{"id":1147,"date":"2021-01-14T09:01:11","date_gmt":"2021-01-14T09:01:11","guid":{"rendered":"https:\/\/cyse.sermicro.com\/?page_id=1147"},"modified":"2023-02-13T09:09:13","modified_gmt":"2023-02-13T09:09:13","slug":"cyse","status":"publish","type":"page","link":"https:\/\/cyse.sermicro.com\/en\/","title":{"rendered":"Cyse"},"content":{"rendered":"<p>[vc_section el_class=&#8221;box_cyse&#8221;][vc_row el_class=&#8221;box_cyse_child&#8221;][vc_column el_class=&#8221;title_sobre_cyse&#8221;][vc_raw_html]JTNDaDIlMjBpZCUzRCUyMnNvYnJlLWN5c2UlMjIlMjBjbGFzcyUzRCUyMnRpdGxlJTIyJTNFQWJvdXQlMjBDWVNFJTNDJTJGaDIlM0U=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8221;box_cyse_child&#8221;][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1611570139023{margin-top: 25px !important;margin-bottom: 5px !important;}&#8221; el_id=&#8221;line_Right&#8221;][vc_single_image image=&#8221;595&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221;][vc_empty_space][vc_custom_heading text=&#8221;Who are we?&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; google_fonts=&#8221;font_family:Chivo%3Aregular%2Citalic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;][vc_empty_space][vc_column_text]<strong>CYSE<\/strong> is <strong>Sermicro Group<\/strong> Cybersecurity area that centralizes a long experience in managing the information systems security, the latest technologies and tools for their development and implementation and a highly specialized team.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1611570160723{margin-top: 25px !important;margin-bottom: 5px !important;}&#8221;][vc_single_image image=&#8221;591&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221;][vc_empty_space][vc_custom_heading text=&#8221;What is our mission?&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; google_fonts=&#8221;font_family:Chivo%3Aregular%2Citalic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;][vc_empty_space][vc_column_text]Offering the<strong> highest quality and performance<\/strong> to our clients by providing them with <strong>quick access to the best IT Security technologies<\/strong>, adapting to any type of company, at any time and in any environment.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607697640933{margin-top: 15px !important;margin-right: 15px !important;margin-bottom: 5px !important;margin-left: 15px !important;padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;}&#8221; el_class=&#8221;phone_sobre_cyse&#8221;][vc_single_image image=&#8221;585&#8243; img_size=&#8221;large&#8221; alignment=&#8221;right&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;box_cyse_child&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;587&#8243; img_size=&#8221;full&#8221; el_class=&#8221;computer_sobre_cyse&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_id=&#8221;line_left&#8221;][vc_single_image image=&#8221;589&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221;][vc_empty_space][vc_custom_heading text=&#8221;What is our strategy?&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; google_fonts=&#8221;font_family:Chivo%3Aregular%2Citalic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;][vc_empty_space][vc_column_text]<strong>Simplifying access to security technologies<\/strong>, aligning quality with the cost of services to minimize customer investments. A multi-technology company that is the best partner in security.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;593&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221;][vc_empty_space][vc_custom_heading text=&#8221;What can we do?&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; google_fonts=&#8221;font_family:Chivo%3Aregular%2Citalic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;][vc_empty_space][vc_column_text]<strong>Providing innovative services with a high added value<\/strong>, managing security through people, processes, infrastructure and technology with the aim of controlling, knowing and minimizing a possible attack on the organization.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;box_cyse_child&#8221;][vc_column el_class=&#8221;video_cyse_box&#8221;][vc_raw_html]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[\/vc_raw_html][vc_empty_space height=&#8221;100px&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column][vc_raw_html]JTNDaDIlMjBpZCUzRCUyMnNlcnZpY2lvcyUyMiUyMGNsYXNzJTNEJTIydGl0bGUlMjIlM0VTZXJ2aWNlcyUzQyUyRmgyJTNF[\/vc_raw_html][vc_empty_space height=&#8221;50px&#8221;][vc_text_separator title=&#8221;MANAGED SECURITY BASED ON A SOC&#8221; color=&#8221;custom&#8221; accent_color=&#8221;#347fd4&#8243; el_id=&#8221;titulo_soc&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">The <strong>Managed Security Service<\/strong> allows the client to delegate to us the operation of the different security solutions available, being able to monitor and manage their devices, responding immediately to any threat or incident that may occur. This <strong>saves costs<\/strong> and guarantees the availability of evolutionary maintenance and improvement of the mechanisms that make up and sustain a company&#8217;s cybersecurity.<\/p>\n<p style=\"text-align: center;\">CYSE offers this service at<strong> an international level<\/strong>, with sufficient capacity for centralised or local management.<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;section_cyse_soc&#8221;][vc_single_image image=&#8221;1659&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;img_soc&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row el_class=&#8221;section__user&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_raw_html][\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;line_vertical_user&#8221;][vc_raw_html]JTNDaDQlMjBjbGFzcyUzRCUyMnB1ZXN0b191c2VyJTIyJTNFV09SS1BMQUNFJTNDJTJGaDQlM0U=[\/vc_raw_html][vc_tta_accordion shape=&#8221;square&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Protection of the End Point.&#8221; tab_id=&#8221;1606987907697-6f75889c-5986&#8243; el_class=&#8221;according__user&#8221;][vc_column_text el_id=&#8221;1606987907697-6f75889c-5986&#8243;]Prevents <strong>the accidental or intentional dissemination<\/strong> of any information or data outside the organization, defending<br \/>\nany type of attack whose destination is the user&#8217;s workstation.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Awareness and Training in Cybersecurity.&#8221; tab_id=&#8221;1606987907761-2abf5c49-f85a&#8221;][vc_column_text el_id=&#8221;1606987907761-2abf5c49-f85a&#8221;]<strong>Online training platform<\/strong> for cybersecurity awareness, with effective learning techniques, module assignment, monitoring and measurement of results. <strong>The employee will become part of the solution and not part of the problem.<\/strong>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row el_class=&#8221;section__red&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;line_vertical_user&#8221;][vc_raw_html]JTNDaDQlMjBjbGFzcyUzRCUyMmVudG9ybm9fcmVkJTIyJTNFJTIwTkVUV09SSyUyMEVOVklST05NRU5UJTNDJTJGaDQlM0U=[\/vc_raw_html][vc_tta_accordion shape=&#8221;square&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Enterprise Firewall \/ UTM Firewall&#8221; tab_id=&#8221;1606993871610-70615069-267b&#8221; el_class=&#8221;according__user&#8221;][vc_column_text]<strong>Consultancy to adapt the best solution for our clients<\/strong>. Solutions for companies with IT or OT systems and traffic. Implementation, support\/management and maintenance.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Protection against DDoS&#8221; tab_id=&#8221;1606993871778-74fb6213-d51f&#8221;][vc_column_text]Cloud platform <strong>capable of stopping any type of attack against web services<\/strong>, including DDoS attacks, guaranteeing availability and reinforcing security at the network perimeter.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;NAC&#8221; tab_id=&#8221;1607009088944-2bb38d1e-bebd&#8221;][vc_column_text el_id=&#8221;1607009088944-2bb38d1e-bebd&#8221;]Solution that allows to know if the devices and systems that try to access a network or are already connected, <strong>comply with all the<\/strong><br \/>\n<strong>established security needs.<\/strong>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;E-mail Security&#8221; tab_id=&#8221;1607009172174-ac6ea867-9b26&#8243;][vc_column_text el_id=&#8221;1607009172174-ac6ea867-9b26&#8243;]<strong>Integrated e-mail and security solution<\/strong>, combined in a single ready-to-use virtual appliance. It offers state-of-the-art email protection against both known and unknown threats.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Secure Remote Access&#8221; tab_id=&#8221;1607009255388-60f7aa3c-3c3a&#8221;][vc_column_text el_id=&#8221;1607009255388-60f7aa3c-3c3a&#8221;]Ensures the balance between <strong>network security and quick and simple access<\/strong> to applications.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Network Traffic Analysis&#8221; tab_id=&#8221;1607009306571-28c341db-4510&#8243;][vc_column_text el_id=&#8221;1607009306571-28c341db-4510&#8243;]Detection of vulnerabilities in real time,<strong> transversal and non-intrusive<\/strong>, with <strong>great simplicity and scalability<\/strong>, providing complete visibility of any type of device.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Vulnerability Analysis and Pen Testing&#8221; tab_id=&#8221;1607009378779-de2ef7ec-fa9a&#8221;][vc_column_text el_id=&#8221;1607009378779-de2ef7ec-fa9a&#8221;]Active analysis of the systems and communications<strong> to evaluate their level of security<\/strong> and recommend possible actions on them.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;PAM (Privileged Account Management)&#8221; tab_id=&#8221;1611569514285-9c27cf6a-ae4d&#8221;][vc_column_text el_id=&#8221;1611569514285-9c27cf6a-ae4d&#8221;]Privileged access is used to manage IT infrastructure equipment, applications and data.\u00a0 PAM allows you to manage, control, monitor and track privileged access, which is critical to responding to threats to your IT infrastructure.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;SASE (Secure Access Service Edge)&#8221; tab_id=&#8221;1611569515975-390c2c55-76d9&#8243;][vc_column_text el_id=&#8221;1611569515975-390c2c55-76d9&#8243;]Convergence of cloud capabilities: CASB, DLP, SWG, SSL Inspection, ATP, ZTNA and SD-WAN that redefines the network perimeter as a functionality rather than a physical location for protecting corporate resources wherever they reside, and users wherever they work[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row el_class=&#8221;section__dato&#8221;][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;line_vertical_user&#8221;][vc_raw_html]JTNDaDQlMjBjbGFzcyUzRCUyMmRhdG9fY3lzZSUyMiUzRURBVEElM0MlMkZoNCUzRQ==[\/vc_raw_html][vc_tta_accordion shape=&#8221;square&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221; el_class=&#8221;section_dato_cyse&#8221;][vc_tta_section title=&#8221;Corporate Encryption&#8221; tab_id=&#8221;1606993980973-7ec72db5-8c4c&#8221; el_class=&#8221;according__user&#8221;][vc_column_text]Encryption, access controls and data access logging are <strong>basic requirements and recommended best practices<\/strong> for almost all data privacy and compliance standards and mandates.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;IRM (Information Risk Management)&#8221; tab_id=&#8221;1606993981087-a94a0247-5204&#8243;][vc_column_text]It avoids up to 90% of hacking or internal information flow, <strong>monitoring the activity of the documents<\/strong> once they have left the local network or infrastructure.[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;siem_box&#8221;][vc_row][vc_column][vc_text_separator title=&#8221;INFORMATION SYSTEMS (SIEM)&#8221; el_id=&#8221;titulo_soc&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">It allows information to be gathered from IT systems to generate knowledge through the <strong>correlation of captured<\/strong><br \/>\n<strong>events<\/strong>, enabling total visibility of security in Information Systems, resulting in a basic tool for <strong>monitoring and managing events, detecting threats <\/strong>and mitigating attacks.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lX3VwJTIyJTNFJTNDJTJGZGl2JTNF[\/vc_raw_html][vc_empty_space height=&#8221;70px&#8221;][vc_raw_html]JTNDaDIlMjBpZCUzRCUyMnBhcnRuZXJzJTIyJTIwY2xhc3MlM0QlMjJ0aXRsZSUyMiUzRSUyMFBhcnRuZXJzJTIwJTNDJTJGaDIlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Sermicro Group has extensive experience in <strong>Installation, Configuration and Managed Services Projects<\/strong>, in alliance with the main partners<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;100px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html el_id=&#8221;nube69&#8243; el_class=&#8221;nube item-inside&#8221;]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[\/vc_raw_html][vc_row_inner][vc_column_inner][vc_empty_space height=&#8221;100px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section css=&#8221;.vc_custom_1606130046630{background-color: #00489b !important;}&#8221;][vc_row][vc_column][vc_raw_html]JTNDaDIlMjBpZCUzRCUyMmNvbnRhY3RvJTIyJTIwY2xhc3MlM0QlMjJ0aXRsZS13aGl0ZSUyMiUzRSUyMENvbnRhY3QlMjAlM0MlMkZoMiUzRQ==[\/vc_raw_html][vc_column_text el_class=&#8221;direction&#8221;]<\/p>\n<div class=\"address\">\n<p>Calle Pradillo, 50 Madrid<br \/>\nPhone: 917 44 86 00<br \/>\nEmail: marketing@sermicro.com<\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243; el_id=&#8221;form_contact&#8221;][vc_empty_space height=&#8221;45px&#8221;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1162-o1\" lang=\"es-ES\" dir=\"ltr\" data-wpcf7-id=\"1162\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/1147#wpcf7-f1162-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formulario de contacto\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1162\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_ES\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1162-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"wpcf7-turnstile cf-turnstile\" data-sitekey=\"0x4AAAAAAChe_co0S2RkP8Mw\" data-response-field-name=\"_wpcf7_turnstile_response\"><\/div>\n\n<p><label> Name*<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> Company*<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-company\" \/><\/span> <\/label>\n<\/p>\n<p><label> Location*<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-city\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-city\" \/><\/span> <\/label>\n<\/p>\n<p><label> Sector<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-sector\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-sector\" \/><\/span> <\/label>\n<\/p>\n<p><label> Telephone<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"your-phone\" \/><\/span> <\/label>\n<\/p>\n<p><label> E-mail *<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> Message (opcional)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-494\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><input type=\"checkbox\" name=\"acceptance-494\" value=\"1\" aria-invalid=\"false\" \/><\/span><\/span><\/span> I have read and accept the conditions of use and privacy policy<br \/>\n<\/label><br \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;597&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_section el_class=&#8221;box_cyse&#8221;][vc_row el_class=&#8221;box_cyse_child&#8221;][vc_column el_class=&#8221;title_sobre_cyse&#8221;][vc_raw_html]JTNDaDIlMjBpZCUzRCUyMnNvYnJlLWN5c2UlMjIlMjBjbGFzcyUzRCUyMnRpdGxlJTIyJTNFQWJvdXQlMjBDWVNFJTNDJTJGaDIlM0U=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8221;box_cyse_child&#8221;][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1611570139023{margin-top: 25px !important;margin-bottom: 5px !important;}&#8221; el_id=&#8221;line_Right&#8221;][vc_single_image image=&#8221;595&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221;][vc_empty_space][vc_custom_heading text=&#8221;Who are we?&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; google_fonts=&#8221;font_family:Chivo%3Aregular%2Citalic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;][vc_empty_space][vc_column_text]CYSE is Sermicro Group Cybersecurity area that centralizes a long experience in managing the information systems security, the latest technologies and tools for their development and implementation and a highly specialized team.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1611570160723{margin-top: 25px !important;margin-bottom: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1147","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyse.sermicro.com\/en\/wp-json\/wp\/v2\/pages\/1147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyse.sermicro.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyse.sermicro.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyse.sermicro.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyse.sermicro.com\/en\/wp-json\/wp\/v2\/comments?post=1147"}],"version-history":[{"count":6,"href":"https:\/\/cyse.sermicro.com\/en\/wp-json\/wp\/v2\/pages\/1147\/revisions"}],"predecessor-version":[{"id":1846,"href":"https:\/\/cyse.sermicro.com\/en\/wp-json\/wp\/v2\/pages\/1147\/revisions\/1846"}],"wp:attachment":[{"href":"https:\/\/cyse.sermicro.com\/en\/wp-json\/wp\/v2\/media?parent=1147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}