{"id":925,"date":"2021-01-14T01:17:17","date_gmt":"2021-01-14T01:17:17","guid":{"rendered":"http:\/\/hkm-consulting.de\/produkt\/"},"modified":"2024-08-25T15:46:59","modified_gmt":"2024-08-25T15:46:59","slug":"protection_of_intellectual_property","status":"publish","type":"page","link":"https:\/\/hkm-consulting.de\/en\/protection_of_intellectual_property\/","title":{"rendered":"Protection of intellectual property (C2C, EIM &#038; DLP)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h3>Products &amp; services for intellectual property protection<\/h3>\n<p>The highly scalable products and services for the protection of intellectual property interlock seamlessly. The realization of the implementation extends to on-premise, IoT and cloud, as well as hybrid solutions from these infrastructures.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_separator][vc_empty_space][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;5\/12&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Compliance to Code (C2C)<\/h3>\n<p>Monitoring the infrastructure and maintaining availability<\/p>\n<p>Compliance to Code &#8211; Key Features:[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-8009\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-8009 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">On-Premises and IoT agentless monitoring<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-3157\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-3157 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Monitoring for hundreds of remote networks, and \/ or just the local network<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-4525\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-4525 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Monitor Windows, Linux, Unix and network devices<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-6611\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-6611 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Ping, CPU, memory, disk, SNMP + traps, Event Logs, services, etc.<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1390\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1390 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">No scripts or configuration files required<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-5934\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-5934 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Web based reports and a native Windows GUI application<\/span><\/div><\/li><\/ul><\/div>[vc_btn title=&#8221;C2C product data sheets&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FCompliance-to-Code-Product-Capabilities.pdf|title:Product%20data%20sheets|target:_blank&#8221;][vc_btn title=&#8221;All product data sheets&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fen%2Fproduct_data_sheets|title:Product%20data%20sheets&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;2129&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_separator][vc_empty_space][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;2127&#8243; img_size=&#8221;large&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Enterprise Integrity Management (EIM)<\/h3>\n<p>Data integrity protection<\/p>\n<p>Key Features:[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-5150\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-5150 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Agend-based and agentless monitoring for On-Premises and IoT environments<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-2860\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-2860 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Real-time file and folder monitoring for access, manipulation and\/or permission changes<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-7686\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-7686 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Audit File Access<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1678\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1678 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Ransomware Protection<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-3915\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-3915 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Clearly structured, strait forward and simple policy definition for detection, notification and alerting<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-2005\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-2005 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Web based reports and a native Windows GUI application<\/span><\/div><\/li><\/ul><\/div>[vc_btn title=&#8221;EIM product data sheets&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FEnterprise-Integrity-Management-Product-Capabilities.pdf|title:Product%20data%20sheets|target:_blank&#8221;][vc_btn title=&#8221;All product data sheets&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fen%2Fproduct_data_sheets|title:Product%20data%20sheets&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_separator][vc_empty_space][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;5\/12&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Data Leakage Prevention (DLP)<\/h3>\n<p>Protection of confidentiality<\/p>\n<p>Key Features:[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-5496\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-5496 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Agent-based and agentless monitoring for On-Premises and IoT environments<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-9091\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-9091 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Centralized Management for Data Leakage Prevention und Data Leakage Protection<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-9627\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-9627 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Automatically block access for specific accounts<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-7858\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-7858 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Audit File Access<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-7051\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-7051 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Web based reports and a native Windows GUI application<\/span><\/div><\/li><\/ul><\/div>[vc_btn title=&#8221;DLP product data sheets&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FData-Leakage-Prevention-Product-Capabilities.pdf|title:Product%20data%20sheets|target:_blank&#8221;][vc_btn title=&#8221;All product data sheets&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fen%2Fproduct_data_sheets|title:Product%20data%20sheets&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;2125&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_separator][vc_empty_space][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Next-Generation SOC<\/h3>\n<p>Your requirements determine how your SOC &#8211; Security Operation Center is put together, configured and parameterised. Our integrations can be combined modularly for a Next-Generation SOC, but also optionally in such a way that they interact with the existing solutions of other manufacturers.<\/p>\n<p>You are also free to decide what your Next-Generation SOC looks like.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_btn title=&#8221;More about Next-Generation SOC&#8230;&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fen%2Fnext-generation-soc%2F|title:Next-Generation%20SOC&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Products &amp; services for intellectual property protection The highly scalable products and services for the protection of intellectual property interlock seamlessly. The realization of the implementation extends to on-premise, IoT and cloud, as well as hybrid solutions from these infrastructures.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_separator][vc_empty_space][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;5\/12&#8243;][vc_column_text css=&#8221;&#8221;] Compliance to Code (C2C) Monitoring the infrastructure and maintaining availability Compliance to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-925","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=925"}],"version-history":[{"count":51,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/925\/revisions"}],"predecessor-version":[{"id":3294,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/925\/revisions\/3294"}],"wp:attachment":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}