{"id":287,"date":"2019-12-26T09:24:36","date_gmt":"2019-12-26T09:24:36","guid":{"rendered":"http:\/\/itis-adobe.bmg-ua.com\/?page_id=287"},"modified":"2021-04-26T16:53:12","modified_gmt":"2021-04-26T14:53:12","slug":"network-perimeter-protection","status":"publish","type":"page","link":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/","title":{"rendered":"Network perimeter protection"},"content":{"rendered":"\n\n\t<section class=\"lightBg\">\n        <div class=\"container\">\n            <div class=\"blocks project_inside\">\n                <div class=\"content_solution\">\n                    <div class=\"center\"><h1>Network perimeter protection<\/h1><\/div>\n\t\t\t\t\t<p>Methods and tools to protect the network and the devices connected to it against any unauthorised access, misuse, or modification.&nbsp;<\/p>\n<p>Network security is achieved by solving the following problems:<br>\n<\/p><ul class=\"type1\"><li>protection against unauthorised access, by filtering network packets according to specified rules;<\/li><li>division of the network into segments based on information access restriction level;<\/li><li>detection of deliberate unauthorised access from external networks, including the Internet;<\/li><li>traffic analysis, including anomalies encountered;<\/li><li>investigation of information security incidents.<\/li><\/ul>\n\n\t\t\t\t\t<div class=\"center p30\"><button class=\"button empty\" id=\"myModalButContent\" data-toggle=\"modal\" data-send=\"\u041a\u043d\u043e\u043f\u043a\u0430 \u0432 \u0442\u0435\u043a\u0441\u0442\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b. \u0421\u0442\u0440\u0430\u043d\u0438\u0446\u0430 Network perimeter protection\" data-ga=\"gtag('event', 'event_name', {'event_category': 'consultationMerezhevaBezpeka', 'event_action': 'send_MerezhevaBezpekai'});\" data-target=\"#myModal\">REQUEST A CONSULTATION<\/button><\/div>\n\t\t\t\t<\/div>\n                <div class=\"sidebar_solution\">\n\t\t\t\t\t<div class=\"blocks sidebar\">\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Business value<\/h3>\n\t\t\t\t\t\t\t<h4><img class=\"alignnone size-full wp-image-1757\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/safe.png\" alt width=\"40\" height=\"40\"> Comprehensive protection of company resources<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1753\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/payment-security.png\" alt width=\"40\" height=\"40\"> Protection of confidential information<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1754\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/portfolio.png\" alt width=\"40\" height=\"40\"> Protection of the company\u2019s reputation<\/h4>\n\n                        <\/div>\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Partners<\/h3>\n\t\t\t\t\t\t\t<div class=\"blocks solutions_partner\">\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/cisco_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/palo_alto_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/fortinet_partner-1.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n                        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n            <\/div>\n        <\/div>\n    <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2582,"parent":214,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u041c\u0435\u0440\u0435\u0436\u0435\u0432\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0439 \u0417\u0430\u0445\u0438\u0441\u0442 | ITIS<\/title>\n<meta name=\"description\" content=\"\u0417\u0430\u0445\u0438\u0441\u0442\u00a0\u0432\u0456\u0434 DDoS \u0430\u0442\u0430\u043a. \u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0442\u043e\u0440\u0433\u043d\u0435\u043d\u044c. \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u043e\u0444\u0456\u0441\u0443, \u0431\u0456\u0437\u043d\u0435\u0441\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0437 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0432\u0456\u0434 Cisco, Palo Alto.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u041c\u0435\u0440\u0435\u0436\u0435\u0432\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0439 \u0417\u0430\u0445\u0438\u0441\u0442 | ITIS\" \/>\n<meta property=\"og:description\" content=\"\u0417\u0430\u0445\u0438\u0441\u0442\u00a0\u0432\u0456\u0434 DDoS \u0430\u0442\u0430\u043a. \u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0442\u043e\u0440\u0433\u043d\u0435\u043d\u044c. \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u043e\u0444\u0456\u0441\u0443, \u0431\u0456\u0437\u043d\u0435\u0441\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0437 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0432\u0456\u0434 Cisco, Palo Alto.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-26T14:53:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"974\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itis.net.ua\/#website\",\"url\":\"https:\/\/www.itis.net.ua\/\",\"name\":\"ITIS \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c\\u043d\\u0430 \\u0456\\u043d\\u0442\\u0435\\u0433\\u0440\\u0430\\u0446\\u0456\\u044f\",\"description\":\"\\u041f\\u0440\\u043e\\u0444\\u0435\\u0441\\u0456\\u0439\\u043d\\u0430 I\\u0422-\\u043f\\u0456\\u0434\\u0442\\u0440\\u0438\\u043c\\u043a\\u0430 \\u0412\\u0430\\u0448\\u043e\\u0433\\u043e \\u0431\\u0456\\u0437\\u043d\\u0435\\u0441\\u0443\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itis.net.ua\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-Security.jpg\",\"contentUrl\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-Security.jpg\",\"width\":1600,\"height\":974},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#webpage\",\"url\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/\",\"name\":\"\\u041c\\u0435\\u0440\\u0435\\u0436\\u0435\\u0432\\u0430 \\u0411\\u0435\\u0437\\u043f\\u0435\\u043a\\u0430 \\u041f\\u0435\\u0440\\u0438\\u043c\\u0435\\u0442\\u0440\\u0430 | \\u0406\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0456\\u0439\\u043d\\u0438\\u0439 \\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 | ITIS\",\"isPartOf\":{\"@id\":\"https:\/\/www.itis.net.ua\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#primaryimage\"},\"datePublished\":\"2019-12-26T09:24:36+00:00\",\"dateModified\":\"2021-04-26T14:53:12+00:00\",\"description\":\"\\u0417\\u0430\\u0445\\u0438\\u0441\\u0442\\u00a0\\u0432\\u0456\\u0434 DDoS \\u0430\\u0442\\u0430\\u043a. \\u0417\\u0430\\u043f\\u043e\\u0431\\u0456\\u0433\\u0430\\u043d\\u043d\\u044f \\u0432\\u0442\\u043e\\u0440\\u0433\\u043d\\u0435\\u043d\\u044c. \\u0406\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0456\\u0439\\u043d\\u0430 \\u0431\\u0435\\u0437\\u043f\\u0435\\u043a\\u0430 \\u043f\\u0456\\u0434\\u043f\\u0440\\u0438\\u0454\\u043c\\u0441\\u0442\\u0432\\u0430, \\u043e\\u0444\\u0456\\u0441\\u0443, \\u0431\\u0456\\u0437\\u043d\\u0435\\u0441\\u0443. \\u0420\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f \\u0437 \\u043a\\u0456\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043f\\u0435\\u043a\\u0438 \\u0432\\u0456\\u0434 Cisco, Palo Alto.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Main\",\"item\":\"https:\/\/www.itis.net.ua\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\\u041d\\u0430\\u0448\\u0456 \\u0440\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f\",\"item\":\"https:\/\/www.itis.net.ua\/solution\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\\u041a\\u0438\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u044c\",\"item\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\\u0417\\u0430\\u0449\\u0438\\u0442\\u0430 \\u043f\\u0435\\u0440\\u0438\\u043c\\u0435\\u0442\\u0440\\u0430 \\u0441\\u0435\\u0442\\u0438\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u041c\u0435\u0440\u0435\u0436\u0435\u0432\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0439 \u0417\u0430\u0445\u0438\u0441\u0442 | ITIS","description":"\u0417\u0430\u0445\u0438\u0441\u0442\u00a0\u0432\u0456\u0434 DDoS \u0430\u0442\u0430\u043a. \u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0442\u043e\u0440\u0433\u043d\u0435\u043d\u044c. \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u043e\u0444\u0456\u0441\u0443, \u0431\u0456\u0437\u043d\u0435\u0441\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0437 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0432\u0456\u0434 Cisco, Palo Alto.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/","og_locale":"en_US","og_type":"article","og_title":"\u041c\u0435\u0440\u0435\u0436\u0435\u0432\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0439 \u0417\u0430\u0445\u0438\u0441\u0442 | ITIS","og_description":"\u0417\u0430\u0445\u0438\u0441\u0442\u00a0\u0432\u0456\u0434 DDoS \u0430\u0442\u0430\u043a. \u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0442\u043e\u0440\u0433\u043d\u0435\u043d\u044c. \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u043e\u0444\u0456\u0441\u0443, \u0431\u0456\u0437\u043d\u0435\u0441\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0437 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0432\u0456\u0434 Cisco, Palo Alto.","og_url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/","og_site_name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","article_modified_time":"2021-04-26T14:53:12+00:00","og_image":[{"width":1600,"height":974,"url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-Security.jpg","path":"\/var\/www\/itisyk\/itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-Security.jpg","size":"full","id":2582,"alt":"","pixels":1558400,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.itis.net.ua\/#website","url":"https:\/\/www.itis.net.ua\/","name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","description":"\u041f\u0440\u043e\u0444\u0435\u0441\u0456\u0439\u043d\u0430 I\u0422-\u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0430 \u0412\u0430\u0448\u043e\u0433\u043e \u0431\u0456\u0437\u043d\u0435\u0441\u0443","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itis.net.ua\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-Security.jpg","contentUrl":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-Security.jpg","width":1600,"height":974},{"@type":"WebPage","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#webpage","url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/","name":"\u041c\u0435\u0440\u0435\u0436\u0435\u0432\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0439 \u0417\u0430\u0445\u0438\u0441\u0442 | ITIS","isPartOf":{"@id":"https:\/\/www.itis.net.ua\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#primaryimage"},"datePublished":"2019-12-26T09:24:36+00:00","dateModified":"2021-04-26T14:53:12+00:00","description":"\u0417\u0430\u0445\u0438\u0441\u0442\u00a0\u0432\u0456\u0434 DDoS \u0430\u0442\u0430\u043a. \u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0442\u043e\u0440\u0433\u043d\u0435\u043d\u044c. \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u0441\u0442\u0432\u0430, \u043e\u0444\u0456\u0441\u0443, \u0431\u0456\u0437\u043d\u0435\u0441\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0437 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0432\u0456\u0434 Cisco, Palo Alto.","breadcrumb":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Main","item":"https:\/\/www.itis.net.ua\/"},{"@type":"ListItem","position":2,"name":"\u041d\u0430\u0448\u0456 \u0440\u0456\u0448\u0435\u043d\u043d\u044f","item":"https:\/\/www.itis.net.ua\/solution\/"},{"@type":"ListItem","position":3,"name":"\u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","item":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/"},{"@type":"ListItem","position":4,"name":"\u0417\u0430\u0449\u0438\u0442\u0430 \u043f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0430 \u0441\u0435\u0442\u0438"}]}]}},"_links":{"self":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/287"}],"collection":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":32,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/287\/revisions"}],"predecessor-version":[{"id":4627,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/287\/revisions\/4627"}],"up":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media\/2582"}],"wp:attachment":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media?parent=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}