{"id":293,"date":"2019-12-26T10:26:58","date_gmt":"2019-12-26T08:26:58","guid":{"rendered":"http:\/\/itis-adobe.bmg-ua.com\/?page_id=293"},"modified":"2021-04-26T16:56:11","modified_gmt":"2021-04-26T14:56:11","slug":"dlp","status":"publish","type":"page","link":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/","title":{"rendered":"DLP. Data Leak Protection"},"content":{"rendered":"\n\n\t<section class=\"lightBg\">\n        <div class=\"container\">\n            <div class=\"blocks project_inside\">\n                <div class=\"content_solution\">\n                    <div class=\"center\"><h1>DLP. Data Leak Protection<\/h1><\/div>\n\t\t\t\t\t<p>Traditional IPS, anti-virus and firewalls protect the infrastructure from external attacks, but cannot provide reliable protection against internal attacks. Data Loss Prevention solutions, to prevent intentional or accidental leakage of critical organizational information. They create a protective perimeter around the organization and analyze all information coming or going. DLP systems monitor not only Internet traffic, but also data sources that can be externalized or printed.<\/p>\n<p>DPL solution capabilities:<br>\n<\/p><ul class=\"type1\"><li>configuration of individual analysis and channel monitoring policies;<\/li><li>automatic blocking of data channels if suspicious activity is detected;<\/li><li>content analysis of data in transit;<\/li><li>real-time event alerting.<\/li><\/ul><br>\nCreation of a single information environment that integrates all additions, data of different types and organization technologies, enabling their simultaneous interoperability in real&nbsp;time.\n\n\t\t\t\t\t<div class=\"center p30\"><button class=\"button empty\" id=\"myModalButContent\" data-toggle=\"modal\" data-send=\"\u041a\u043d\u043e\u043f\u043a\u0430 \u0432 \u0442\u0435\u043a\u0441\u0442\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b. \u0421\u0442\u0440\u0430\u043d\u0438\u0446\u0430 DLP. Data Leak Protection\" data-ga=\"gtag('event', 'event_name', {'event_category': 'consultationDLP', 'event_action': 'send_DLP'});\" data-target=\"#myModal\">REQUEST A CONSULTATION<\/button><\/div>\n\t\t\t\t<\/div>\n                <div class=\"sidebar_solution\">\n\t\t\t\t\t<div class=\"blocks sidebar\">\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Business value<\/h3>\n\t\t\t\t\t\t\t<h4><img class=\"alignnone size-full wp-image-1745\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/goal.png\" alt width=\"40\" height=\"40\"> Reliable protection of information assets<\/h4>\n<h4><img class=\"alignnone wp-image-949\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/01\/growth_3.png\" alt width=\"40\" height=\"39\"> Absolute transparency of business processes<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1753\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/payment-security.png\" alt width=\"40\" height=\"40\"> Protection of confidential information<\/h4>\n\n                        <\/div>\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Partners<\/h3>\n\t\t\t\t\t\t\t<div class=\"blocks solutions_partner\">\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/mcafee_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/palo_alto_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/trend_micro_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/symantec_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/sophos_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n                        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n            <\/div>\n        <\/div>\n    <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2606,"parent":214,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DLP \u0421\u0438\u0441\u0442\u0435\u043c\u0438 | \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u0412\u0438\u0442\u043e\u043a\u0443 \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 | ITIS<\/title>\n<meta name=\"description\" content=\"\u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0438\u0442\u043e\u043a\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0432\u0456\u0434: Palo Alto, McAfee, Cisco, Trend Micro.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DLP \u0421\u0438\u0441\u0442\u0435\u043c\u0438 | \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u0412\u0438\u0442\u043e\u043a\u0443 \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 | ITIS\" \/>\n<meta property=\"og:description\" content=\"\u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0438\u0442\u043e\u043a\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0432\u0456\u0434: Palo Alto, McAfee, Cisco, Trend Micro.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/\" \/>\n<meta property=\"og:site_name\" content=\"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-26T14:56:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/DLP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itis.net.ua\/#website\",\"url\":\"https:\/\/www.itis.net.ua\/\",\"name\":\"ITIS \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c\\u043d\\u0430 \\u0456\\u043d\\u0442\\u0435\\u0433\\u0440\\u0430\\u0446\\u0456\\u044f\",\"description\":\"\\u041f\\u0440\\u043e\\u0444\\u0435\\u0441\\u0456\\u0439\\u043d\\u0430 I\\u0422-\\u043f\\u0456\\u0434\\u0442\\u0440\\u0438\\u043c\\u043a\\u0430 \\u0412\\u0430\\u0448\\u043e\\u0433\\u043e \\u0431\\u0456\\u0437\\u043d\\u0435\\u0441\\u0443\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itis.net.ua\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/DLP.jpg\",\"contentUrl\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/DLP.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#webpage\",\"url\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/\",\"name\":\"DLP \\u0421\\u0438\\u0441\\u0442\\u0435\\u043c\\u0438 | \\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u0432\\u0456\\u0434 \\u0412\\u0438\\u0442\\u043e\\u043a\\u0443 \\u0406\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0456\\u0457 | ITIS\",\"isPartOf\":{\"@id\":\"https:\/\/www.itis.net.ua\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#primaryimage\"},\"datePublished\":\"2019-12-26T08:26:58+00:00\",\"dateModified\":\"2021-04-26T14:56:11+00:00\",\"description\":\"\\u0417\\u0430\\u043f\\u043e\\u0431\\u0456\\u0433\\u0430\\u043d\\u043d\\u044f \\u0432\\u0438\\u0442\\u043e\\u043a\\u0443 \\u0456\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0456\\u0457. \\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u043a\\u043e\\u0440\\u043f\\u043e\\u0440\\u0430\\u0442\\u0438\\u0432\\u043d\\u0438\\u0445 \\u0434\\u0430\\u043d\\u0438\\u0445. \\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u043f\\u0435\\u0440\\u0441\\u043e\\u043d\\u0430\\u043b\\u044c\\u043d\\u0438\\u0445 \\u0434\\u0430\\u043d\\u0438\\u0445 \\u043a\\u043e\\u0440\\u0438\\u0441\\u0442\\u0443\\u0432\\u0430\\u0447\\u0456\\u0432. \\u0420\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f \\u0432\\u0456\\u0434: Palo Alto, McAfee, Cisco, Trend Micro.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Main\",\"item\":\"https:\/\/www.itis.net.ua\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\\u041d\\u0430\\u0448\\u0456 \\u0440\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f\",\"item\":\"https:\/\/www.itis.net.ua\/solution\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\\u041a\\u0438\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u044c\",\"item\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"DLP. \\u0417\\u0430\\u0449\\u0438\\u0442\\u0430 \\u043e\\u0442 \\u0443\\u0442\\u0435\\u0447\\u043a\\u0438 \\u0438\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0438\\u0438\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DLP \u0421\u0438\u0441\u0442\u0435\u043c\u0438 | \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u0412\u0438\u0442\u043e\u043a\u0443 \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 | ITIS","description":"\u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0438\u0442\u043e\u043a\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0432\u0456\u0434: Palo Alto, McAfee, Cisco, Trend Micro.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/","og_locale":"en_US","og_type":"article","og_title":"DLP \u0421\u0438\u0441\u0442\u0435\u043c\u0438 | \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u0412\u0438\u0442\u043e\u043a\u0443 \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 | ITIS","og_description":"\u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0438\u0442\u043e\u043a\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0432\u0456\u0434: Palo Alto, McAfee, Cisco, Trend Micro.","og_url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/","og_site_name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","article_modified_time":"2021-04-26T14:56:11+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/DLP.jpg","path":"\/var\/www\/itisyk\/itis.net.ua\/wp-content\/uploads\/2020\/04\/DLP.jpg","size":"full","id":2606,"alt":"","pixels":1707200,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.itis.net.ua\/#website","url":"https:\/\/www.itis.net.ua\/","name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","description":"\u041f\u0440\u043e\u0444\u0435\u0441\u0456\u0439\u043d\u0430 I\u0422-\u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0430 \u0412\u0430\u0448\u043e\u0433\u043e \u0431\u0456\u0437\u043d\u0435\u0441\u0443","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itis.net.ua\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/DLP.jpg","contentUrl":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/DLP.jpg","width":1600,"height":1067},{"@type":"WebPage","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#webpage","url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/","name":"DLP \u0421\u0438\u0441\u0442\u0435\u043c\u0438 | \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u0412\u0438\u0442\u043e\u043a\u0443 \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 | ITIS","isPartOf":{"@id":"https:\/\/www.itis.net.ua\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#primaryimage"},"datePublished":"2019-12-26T08:26:58+00:00","dateModified":"2021-04-26T14:56:11+00:00","description":"\u0417\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0432\u0438\u0442\u043e\u043a\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432. \u0420\u0456\u0448\u0435\u043d\u043d\u044f \u0432\u0456\u0434: Palo Alto, McAfee, Cisco, Trend Micro.","breadcrumb":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Main","item":"https:\/\/www.itis.net.ua\/"},{"@type":"ListItem","position":2,"name":"\u041d\u0430\u0448\u0456 \u0440\u0456\u0448\u0435\u043d\u043d\u044f","item":"https:\/\/www.itis.net.ua\/solution\/"},{"@type":"ListItem","position":3,"name":"\u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","item":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/"},{"@type":"ListItem","position":4,"name":"DLP. \u0417\u0430\u0449\u0438\u0442\u0430 \u043e\u0442 \u0443\u0442\u0435\u0447\u043a\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438"}]}]}},"_links":{"self":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/293"}],"collection":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":37,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/293\/revisions"}],"predecessor-version":[{"id":5075,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/293\/revisions\/5075"}],"up":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media\/2606"}],"wp:attachment":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media?parent=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}