{"id":625,"date":"2024-07-01T12:28:50","date_gmt":"2024-07-01T12:28:50","guid":{"rendered":"https:\/\/consultedge.global\/insights\/?p=625"},"modified":"2025-03-05T11:01:20","modified_gmt":"2025-03-05T11:01:20","slug":"cloud-workload-protection-platforms-cwpp-a-growing-market-in-a-dynamic-landscape","status":"publish","type":"post","link":"https:\/\/www.consultedge.global\/insights\/cloud-workload-protection-platforms-cwpp-a-growing-market-in-a-dynamic-landscape\/","title":{"rendered":"Cloud Workload Protection Platforms (CWPP)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"625\" class=\"elementor elementor-625\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e2d072 e-flex e-con-boxed e-con e-parent\" data-id=\"7e2d072\" data-element_type=\"container\" data-settings=\"{&quot;container_type&quot;:&quot;flex&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4693908 elementor-widget elementor-widget-heading\" data-id=\"4693908\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Cloud Workload Protection Platforms Cwpp a Growing Market in a Dynamic Landscape<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2537297d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2537297d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-386dc23e\" data-id=\"386dc23e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-74733b38 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74733b38\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-14e97a36\" data-id=\"14e97a36\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-71a6f50b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71a6f50b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1dd7c94e\" data-id=\"1dd7c94e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-510cac3 elementor-widget elementor-widget-image\" data-id=\"510cac3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"445\" src=\"https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-626\" alt=\"Cloud Workload Protection Platforms\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d94061 elementor-widget elementor-widget-text-editor\" data-id=\"1d94061\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">The digital landscape is witnessing an unprecedented surge in cloud adoption. Businesses are increasingly migrating their workloads to the cloud environment, attracted by its scalability, agility, and cost-effectiveness. However, this shift also introduces new security challenges. Traditional security solutions often struggle to keep pace with the dynamic and distributed nature of cloud infrastructure.<\/span><\/p><p><span style=\"font-weight: 400;\">This is where Cloud Workload Protection Platforms (CWPP) come into play. <strong>CWPPs have emerged as a critical security layer for organizations leveraging the cloud.<\/strong> This article delves into the world of CWPPs, exploring their functionalities, market growth, and the factors driving their increasing adoption.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a72b5e elementor-widget elementor-widget-text-editor\" data-id=\"3a72b5e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A Cloud Workload Protection Platform (CWPP) is a unified security solution specifically designed to safeguard workloads in the cloud. CWPPs offer a comprehensive suite of features, including:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vulnerability Scanning:<\/b><span style=\"font-weight: 400;\"> CWPPs continuously scan cloud workloads to identify security vulnerabilities in applications, operating systems, and containers.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Threat Detection and Prevention:<\/b><span style=\"font-weight: 400;\"> These platforms utilize advanced threat detection technologies like machine learning and behavioral analysis to identify and prevent malicious activity targeting cloud workloads.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Workload Hardening:<\/b><span style=\"font-weight: 400;\"> CWPPs can automatically configure security settings and implement best practices to harden cloud workloads, making them less susceptible to attacks.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Runtime Protection:<\/b><span style=\"font-weight: 400;\"> CWPPs offer runtime protection to monitor workloads for suspicious activity and prevent attacks during the execution phase.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance Management:<\/b><span style=\"font-weight: 400;\"> Many CWPPs help organizations comply with industry regulations and data privacy standards by ensuring proper data handling and access control in the cloud.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Workload Identity Management:<\/b><span style=\"font-weight: 400;\"> CWPPs can integrate with identity and access management (IAM) systems to control access to cloud workloads, ensuring only authorized users have access to sensitive data and applications.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab160fa elementor-widget elementor-widget-text-editor\" data-id=\"ab160fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The CWPP market is experiencing tremendous growth, fueled by several key factors:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Increasing Cloud Adoption:<\/b><span style=\"font-weight: 400;\"> As more businesses move their workloads to the cloud, the demand for robust cloud security solutions rises proportionately.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Shifting Threat Landscape:<\/b><span style=\"font-weight: 400;\"> Cloud environments are increasingly targeted by sophisticated cyberattacks. Traditional security solutions are often inadequate to address these evolving threats.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data Security Concerns:<\/b><span style=\"font-weight: 400;\"> Data security and privacy are paramount concerns for organizations. CWPPs help ensure that sensitive data in the cloud is protected from unauthorized access or breaches.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regulatory Compliance Requirements:<\/b><span style=\"font-weight: 400;\"> Complying with industry regulations and data privacy laws like GDPR and CCPA is becoming increasingly complex. CWPPs can simplify compliance by facilitating secure data handling practices in the cloud.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Benefits Beyond Security:<\/b><span style=\"font-weight: 400;\"> CWPPs offer additional benefits beyond security, including improved operational efficiency, streamlined workload management, and enhanced visibility into cloud environments.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1edf9c elementor-widget elementor-widget-text-editor\" data-id=\"f1edf9c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The CWPP market is becoming increasingly competitive, with established players like CrowdStrike, MacAfee, Palo Alto Networks, and Microsoft vying for market share. However, a growing number of niche players are also emerging, offering specialized solutions for specific cloud environments or industries.<\/span><\/p><p><span style=\"font-weight: 400;\">Several key trends are shaping the future of the CWPP market:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Integration with Cloud Service Providers (CSPs):<\/b><span style=\"font-weight: 400;\"> We can expect deeper integration between CWPPs and leading cloud service providers like AWS, Azure, and Google Cloud Platform (GCP).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Focus on Artificial Intelligence (AI) and Machine Learning (ML):<\/b><span style=\"font-weight: 400;\"> AI and ML will play a more prominent role in CWPPs, enabling more sophisticated threat detection and automated response capabilities.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Expanded functionalities:<\/b><span style=\"font-weight: 400;\"> The functionalities of CWPPs will continue to evolve, potentially encompassing areas like workload orchestration, container security, and serverless security.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-c9cff48 e-flex e-con-boxed e-con e-parent\" data-id=\"c9cff48\" data-element_type=\"container\" data-settings=\"{&quot;container_type&quot;:&quot;flex&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed63b96 elementor-widget elementor-widget-image\" data-id=\"ed63b96\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1366\" height=\"768\" src=\"https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/02\/Untitled-design-45.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-414\" alt=\"password-protection\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47fc296 elementor-widget elementor-widget-text-editor\" data-id=\"47fc296\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">As cloud adoption continues its meteoric rise, the need for robust cloud workload protection will become even more critical. CWPPs are well-positioned to play a central role in securing the evolving cloud landscape. <strong>Organizations seeking to leverage the benefits of the cloud must prioritize secure migration and ongoing protection of their workloads by implementing robust CWPP solutions.<\/strong><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c08f166 elementor-widget elementor-widget-text-editor\" data-id=\"c08f166\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Disclaimer:<\/strong> This information is for general awareness purposes. Consult with qualified IT professionals for tailored solutions to protect your business.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CWPPs have emerged as a critical security layer for organizations leveraging the cloud. This article delves into the world of CWPPs, exploring their functionalities, market growth, and the factors driving their increasing adoption.<\/p>\n","protected":false},"author":1,"featured_media":626,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,107,1,100],"tags":[141,135,117,149,64,69,128,138,130,127,123,134,129,118,116,90,145,147,148,133,37,121,142,119,144,139,124,150,132,115,136,143,126,137,146,140,125,122,120,131],"class_list":["post-625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cloud-computing","category-insights","category-technology","tag-access-control","tag-business-continuity","tag-business-email-security","tag-ccpa-compliance","tag-cloud-security","tag-cyber-security","tag-cybersecurity-awareness","tag-cybersecurity-best-practices","tag-dark-web-monitoring","tag-data-breaches","tag-data-security","tag-disaster-recovery","tag-email-filtering","tag-email-threats","tag-employee-training","tag-encryption","tag-endpoint-security","tag-gdpr-compliance","tag-hipaa-compliance","tag-incident-response","tag-it-security","tag-malware","tag-mobile-security","tag-multi-factor-authentication","tag-network-security","tag-password-hygiene","tag-password-management","tag-pci-dss-compliance","tag-penetration-testing","tag-phishing-scams","tag-phishing-simulation","tag-physical-security","tag-ransomware","tag-security-awareness-training","tag-security-culture","tag-security-policies","tag-social-engineering","tag-spoofing","tag-strong-passwords","tag-vulnerability-assessment"],"rttpg_featured_image_url":{"full":["https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1.jpg",800,445,false],"landscape":["https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1.jpg",800,445,false],"portraits":["https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1.jpg",800,445,false],"thumbnail":["https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1-300x167.jpg",300,167,true],"large":["https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1.jpg",800,445,false],"1536x1536":["https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1.jpg",800,445,false],"2048x2048":["https:\/\/www.consultedge.global\/insights\/wp-content\/uploads\/2024\/07\/Best-Cloud-Workload-Protection-Platforms-1.jpg",800,445,false]},"rttpg_author":{"display_name":"CEAdmin","author_link":"https:\/\/www.consultedge.global\/insights\/author\/consultedgeadmin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.consultedge.global\/insights\/category\/insights\/blog\/\" rel=\"category tag\">Blog<\/a> <a href=\"https:\/\/www.consultedge.global\/insights\/category\/industry-trends\/technology\/cloud-computing\/\" rel=\"category tag\">Cloud Computing<\/a> <a href=\"https:\/\/www.consultedge.global\/insights\/category\/insights\/\" rel=\"category tag\">Insights<\/a> <a href=\"https:\/\/www.consultedge.global\/insights\/category\/industry-trends\/technology\/\" rel=\"category tag\">Technology<\/a>","rttpg_excerpt":"CWPPs have emerged as a critical security layer for organizations leveraging the cloud. This article delves into the world of CWPPs, exploring their functionalities, market growth, and the factors driving their increasing adoption.","_links":{"self":[{"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/posts\/625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/comments?post=625"}],"version-history":[{"count":3,"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/posts\/625\/revisions"}],"predecessor-version":[{"id":14137,"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/posts\/625\/revisions\/14137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/media\/626"}],"wp:attachment":[{"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/media?parent=625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/categories?post=625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.consultedge.global\/insights\/wp-json\/wp\/v2\/tags?post=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}