{"id":2420,"date":"2026-03-24T06:25:56","date_gmt":"2026-03-24T06:25:56","guid":{"rendered":"https:\/\/www.newevol.io\/resources\/?p=2420"},"modified":"2026-03-24T06:26:03","modified_gmt":"2026-03-24T06:26:03","slug":"why-security-operations-need-new-approach","status":"publish","type":"post","link":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/","title":{"rendered":"Why the Future of Security Operations Demands a New Approach"},"content":{"rendered":"<p>Security operations has entered a period of fundamental transformation.<\/p>\n<p>Over the past decade, organizations have significantly expanded their security capabilities by deploying new tools across endpoints, networks, cloud environments, and identity systems. While these technologies have improved visibility into different parts of the infrastructure, they have also introduced a new operational challenge: fragmentation.<\/p>\n<p>Today, many Security Operations Centers (SOCs) operate within highly complex environments where security telemetry is generated continuously across multiple platforms. Analysts must navigate large volumes of alerts, logs, and behavioral signals originating from different tools and data sources.<\/p>\n<p>The result is an operational model that often struggles to keep pace with the scale and sophistication of modern cyber threats.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_66_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor: pointer\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0a0a0a;color:#0a0a0a\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0a0a0a;color:#0a0a0a\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#The_Limits_of_Traditional_SOC_Architectures\" title=\"The Limits of Traditional SOC Architectures\">The Limits of Traditional SOC Architectures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#The_Growing_Challenge_of_Alert_Fatigue\" title=\"The Growing Challenge of Alert Fatigue\">The Growing Challenge of Alert Fatigue<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#Security_Operations_Must_Become_Context-Driven\" title=\"Security Operations Must Become Context-Driven\">Security Operations Must Become Context-Driven<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#The_Rise_of_Unified_Security_Operations_Platforms\" title=\"The Rise of Unified Security Operations Platforms\">The Rise of Unified Security Operations Platforms<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#A_New_Phase_for_Security_Operations\" title=\"A New Phase for Security Operations\">A New Phase for Security Operations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#Final_Thoughts\" title=\"Final Thoughts\">Final Thoughts<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"The_Limits_of_Traditional_SOC_Architectures\"><\/span>The Limits of Traditional SOC Architectures<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Traditional SOC architectures were designed for a simpler digital environment.<\/p>\n<p>Earlier models focused on centralized log collection and alert monitoring. Security Information and Event Management (<strong><a href=\"https:\/\/www.newevol.io\/resources\/blog\/siem\/what-is-siem\/\">SIEM<\/a><\/strong>) systems aggregated logs, while analysts investigated alerts produced by rule-based detection mechanisms.<\/p>\n<p>However, enterprise infrastructure has evolved significantly since those models were first established.<\/p>\n<p>Modern organizations now operate across distributed environments that include:<\/p>\n<ul>\n<li>Cloud infrastructure and SaaS platforms <\/li>\n<li>Remote endpoints and mobile devices <\/li>\n<li>Identity and access management systems <\/li>\n<li>Hybrid networks and multi-cloud environments<\/li>\n<\/ul>\n<p>Each of these layers produces security telemetry that must be analyzed in context.<\/p>\n<p>At the same time, adversaries have adopted more advanced tactics. Rather than triggering obvious alerts, modern attacks often unfold gradually through a sequence of low-signal events spread across multiple systems.<\/p>\n<p>Detecting these attacks requires correlating activity across different environments and understanding how seemingly unrelated signals may be part of the same attack chain.<\/p>\n<p>Traditional SOC architectures were not designed for this level of operational complexity.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Growing_Challenge_of_Alert_Fatigue\"><\/span>The Growing Challenge of Alert Fatigue<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One of the most visible consequences of this complexity is alert fatigue.<\/p>\n<p>Large organizations often generate thousands of security alerts each day. While many of these alerts require investigation, only a small percentage represent genuine security incidents.<\/p>\n<p>Analysts must therefore spend significant time triaging alerts, switching between tools, and manually collecting context before determining whether a threat is real.<\/p>\n<p>This process introduces several operational challenges:<\/p>\n<ul>\n<li>Slower investigation timelines <\/li>\n<li>Increased analyst workload and fatigue <\/li>\n<li>Reduced ability to focus on <strong><a href=\"https:\/\/www.newevol.io\/solutions\/advanced-threat-detection-hunting.php\">advanced threat hunting<\/a><\/strong><\/li>\n<li>Higher risk of missing sophisticated attacks<\/li>\n<\/ul>\n<p>As security data continues to grow, the limitations of traditional alert-centric workflows become increasingly apparent.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Security_Operations_Must_Become_Context-Driven\"><\/span>Security Operations Must Become Context-Driven<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The future of security operations will depend on the ability to analyze security events in context.<\/p>\n<p>Instead of treating alerts as isolated events, SOC teams must understand how activity across endpoints, identities, networks, and cloud systems connects to form a broader threat narrative.<\/p>\n<p>This requires a shift toward operational models that emphasize:<\/p>\n<ul>\n<li>Cross-environment telemetry correlation <\/li>\n<li><strong><a href=\"https:\/\/www.newevol.io\/solutions\/insider-threat-user-behavior-analytics.php\">Behavioral analytics<\/a><\/strong> and pattern recognition <\/li>\n<li>Investigation workflows that reconstruct attack progression <\/li>\n<li>Faster, coordinated response across multiple systems<\/li>\n<\/ul>\n<p>Achieving this level of visibility and coordination requires more than incremental improvements. It requires a new architectural approach to security operations.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Rise_of_Unified_Security_Operations_Platforms\"><\/span>The Rise of Unified Security Operations Platforms<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In response to these challenges, many organizations are beginning to adopt unified <strong><a href=\"https:\/\/www.newevol.io\/platform\/newevol.php\">security operations platforms<\/a><\/strong>.<\/p>\n<p>These platforms consolidate telemetry, analytics, and response capabilities into a single operational environment. By bringing together security signals from across the infrastructure, they allow analysts to investigate incidents with a more complete understanding of what is happening within the environment.<\/p>\n<p>Unified platforms can help security teams:<\/p>\n<ul>\n<li>Correlate signals across multiple data sources <\/li>\n<li>Reduce investigation time by providing centralized context <\/li>\n<li>Improve detection accuracy by identifying patterns across systems <\/li>\n<li>Enable faster response to coordinated attacks<\/li>\n<\/ul>\n<p>This shift reflects a broader transformation in how SOC environments are designed. Rather than managing dozens of disconnected tools, organizations are increasingly prioritizing integrated security architectures.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"A_New_Phase_for_Security_Operations\"><\/span>A New Phase for Security Operations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Security operations are is moving into a new phase defined by intelligence, correlation, and operational integration.<\/p>\n<p>As cyber threats continue to evolve and digital environments become more complex, organizations must rethink how their SOC capabilities are structured.<\/p>\n<p>The future SOC will not be defined simply by the number of tools deployed, but by how effectively those tools work together to detect and respond to threats across the entire infrastructure.<\/p>\n<p>This transformation is already underway.<\/p>\n<p><strong><a href=\"https:\/\/www.newevol.io\/\">NewEvol<\/a> <\/strong>is emerging to support this new operational model, bringing unified visibility, advanced analytics, and coordinated response capabilities into a single security operations platform. With its recent expansion into major global markets, NewEvol aims to support organizations that are modernizing their SOC capabilities for the next phase of cybersecurity.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Final_Thoughts\"><\/span>Final Thoughts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The cybersecurity landscape has changed dramatically, and security operations must evolve with it.<\/p>\n<p>Fragmented tools, isolated alerts, and manual investigation workflows are increasingly insufficient for defending modern digital environments.<\/p>\n<p>To stay ahead of emerging threats, organizations must adopt new approaches that prioritize integrated visibility, contextual analysis, and coordinated response.<\/p>\n<p>The future of security operations will belong to platforms and architectures capable of bringing these capabilities together.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security operations has entered a period of fundamental transformation. Over the past decade, organizations have significantly expanded their security capabilities by deploying new tools across endpoints, networks, cloud environments, and identity systems. While these technologies have improved visibility into different parts of the infrastructure, they have also introduced a new operational challenge: fragmentation. Today, many&hellip; <a class=\"more-link\" href=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/\">Continue reading <span class=\"screen-reader-text\">Why the Future of Security Operations Demands a New Approach<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":2421,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,87,15],"tags":[],"class_list":["post-2420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyber-security","category-siem","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why the Future of Security Operations Needs a New Approach<\/title>\n<meta name=\"description\" content=\"Modern cyber threats are reshaping SOC operations. Discover why security operations need a new approach built on unified visibility, analytics, and response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why the Future of Security Operations Needs a New Approach\" \/>\n<meta property=\"og:description\" content=\"Modern cyber threats are reshaping SOC operations. Discover why security operations need a new approach built on unified visibility, analytics, and response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"NewEvol\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NewEvolPlatform\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-24T06:25:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T06:26:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/moder-soc.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krunal Medapara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@krunalpatel17\" \/>\n<meta name=\"twitter:site\" content=\"@NewEvolPlatform\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krunal Medapara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/\",\"name\":\"Why the Future of Security Operations Needs a New Approach\",\"isPartOf\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/moder-soc.jpg\",\"datePublished\":\"2026-03-24T06:25:56+00:00\",\"dateModified\":\"2026-03-24T06:26:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\"},\"description\":\"Modern cyber threats are reshaping SOC operations. Discover why security operations need a new approach built on unified visibility, analytics, and response.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#primaryimage\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/moder-soc.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/moder-soc.jpg\",\"width\":1920,\"height\":900,\"caption\":\"Security Operations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.newevol.io\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why the Future of Security Operations Demands a New Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\",\"url\":\"https:\/\/www.newevol.io\/resources\/\",\"name\":\"NewEvol\",\"description\":\"Innovation in Motion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.newevol.io\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\",\"name\":\"Krunal Medapara\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"caption\":\"Krunal Medapara\"},\"description\":\"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.\",\"sameAs\":[\"https:\/\/www.newevol.io\/\",\"https:\/\/x.com\/krunalpatel17\"],\"url\":\"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why the Future of Security Operations Needs a New Approach","description":"Modern cyber threats are reshaping SOC operations. Discover why security operations need a new approach built on unified visibility, analytics, and response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/","og_locale":"en_US","og_type":"article","og_title":"Why the Future of Security Operations Needs a New Approach","og_description":"Modern cyber threats are reshaping SOC operations. Discover why security operations need a new approach built on unified visibility, analytics, and response.","og_url":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/","og_site_name":"NewEvol","article_publisher":"https:\/\/www.facebook.com\/NewEvolPlatform\/","article_published_time":"2026-03-24T06:25:56+00:00","article_modified_time":"2026-03-24T06:26:03+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/moder-soc.jpg","type":"image\/jpeg"}],"author":"Krunal Medapara","twitter_card":"summary_large_image","twitter_creator":"@krunalpatel17","twitter_site":"@NewEvolPlatform","twitter_misc":{"Written by":"Krunal Medapara","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/","url":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/","name":"Why the Future of Security Operations Needs a New Approach","isPartOf":{"@id":"https:\/\/www.newevol.io\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#primaryimage"},"image":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/moder-soc.jpg","datePublished":"2026-03-24T06:25:56+00:00","dateModified":"2026-03-24T06:26:03+00:00","author":{"@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680"},"description":"Modern cyber threats are reshaping SOC operations. Discover why security operations need a new approach built on unified visibility, analytics, and response.","breadcrumb":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#primaryimage","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/moder-soc.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/moder-soc.jpg","width":1920,"height":900,"caption":"Security Operations"},{"@type":"BreadcrumbList","@id":"https:\/\/www.newevol.io\/resources\/blog\/why-security-operations-need-new-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.newevol.io\/resources\/"},{"@type":"ListItem","position":2,"name":"Why the Future of Security Operations Demands a New Approach"}]},{"@type":"WebSite","@id":"https:\/\/www.newevol.io\/resources\/#website","url":"https:\/\/www.newevol.io\/resources\/","name":"NewEvol","description":"Innovation in Motion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.newevol.io\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680","name":"Krunal Medapara","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","caption":"Krunal Medapara"},"description":"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.","sameAs":["https:\/\/www.newevol.io\/","https:\/\/x.com\/krunalpatel17"],"url":"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/"}]}},"_links":{"self":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/comments?post=2420"}],"version-history":[{"count":1,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2420\/revisions"}],"predecessor-version":[{"id":2422,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2420\/revisions\/2422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media\/2421"}],"wp:attachment":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media?parent=2420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/categories?post=2420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/tags?post=2420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}