{"id":1502,"date":"2022-07-09T19:52:57","date_gmt":"2022-07-09T19:52:57","guid":{"rendered":"https:\/\/securitybytestech.com\/?page_id=1502"},"modified":"2022-07-10T18:28:38","modified_gmt":"2022-07-10T18:28:38","slug":"infraestructura-en-la-nube","status":"publish","type":"page","link":"https:\/\/securitybytestech.com\/en\/cloud-infrastructure\/","title":{"rendered":"Cloud Infrastructure"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1502\" class=\"elementor elementor-1502\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0b022a elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"f0b022a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1bcd7f0\" data-id=\"1bcd7f0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebe07a0 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"ebe07a0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cloud Infrastructure<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7380b90 elementor-hidden-tablet elementor-hidden-phone\" data-id=\"7380b90\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52e75784 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"52e75784\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-77f80f58\" data-id=\"77f80f58\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-491eb8d1 de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"491eb8d1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"543\" src=\"https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/padlock-symbol-for-computer-data-protection-system-1024x695.jpg\" class=\"attachment-large size-large wp-image-1783\" alt=\"Padlock symbol for computer data protection system\" srcset=\"https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/padlock-symbol-for-computer-data-protection-system-1024x695.jpg 1024w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/padlock-symbol-for-computer-data-protection-system-300x204.jpg 300w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/padlock-symbol-for-computer-data-protection-system-768x521.jpg 768w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/padlock-symbol-for-computer-data-protection-system-1536x1042.jpg 1536w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/padlock-symbol-for-computer-data-protection-system-18x12.jpg 18w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/padlock-symbol-for-computer-data-protection-system.jpg 2000w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-470ee086\" data-id=\"470ee086\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30875537 de_scroll_animation_no elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"30875537\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Maintain the availability, optimization, and security at all times.<\/strong><\/p><p>Most firms these days have preliminary executive buy-in to begin a cloud migration \u2014 to see whether it is all that it is cracked up to be. However, cloud adoption may be difficult and the path can be difficult \u2013 and without a defined objective, cloud initiatives can fall by the wayside; over budget and under-realized.<\/p><p>SBTL has made it our mission to not only understand why cloud projects fail, but also to prevent it from happening to our clients. We ensure you have a clear objective in mind, an executable strategy to get there, and a team backing you every step of the way by identifying the horsemen of a cloud adoption apocalypse.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8b6d9b de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"c8b6d9b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Get this solution now! <\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcc6e28 elementor-align-left elementor-mobile-align-justify de_scroll_animation_no elementor-invisible elementor-widget elementor-widget-button\" data-id=\"dcc6e28\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/securitybytestech.com\/en\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e8b1a2e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e8b1a2e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-7ed1285\" data-id=\"7ed1285\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-981da4b elementor-view-default elementor-position-top elementor-mobile-position-top de_scroll_animation_no elementor-widget elementor-widget-icon-box\" data-id=\"981da4b\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-headset\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSupport\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-3c05b55\" data-id=\"3c05b55\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-698314b elementor-view-default elementor-position-top elementor-mobile-position-top de_scroll_animation_no elementor-widget elementor-widget-icon-box\" data-id=\"698314b\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-justice\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGovernance\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-0433cc8\" data-id=\"0433cc8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc75d70 elementor-view-default elementor-position-top elementor-mobile-position-top de_scroll_animation_no elementor-widget elementor-widget-icon-box\" data-id=\"fc75d70\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPlanning\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-65dea8b\" data-id=\"65dea8b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0351031 elementor-view-default elementor-position-top elementor-mobile-position-top de_scroll_animation_no elementor-widget elementor-widget-icon-box\" data-id=\"0351031\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-star\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tExpertise\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-71148a2\" data-id=\"71148a2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09f182f elementor-view-default elementor-position-top elementor-mobile-position-top de_scroll_animation_no elementor-widget elementor-widget-icon-box\" data-id=\"09f182f\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-money-bill-wave\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCost optimization\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b1f0805 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"b1f0805\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c7e242f\" data-id=\"c7e242f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c1d6d8 de_scroll_animation_no elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4c1d6d8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whatever You Want to do in the Cloud, do it.<\/p><p>Our paradigm addresses the five most significant constraints on organizations when it comes to cloud migrations, freeing up your team and resources to focus on what matters most to your business.<\/p><p>\u00a0<\/p><p><strong>Planning<\/strong><\/p><ul><li>Framework for first adoption<\/li><li>Ongoing consultation, as well as adaptable architectural best practices<\/li><li>Design advice and planning for cloud infrastructure, networking, and other services.<\/li><\/ul><p>\u00a0<\/p><p><strong>Cost reduction<\/strong><\/p><ul><li>Continuous cost-cutting<\/li><li>Monitoring of resource utilization<\/li><li>Policy-level cost management<\/li><\/ul><p>\u00a0<\/p><p><strong>Expertise<\/strong><\/p><ul><li>ICT Solutions trained consultants are available 24 hours a day, seven days a week.<\/li><li>Through the Cloud Solution Provider Agreement, you may get direct Microsoft support.<\/li><li>Administration through the Internet<\/li><\/ul><p>\u00a0<\/p><p><strong>Security<\/strong><\/p><ul><li>We monitor your environment's security and respond to alarms.<\/li><li>We are constantly putting security advice into action.<\/li><li>We include policies to ensure the security of your team and new deployments.<\/li><\/ul><p>\u00a0<\/p><p><strong>Support for Operations<\/strong><\/p><ul><li>Ongoing demands for policy changes from users<\/li><li>Report on security enhancement recommendations on a quarterly basis.<\/li><li>Live documentation updates and structural modifications are ongoing.<\/li><\/ul><p>\u00a0<\/p><p><strong>Governance<\/strong><\/p><ul><li>We own and are accountable for governance policies.<\/li><li>Security Bytes Tech Centre deployment and monitoring, as well as Security Bytes and role-based access restrictions.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3340f22 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"3340f22\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Get this solution now! <\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8b4c08 elementor-align-left elementor-mobile-align-justify de_scroll_animation_no elementor-invisible elementor-widget elementor-widget-button\" data-id=\"c8b4c08\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/securitybytestech.com\/en\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f43794d\" data-id=\"f43794d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ffdaa1 de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"4ffdaa1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"682\" height=\"1024\" src=\"https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/application-developer-encrypting-cloud-storage-database-by-updating-network-algorithm-682x1024.jpg\" class=\"attachment-large size-large wp-image-1784\" alt=\"Application developer encrypting cloud storage database by updating network algorithm\" srcset=\"https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/application-developer-encrypting-cloud-storage-database-by-updating-network-algorithm-682x1024.jpg 682w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/application-developer-encrypting-cloud-storage-database-by-updating-network-algorithm-200x300.jpg 200w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/application-developer-encrypting-cloud-storage-database-by-updating-network-algorithm-768x1152.jpg 768w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/application-developer-encrypting-cloud-storage-database-by-updating-network-algorithm-1024x1536.jpg 1024w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/application-developer-encrypting-cloud-storage-database-by-updating-network-algorithm-8x12.jpg 8w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/application-developer-encrypting-cloud-storage-database-by-updating-network-algorithm.jpg 1333w\" sizes=\"(max-width: 682px) 100vw, 682px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Infraestructura en la nube Mantenga la disponibilidad, optimizaci\u00f3n y seguridad en todo momento. La mayor\u00eda de las empresas en estos d\u00edas tienen una aceptaci\u00f3n ejecutiva preliminar para comenzar una migraci\u00f3n a la nube, para ver si es todo lo que parece. Sin embargo, la adopci\u00f3n de la nube puede ser dif\u00edcil y el camino puede [&hellip;]<\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1502","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/1502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/comments?post=1502"}],"version-history":[{"count":16,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/1502\/revisions"}],"predecessor-version":[{"id":1787,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/1502\/revisions\/1787"}],"wp:attachment":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/media?parent=1502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}