{"id":3925,"date":"2022-11-02T14:29:28","date_gmt":"2022-11-02T14:29:28","guid":{"rendered":"https:\/\/sovratec.com\/?page_id=3925"},"modified":"2022-11-02T16:32:27","modified_gmt":"2022-11-02T16:32:27","slug":"managed-cybersecurity","status":"publish","type":"page","link":"https:\/\/sovratec.com\/?page_id=3925","title":{"rendered":"Managed Cybersecurity"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; css=&#8221;.vc_custom_1656514613413{margin-top: -100px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1667308613518{margin-top: 40px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1667400489956{margin-top: 10px !important;padding-top: 0px !important;padding-right: 20px !important;padding-bottom: 10px !important;padding-left: 20px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<\/p>\n<h2 style=\"color: #336299;\"><strong>Managed Cyber Security Services<\/strong><\/h2>\n<p style=\"color: black;\">Sovratec identifies, eliminates, and prevents security issues from the base of your infrastructure and provides secure solutions which will help to keep businesses up and running.<\/p>\n<h2 style=\"color: #336299;\"><strong>Our Managed Cyber Security Services Include :<\/strong><\/h2>\n<ul>\n<li style=\"color: black;\">Highlight any vulnerabilities in your existing assets and processes.<\/li>\n<li style=\"color: black;\">Assess and implement security controls and best practices.<\/li>\n<li style=\"color: black;\">Train your employees to spot and avoid cyber threats and risks.<\/li>\n<li style=\"color: black;\">Reduce the risk posed by threats like phishing, ransomware, data breaches, and other cyber threats.<\/li>\n<li style=\"color: black;\">Provide continuous knowledge-sharing content and elements to keep your employees up to date.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1667400610719{margin-top: 10px !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_single_image image=&#8221;3937&#8243; img_size=&#8221;large&#8221; style=&#8221;vc_box_rounded&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;fadeInRight&#8221; css=&#8221;.vc_custom_1667406722665{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #1e73be !important;border-right-color: #1e73be !important;border-top-color: #1e73be !important;border-bottom-color: #1e73be !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1667319841204{padding-top: 30px !important;}&#8221;][vc_column_text]<\/p>\n<h2 style=\"color: #336299;\"><strong>IT Security Infrastructure Assessment<\/strong><\/h2>\n<p style=\"color: black;\">Our comprehensive security evaluation identifies vulnerabilities in your present systems, technology, and other infrastructure to serve as the foundation for your customized action plan.<\/p>\n<ul>\n<li><strong>Network Device Security Review<\/strong><\/li>\n<li><strong>Vulnerability assessment and penetration testing<\/strong><\/li>\n<li><strong>Malware\/Ransomware Assessment<\/strong><\/li>\n<li><strong>OS Hardening &amp; Security Configuration Check<\/strong><\/li>\n<li><strong>Web Application Security Testing<\/strong><\/li>\n<li><strong>Infrastructure scan and testing on assets connected to your network. (Internal &amp; External).<\/strong><\/li>\n<li><strong>Firewall Configuration Security Review<\/strong><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1667401315473{padding-top: 50px !important;}&#8221;][vc_single_image image=&#8221;3931&#8243; img_size=&#8221;large&#8221; alignment=&#8221;right&#8221; style=&#8221;vc_box_rounded&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;fadeInRight&#8221; css=&#8221;.vc_custom_1667401289880{padding-top: 20px !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1667319599503{padding-top: 10px !important;}&#8221;][vc_single_image image=&#8221;3933&#8243; img_size=&#8221;large&#8221; alignment=&#8221;right&#8221; style=&#8221;vc_box_rounded&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;fadeInRight&#8221; css=&#8221;.vc_custom_1667401838436{padding-top: 20px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1667318771815{padding-top: 50px !important;}&#8221;][vc_column_text]<\/p>\n<h2 style=\"color: #336299;\"><strong>Social Engineering Assessment and Services<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1667401914496{padding-top: 20px !important;padding-left: 20px !important;}&#8221;]<\/p>\n<p style=\"color: black; text-align: left;\">Measuring the human failures and interactions via the simulation to conclude the risk level of the organization by conducting real-world testing and helping the users to identify the failing spots.<\/p>\n<ul>\n<li style=\"text-align: left;\"><strong>Phishing Simulation testing.<\/strong><\/li>\n<li style=\"text-align: left;\"><strong>User awareness content, graphical elements, and articles subscription.<\/strong><\/li>\n<\/ul>\n<p>&nbsp;[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1667319775950{padding-top: 30px !important;}&#8221;][vc_column_text]<\/p>\n<h2 style=\"color: #336299;\"><strong>Security Awareness Training &amp; Blogs<\/strong><\/h2>\n<p style=\"color: black;\">Help your employees to understand the importance of digital security and reduce the risk of cyber-attacks by training them with interactive sessions and real-world scenarios to recognize future threats which will lead them to take effective action to shield the organization.<\/p>\n<ul>\n<li>IT &amp; Cyber Security Computer-Based Training<\/li>\n<li>Educating end-users<\/li>\n<li>Assess user awareness outcomes<\/li>\n<li>Security content development<\/li>\n<li>Blogs and Articles.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1667402597340{margin-top: 40px !important;padding-top: 0px !important;padding-right: 20px !important;padding-bottom: 30px !important;padding-left: 20px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<\/p>\n<h3 style=\"color: #336299;\"><strong>Discover How Managed Cyber Security Services Can Enhance Your Business\u00c2\u00a0<\/strong><\/h3>\n<p>Our IT and Cyber security services provide various benefits in addition to safeguarding your operations from risk, including:[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1667319796440{padding-top: 30px !important;}&#8221;][vc_single_image image=&#8221;3942&#8243; img_size=&#8221;large&#8221; alignment=&#8221;right&#8221; style=&#8221;vc_box_rounded&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;fadeInRight&#8221; css=&#8221;.vc_custom_1667406685853{padding-top: 20px !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css_animation=&#8221;slideInRight&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1667404740708{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #1e73be !important;border-left-style: solid !important;border-right-color: #1e73be !important;border-right-style: solid !important;border-top-color: #1e73be !important;border-top-style: solid !important;border-bottom-color: #1e73be !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221; el_class=&#8221;serviceicon&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-business-time&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221;][vc_column_text css=&#8221;.vc_custom_1667404430957{padding-bottom: 10px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<\/p>\n<h4 style=\"color: #336299; text-align: center;\"><strong>Maintain Business Reputation<\/strong><\/h4>\n<p style=\"text-align: center;\">Data breaches can often hurt your business reputation and it may impact the trust of the organization and future business.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1667395196894{margin-right: 0px !important;margin-left: -10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #1e73be !important;border-left-style: solid !important;border-right-color: #1e73be !important;border-right-style: solid !important;border-top-color: #1e73be !important;border-top-style: solid !important;border-bottom-color: #1e73be !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221; el_class=&#8221;serviceicon&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-hand-holding-usd&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221;][vc_column_text css=&#8221;.vc_custom_1667404363419{padding-bottom: 10px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<\/p>\n<h4 style=\"color: #336299; text-align: center;\"><strong>Reduce Loss<\/strong><\/h4>\n<p style=\"text-align: center;\">An effective cybersecurity services save businesses an enormous amount of money and reduce losses.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1667396197510{margin-left: -20px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #1e73be !important;border-left-style: solid !important;border-right-color: #1e73be !important;border-right-style: solid !important;border-top-color: #1e73be !important;border-top-style: solid !important;border-bottom-color: #1e73be !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221; el_class=&#8221;serviceicon&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-user-lock&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221;][vc_column_text css=&#8221;.vc_custom_1667404561616{padding-bottom: 10px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<\/p>\n<h4 style=\"color: #336299; text-align: center;\"><strong>Prevent Future Threats<\/strong><\/h4>\n<p style=\"text-align: center;\">An effective cybersecurity service helps block cyber threats from ever getting through your organization&#8217;s IT systems.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1667404815787{padding-top: 20px !important;}&#8221;][vc_column css_animation=&#8221;slideInRight&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1667404740708{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #1e73be !important;border-left-style: solid !important;border-right-color: #1e73be !important;border-right-style: solid !important;border-top-color: #1e73be !important;border-top-style: solid !important;border-bottom-color: #1e73be !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221; el_class=&#8221;serviceicon&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-users&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221;][vc_column_text css=&#8221;.vc_custom_1667405171902{padding-bottom: 10px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<\/p>\n<h4 style=\"color: #336299; text-align: center;\"><strong>Uninterrupted Productivity<\/strong><\/h4>\n<p style=\"text-align: center;\">Security incidents frequently cause downtime, which results in lost productivity while your systems are unavailable. When these situations are avoided proactively, enhanced availability leads to improved performance and uninterrupted productivity.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1667395196894{margin-right: 0px !important;margin-left: -10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #1e73be !important;border-left-style: solid !important;border-right-color: #1e73be !important;border-right-style: solid !important;border-top-color: #1e73be !important;border-top-style: solid !important;border-bottom-color: #1e73be !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221; el_class=&#8221;serviceicon&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-database&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221;][vc_column_text css=&#8221;.vc_custom_1667405411645{padding-bottom: 10px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<\/p>\n<h4 style=\"color: #336299; text-align: center;\"><strong>Prevent Data Loss<\/strong><\/h4>\n<p style=\"text-align: center;\">Data and analytics are the core of your products and marketing strategy. Losing it, in any case, can be the worst-case scenario you can ever imagine. So, to maintain agreement with data security regulations, organizations must keep track of all their information.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1667396197510{margin-left: -20px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #1e73be !important;border-left-style: solid !important;border-right-color: #1e73be !important;border-right-style: solid !important;border-top-color: #1e73be !important;border-top-style: solid !important;border-bottom-color: #1e73be !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221; el_class=&#8221;serviceicon&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-user-secret&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221;][vc_column_text css=&#8221;.vc_custom_1667405703085{padding-bottom: 10px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]<\/p>\n<h4 style=\"color: #336299; text-align: center;\"><strong>Latest Security Measures<\/strong><\/h4>\n<p style=\"text-align: center;\">Predictive and blocking cybersecurity measures aren&#8217;t enough defenses as cybercriminals are getting more creative and effective each day. The latest security controls offer you the most up-to-date security methods to protect your IT environment from dangers.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator color=&#8221;black&#8221; border_width=&#8221;2&#8243; css=&#8221;.vc_custom_1667395825494{padding-top: 100px !important;}&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; css=&#8221;.vc_custom_1656514613413{margin-top: -100px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1667308613518{margin-top: 40px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1667400489956{margin-top: 10px !important;padding-top: 0px !important;padding-right: 20px !important;padding-bottom: 10px !important;padding-left: 20px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;] Managed Cyber Security Services Sovratec identifies, eliminates, and prevents security issues from the base of your infrastructure and provides secure solutions which will help to keep [&hellip;]<\/p>\n","protected":false},"author":990015,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":"","footnotes":""},"class_list":["post-3925","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managed Cybersecurity - Sovratec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sovratec.com\/?page_id=3925\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Cybersecurity - Sovratec\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; css=&#8221;.vc_custom_1656514613413{margin-top: -100px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1667308613518{margin-top: 40px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1667400489956{margin-top: 10px !important;padding-top: 0px !important;padding-right: 20px !important;padding-bottom: 10px !important;padding-left: 20px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;] Managed Cyber Security Services Sovratec identifies, eliminates, and prevents security issues from the base of your infrastructure and provides secure solutions which will help to keep [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sovratec.com\/?page_id=3925\" \/>\n<meta property=\"og:site_name\" content=\"Sovratec\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-02T16:32:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sovratec.com\/#website\",\"url\":\"https:\/\/sovratec.com\/\",\"name\":\"Sovratec\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sovratec.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sovratec.com\/?page_id=3925#webpage\",\"url\":\"https:\/\/sovratec.com\/?page_id=3925\",\"name\":\"Managed Cybersecurity - Sovratec\",\"isPartOf\":{\"@id\":\"https:\/\/sovratec.com\/#website\"},\"datePublished\":\"2022-11-02T14:29:28+00:00\",\"dateModified\":\"2022-11-02T16:32:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sovratec.com\/?page_id=3925#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sovratec.com\/?page_id=3925\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sovratec.com\/?page_id=3925#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sovratec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managed Cybersecurity\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed Cybersecurity - Sovratec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sovratec.com\/?page_id=3925","og_locale":"en_US","og_type":"article","og_title":"Managed Cybersecurity - Sovratec","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; css=&#8221;.vc_custom_1656514613413{margin-top: -100px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1667308613518{margin-top: 40px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1667400489956{margin-top: 10px !important;padding-top: 0px !important;padding-right: 20px !important;padding-bottom: 10px !important;padding-left: 20px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;] Managed Cyber Security Services Sovratec identifies, eliminates, and prevents security issues from the base of your infrastructure and provides secure solutions which will help to keep [&hellip;]","og_url":"https:\/\/sovratec.com\/?page_id=3925","og_site_name":"Sovratec","article_modified_time":"2022-11-02T16:32:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/sovratec.com\/#website","url":"https:\/\/sovratec.com\/","name":"Sovratec","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sovratec.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sovratec.com\/?page_id=3925#webpage","url":"https:\/\/sovratec.com\/?page_id=3925","name":"Managed Cybersecurity - Sovratec","isPartOf":{"@id":"https:\/\/sovratec.com\/#website"},"datePublished":"2022-11-02T14:29:28+00:00","dateModified":"2022-11-02T16:32:27+00:00","breadcrumb":{"@id":"https:\/\/sovratec.com\/?page_id=3925#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sovratec.com\/?page_id=3925"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sovratec.com\/?page_id=3925#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sovratec.com\/"},{"@type":"ListItem","position":2,"name":"Managed Cybersecurity"}]}]}},"_links":{"self":[{"href":"https:\/\/sovratec.com\/index.php?rest_route=\/wp\/v2\/pages\/3925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sovratec.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sovratec.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sovratec.com\/index.php?rest_route=\/wp\/v2\/users\/990015"}],"replies":[{"embeddable":true,"href":"https:\/\/sovratec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3925"}],"version-history":[{"count":12,"href":"https:\/\/sovratec.com\/index.php?rest_route=\/wp\/v2\/pages\/3925\/revisions"}],"predecessor-version":[{"id":3943,"href":"https:\/\/sovratec.com\/index.php?rest_route=\/wp\/v2\/pages\/3925\/revisions\/3943"}],"wp:attachment":[{"href":"https:\/\/sovratec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}