"content":{"rendered":"<h1>The Ultimate Guide to Proactive IT Asset Management<\/h1>\n<p><span style=\"font-weight: 400;\">In today&#8217;s complex IT landscape, managing your organization&#8217;s assets has become more than just a matter of inventory. With the rise of hybrid work, escalating cybersecurity threats, and a growing focus on financial efficiency, a reactive approach to IT Asset Management (ITAM) is no longer viable. Simply knowing what you have is not enough; you need to know how it\u2019s performing, if it&#8217;s secure, and what its future needs are.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where <\/span><b>Proactive IT Asset Management<\/b><span style=\"font-weight: 400;\"> comes in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This guide will walk you through everything you need to know about building a modern ITAM strategy that saves money, enhances security, and empowers your IT team to move from a reactive fire-fighting mode to a proactive, strategic one.<\/span><\/p>\n<h2><b>What is IT Asset Management (ITAM)?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">IT Asset Management (ITAM) is the set of business practices that combines financial, inventory, and contractual functions to optimize spending and support the strategic decision-making within the IT environment. The process ensures that an organization\u2019s assets are accounted for, deployed, maintained, upgraded, and disposed of when the time comes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Put simply, it\u2019s making sure that valuable items, tangible and intangible, are tracked and being used effectively. An IT asset includes any company-owned information, system, or hardware used in business activities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Traditionally, ITAM focused on inventory and compliance. However, modern ITAM has evolved to encompass <\/span><b>proactive hardware health monitoring<\/b><span style=\"font-weight: 400;\">, automated software discovery, and seamless integration with other IT systems to create a single source of truth for all technology assets.<\/span><\/p>\n<h2><b>Why is ITAM Important?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A comprehensive ITAM strategy is no longer a &#8220;nice-to-have&#8221;; it&#8217;s a core business function that delivers significant value.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Provides a Single Source of Truth:<\/b><span style=\"font-weight: 400;\"> Too often, assets are tracked in multiple places by different people, leading to chaos and inaccuracy. ITAM brings order by centralizing this information, which is critical for making informed decisions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Improves Utilization and Eliminates Waste:<\/b><span style=\"font-weight: 400;\"> A clear view of your asset inventory helps eliminate unnecessary purchases and cut software licensing and support costs. By optimizing software licenses alone, many organizations can cut spending by as much as 30%.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Reduces Security and Compliance Risk:<\/b><span style=\"font-weight: 400;\"> Increased control helps enforce security policies and reduces the risk of non-compliance with legal and regulatory requirements. You cannot secure what you cannot see, and ITAM helps eliminate &#8220;shadow IT&#8221; i.e. unauthorized software and hardware operating on your network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Supports Broader ITSM and DevOps Practices:<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> Asset management is critical to supporting ITIL processes like change, incident, and problem management. With accurate asset data, teams can better predict the impact of changes and resolve incidents faster.<br \/>\n<\/span><\/span><\/span><\/p>\n<hr \/>\n<p><em>For a deeper analysis of this, read our guide on the <a href=\"https:\/\/anakage.com\/blog\/tracking-asset-beyond-spreadsheets\/\" target=\"_blank\" rel=\"noopener\"><b>[5 Telltale Signs You&#8217;ve Outgrown Manual Asset Tracking]<\/b><\/a>.<br \/>\n<\/em><\/p>\n<hr \/>\n<\/li>\n<\/ul>\n<h2><b>The 5 Stages of Proactive IT Asset Lifecycle Management<\/b><\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-7536 size-medium\" src=\"https:\/\/anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181135-632x306.jpg\" alt=\"Diagram showing the 5 stages of the IT asset management lifecycle: procurement, deployment, maintenance, optimization, and disposal.\" width=\"632\" height=\"306\" srcset=\"https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181135-632x306.jpg 632w, https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181135-1020x494.jpg 1020w, https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181135-768x372.jpg 768w, https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181135-1536x744.jpg 1536w, https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181135-2048x993.jpg 2048w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">A successful ITAM strategy manages an asset through its entire life, ensuring value is maximized at every stage.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Procurement &amp; Onboarding:<\/b><span style=\"font-weight: 400;\"> The life cycle begins with a request and the acquisition of an asset. Modern ITAM tools allow for bulk onboarding of both IT and non-IT assets, immediately tagging them with user, department, and location data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Deployment &amp; Discovery:<\/b><span style=\"font-weight: 400;\"> Once deployed, an agent-based discovery process should automatically identify the asset and all its software, creating a real-time inventory without manual intervention.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Maintenance &amp; Monitoring:<\/b><span style=\"font-weight: 400;\"> This is the longest and most critical stage. Proactive ITAM involves continuous, <\/span><b>real-time hardware health monitoring<\/b><span style=\"font-weight: 400;\"> of metrics like battery health, CPU usage, and disk space. This allows you to schedule maintenance predictively and manage warranties effectively to avoid service lapses.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Optimization &amp; Upgrades:<\/b><span style=\"font-weight: 400;\"> As the asset ages, the ITAM system provides the data needed to make smart decisions about upgrades or reallocation, ensuring optimal use across the organization.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Disposal &amp; Retirement:<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> When an asset reaches the end of its life, a formal retirement process ensures data is securely wiped and the hardware is disposed of in a compliant and environmentally responsible manner, helping to reduce e-waste. This stage is often referred to as IT Asset Disposition (ITAD).<br \/>\n<\/span><\/span><\/span><\/p>\n<hr \/>\n<p><em><em>To learn more about optimizing stage 3, see our posts on <a href=\"https:\/\/anakage.com\/blog\/real-time-hardware-health-monitoring\/\" target=\"_blank\" rel=\"noopener\"><b>[Using Real-Time Health Monitoring to Prevent Hardware Failures]<\/b><\/a> and <b><a href=\"https:\/\/anakage.com\/blog\/hidden-cost-of-expired-warranties\/\" target=\"_blank\" rel=\"noopener\">[The Hidden Cost of Expired Warranties (And How to Automate Alerts)]<\/a>.<br \/>\n<\/b><\/em><\/em><\/p>\n<hr \/>\n<p><em><b><br \/>\n<\/b><\/em><\/li>\n<\/ol>\n<h2><b>Types of IT Asset Management<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">ITAM can be broken down into several categories that address different aspects of an organization&#8217;s technology ecosystem:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Hardware Asset Management:<\/b><span style=\"font-weight: 400;\"> Focuses on the lifecycle of physical IT equipment like servers, laptops, and mobile devices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Software Asset Management (SAM):<\/b><span style=\"font-weight: 400;\"> Involves tracking and optimizing software licenses, compliance, and usage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cloud Asset Management:<\/b><span style=\"font-weight: 400;\"> Oversees cloud-based services like SaaS, IaaS, and PaaS to monitor consumption and manage costs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Digital Asset Management (DAM):<\/b><span style=\"font-weight: 400;\"> Used to track and manage rich media files like videos, images, and documents, along with their licenses and permissions.<\/span><\/li>\n<\/ul>\n<h2><b>Key Features of a Modern ITAM Platform<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When evaluating ITAM tools for 2025 and beyond, look for these critical capabilities:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Unified Asset Repository:<\/b><span style=\"font-weight: 400;\"> The ability to track both IT and non-IT assets in a single dashboard.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Automated, Agent-Based Discovery:<\/b><span style=\"font-weight: 400;\"> For real-time, accurate inventory of both hardware and software.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Proactive Health Monitoring:<\/b><span style=\"font-weight: 400;\"> Real-time alerts for battery degradation, low disk space, and high CPU usage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Seamless Integrations:<\/b><span style=\"font-weight: 400;\"> Out-of-the-box integrations with Active Directory (AD), HRMS, and ITSM platforms like ServiceNow are essential for automated workflows.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Role-Based Access Control (RBAC):<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> The ability to create dynamic views and controls based on department, location, or user role.<br \/>\n<\/span><\/span><\/span><\/p>\n<hr \/>\n<p><em><em>To see how these integrations work in practice, read our guide on <b><a href=\"https:\/\/anakage.com\/blog\/integrating-itam-with-ad-itsm\/\" target=\"_blank\" rel=\"noopener\">[Integrating ITAM with AD &amp; ITSM for a Seamless Workflow]<\/a>.<br \/>\n<\/b><\/em><\/em><\/p>\n<hr \/>\n<p><em><b><br \/>\n<\/b><\/em><\/li>\n<\/ul>\n<h2><b>ITAM as a Core Pillar of Your Cybersecurity Strategy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In an era of constant threats, your ITAM platform is one of your most important security tools. Unmanaged devices and unauthorized software are open doors for malicious actors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A proactive ITAM solution enhances security by:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Eliminating Shadow IT:<\/b><span style=\"font-weight: 400;\"> Automatically discovering and flagging any software or hardware that isn&#8217;t company-approved.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ensuring Patch Compliance:<\/b><span style=\"font-weight: 400;\"> By providing a complete software inventory, it ensures that no device is missed during critical security patching.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enabling Fast Incident Response:<\/b><span style=\"font-weight: 400;\"> When a threat is detected, ITAM allows security teams to instantly identify the affected devices, their users, and their locations.<\/span><\/li>\n<\/ul>\n<h2><b>ITAM vs. Configuration Management<\/b><\/h2>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-7537 size-medium\" src=\"https:\/\/anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181202-632x397.jpg\" alt=\"Flowchart comparing ITAM and CMDB workflows and their integration.\" width=\"632\" height=\"397\" srcset=\"https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181202-632x397.jpg 632w, https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181202-1020x641.jpg 1020w, https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181202-768x482.jpg 768w, https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181202-1536x965.jpg 1536w, https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181202-2048x1287.jpg 2048w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Asset management and configuration management are separate but complementary disciplines. While they are often managed in the same system, their focus is different.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IT Asset Management (ITAM):<\/b><span style=\"font-weight: 400;\"> Focuses on the financial and lifecycle aspects of an asset. It answers questions like: &#8220;What do we have?&#8221;, &#8220;Who is using it?&#8221;, &#8220;How much did it cost?&#8221;, and &#8220;When does the warranty expire?&#8221;.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Configuration Management Database (CMDB):<\/b><span style=\"font-weight: 400;\"> Focuses on the relationships between IT components. It answers questions like: &#8220;Which servers are running this application?&#8221;, &#8220;What services will be affected if this router goes down?&#8221;.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In essence, ITAM manages the business value of your assets, while a CMDB manages the operational health of your IT ecosystem.<\/span><\/p>\n<h2><b>How Anakage Delivers Proactive Asset Management<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">While the principles in this guide are universal, the Anakage platform was built from the ground up to deliver a truly proactive and unified ITAM solution.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Anakage stands apart by providing <\/span><b>agent-based, real-time hardware health monitoring<\/b><span style=\"font-weight: 400;\">, a capability often missing in traditional tools that focus only on inventory. Our platform offers a <\/span><b>unified dashboard for both IT and non-IT assets<\/b><span style=\"font-weight: 400;\"> and comes with a built-in integration roadmap for AD, HRMS, and ITSM platforms, enabling cohesive workflows without the need for custom scripting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you&#8217;re ready to move beyond reactive inventory and build a strategic, cost-effective, and secure ITAM program, Anakage provides the visibility and control you need.<\/span><\/p>\n<p><b>Ready to see it for yourself?<\/b><\/p>\n<p><a href=\"https:\/\/anakage.com\/contact-us.html\" target=\"_blank\" rel=\"noopener\"><b>[Schedule a Personalized Demo Today]<\/b><\/a><\/p>\n<p><em>Have you read about our last release?\u00a0<a href=\"https:\/\/anakage.com\/blog\/a-buyers-guide-to-freshworks-alternatives\/\" target=\"_blank\" rel=\"noopener\">Click here<\/a>\u00a0to read!<\/em><\/p>\n<p><!-- FAQPage structured data --><br \/>\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is the main purpose of IT Asset Management (ITAM)?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"ITAM delivers a single, real-time inventory of every IT and non-IT asset. This visibility lets organizations optimize spend, strengthen security, ensure compliance, and make data-driven decisions across the entire asset lifecycle\u2014from procurement to secure disposal.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How does a proactive ITAM strategy differ from a reactive one?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Reactive ITAM only records what you own after it has been purchased. Proactive ITAM continuously monitors hardware health, software usage, and warranty status so you can predict failures, reclaim unused licenses, and automate refresh cycles before problems or costs escalate.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Which asset types should be included in a modern ITAM program?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"A modern program covers hardware (laptops, servers, mobile devices), software licenses (on-prem and SaaS), cloud resources (IaaS, PaaS), and even non-IT assets such as office equipment\u2014everything that carries cost, risk, or compliance obligations.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How does ITAM improve cybersecurity posture?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"By discovering every endpoint and installed application, ITAM eliminates shadow IT, ensures 100 % patch coverage, and gives security teams instant device-user-location context when an incident occurs\u2014reducing mean time to respond (MTTR) and limiting blast radius.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What ROI can organizations expect from a unified ITAM platform?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Most customers recover their investment within 12 months through software-license optimization (up to 30 % savings), reduced hardware refresh costs (up to 20 %), and up to 50 % fewer service-desk tickets thanks to proactive health alerts and self-heal automations.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How is ITAM different from a CMDB?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"ITAM tracks the financial and contractual lifecycle of an asset\u2014cost, ownership, warranty, depreciation\u2014while a CMDB maps relationships between configuration items to support change, incident, and problem management. They are complementary; ITAM feeds authoritative asset data into the CMDB.\"\n      }\n    }\n  ]\n}\n<\/script><\/p>\n<p><!-- Article structured data --><br \/>\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"Article\",\n  \"headline\": \"The Ultimate Guide to Proactive IT Asset Management (ITAM) for 2025\",\n  \"image\": \"https:\/\/anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_181135-1020x494.jpg\",\n  \"author\": { \"@type\": \"Organization\", \"name\": \"Anakage\" },\n  \"publisher\": {\n    \"@type\": \"Organization\",\n    \"name\": \"Anakage\",\n    \"logo\": {\n      \"@type\": \"ImageObject\",\n      \"url\": \"https:\/\/anakage.com\/blog\/wp-content\/uploads\/2022\/11\/logo.png\"\n    }\n  },\n  \"datePublished\": \"2025-07-11\",\n  \"dateModified\": \"2025-10-03\",\n  \"description\": \"The ultimate guide to modern IT Asset Management (ITAM) for 2025. Learn the 5 stages of the proactive ITAM lifecycle, key benefits, best practices, and more.\"\n}\n<\/script><\/p>\n<p><!-- Breadcrumb structured data --><br \/>\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"BreadcrumbList\",\n  \"itemListElement\": [\n    {\n      \"@type\": \"ListItem\",\n      \"position\": 1,\n      \"name\": \"Home\",\n      \"item\": \"https:\/\/anakage.com\/blog\/\"\n    },{\n    \"@type\": \"ListItem\",\n    \"position\": 2,\n    \"name\": \"Blog\",\n    \"item\": \"https:\/\/anakage.com\/blog\/\"\n    },{\n      \"@type\": \"ListItem\",\n      \"position\": 3,\n      \"name\": \"ITAM Guide\",\n      \"item\": \"https:\/\/anakage.com\/blog\/guide-to-itam\/\"\n    }\n  ]\n}\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ultimate guide to modern IT Asset Management (ITAM) for 2025. Learn the 5 stages of the proactive ITAM lifecycle, key benefits, best practices, and more.<\/p>\n","protected":false},"author":1,"featured_media":7535,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_themeisle_gutenberg_block_has_review":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"coauthors":[88],"class_list":["post-7534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"views":445,"jetpack_featured_media_url":"https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2025\/07\/IMG_20250711_180004-scaled.png","jetpack_sharing_enabled":true,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/posts\/7534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/comments?post=7534"}],"version-history":[{"count":7,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/posts\/7534\/revisions"}],"predecessor-version":[{"id":7984,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/posts\/7534\/revisions\/7984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/media\/7535"}],"wp:attachment":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/media?parent=7534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/categories?post=7534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/tags?post=7534"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}