{"id":297,"date":"2019-12-26T11:02:33","date_gmt":"2019-12-26T11:02:33","guid":{"rendered":"http:\/\/itis-adobe.bmg-ua.com\/?page_id=297"},"modified":"2021-04-26T16:57:06","modified_gmt":"2021-04-26T14:57:06","slug":"mdm","status":"publish","type":"page","link":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/","title":{"rendered":"MDM. Mobile Device Management"},"content":{"rendered":"\n\n\t<section class=\"lightBg\">\n        <div class=\"container\">\n            <div class=\"blocks project_inside\">\n                <div class=\"content_solution\">\n                    <div class=\"center\"><h1>MDM. Mobile Device Management<\/h1><\/div>\n\t\t\t\t\t<p>Solutions that provide reliable data protection not only within an organisation\u2019s perimeter, but also behind it. Support for all types of operating systems (IOS, Android, Windows, macOS, Chrome OS) and devices (smartphones, laptops, tablets), enabling centralised management.<br>\nBenefits:<br>\n<\/p><ul class=\"type1\"><li>support for corporate and personal employee devices;<\/li><li>containerisation and prevention of information leakage;<\/li><li>monitoring of activities performed;<\/li><li>protection for remote employees.<\/li><\/ul>\n\n\t\t\t\t\t<div class=\"center p30\"><button class=\"button empty\" id=\"myModalButContent\" data-toggle=\"modal\" data-send=\"\u041a\u043d\u043e\u043f\u043a\u0430 \u0432 \u0442\u0435\u043a\u0441\u0442\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b. \u0421\u0442\u0440\u0430\u043d\u0438\u0446\u0430 MDM. Mobile Device Management\" data-ga=\"gtag('event', 'event_name', {'event_category': 'consultationMDM', 'event_action': 'send_MDM'});\" data-target=\"#myModal\">REQUEST A CONSULTATION<\/button><\/div>\n\t\t\t\t<\/div>\n                <div class=\"sidebar_solution\">\n\t\t\t\t\t<div class=\"blocks sidebar\">\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Business value<\/h3>\n\t\t\t\t\t\t\t<h4><img class=\"alignnone size-full wp-image-1753\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/payment-security.png\" alt width=\"40\" height=\"40\"> Protection of confidential information&nbsp;<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1741\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/connection.png\" alt width=\"40\" height=\"40\"> Centralised device management and control<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1759\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/smartphone.png\" alt width=\"40\" height=\"40\"> Business mobility<\/h4>\n\n                        <\/div>\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Partners<\/h3>\n\t\t\t\t\t\t\t<div class=\"blocks solutions_partner\">\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/vmware_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/sophos_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n                        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n            <\/div>\n        <\/div>\n    <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2608,"parent":214,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u0417\u0430\u0445\u0438\u0441\u0442 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0456\u0432 | Mobile Device Management (MDM) | ITIS<\/title>\n<meta name=\"description\" content=\"\u041f\u043e\u043f\u0435\u0440\u0435\u0434\u0436\u0435\u043d\u043d\u044f \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0456\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043e \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 \u0432\u0456\u0434 \u0437\u043b\u043e\u043c\u0443. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u0417\u0430\u0445\u0438\u0441\u0442 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0456\u0432 | Mobile Device Management (MDM) | ITIS\" \/>\n<meta property=\"og:description\" content=\"\u041f\u043e\u043f\u0435\u0440\u0435\u0434\u0436\u0435\u043d\u043d\u044f \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0456\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043e \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 \u0432\u0456\u0434 \u0437\u043b\u043e\u043c\u0443. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/\" \/>\n<meta property=\"og:site_name\" content=\"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-26T14:57:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/MDM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itis.net.ua\/#website\",\"url\":\"https:\/\/www.itis.net.ua\/\",\"name\":\"ITIS \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c\\u043d\\u0430 \\u0456\\u043d\\u0442\\u0435\\u0433\\u0440\\u0430\\u0446\\u0456\\u044f\",\"description\":\"\\u041f\\u0440\\u043e\\u0444\\u0435\\u0441\\u0456\\u0439\\u043d\\u0430 I\\u0422-\\u043f\\u0456\\u0434\\u0442\\u0440\\u0438\\u043c\\u043a\\u0430 \\u0412\\u0430\\u0448\\u043e\\u0433\\u043e \\u0431\\u0456\\u0437\\u043d\\u0435\\u0441\\u0443\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itis.net.ua\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/MDM.jpg\",\"contentUrl\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/MDM.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#webpage\",\"url\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/\",\"name\":\"\\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u0441\\u043c\\u0430\\u0440\\u0442\\u0444\\u043e\\u043d\\u0456\\u0432 | Mobile Device Management (MDM) | ITIS\",\"isPartOf\":{\"@id\":\"https:\/\/www.itis.net.ua\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#primaryimage\"},\"datePublished\":\"2019-12-26T11:02:33+00:00\",\"dateModified\":\"2021-04-26T14:57:06+00:00\",\"description\":\"\\u041f\\u043e\\u043f\\u0435\\u0440\\u0435\\u0434\\u0436\\u0435\\u043d\\u043d\\u044f \\u043d\\u0435\\u0441\\u0430\\u043d\\u043a\\u0446\\u0456\\u043e\\u043d\\u043e\\u0432\\u0430\\u043d\\u043e\\u0433\\u043e \\u0434\\u043e\\u0441\\u0442\\u0443\\u043f\\u0443 \\u0434\\u043e \\u043c\\u043e\\u0431\\u0456\\u043b\\u044c\\u043d\\u0438\\u0445 \\u043f\\u0440\\u0438\\u0441\\u0442\\u0440\\u043e\\u0457\\u0432. \\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u043a\\u043e\\u0440\\u043f\\u043e\\u0440\\u0430\\u0442\\u0438\\u0432\\u043d\\u0438\\u0445 \\u043f\\u0440\\u0438\\u0441\\u0442\\u0440\\u043e\\u0457\\u0432 \\u0432\\u0456\\u0434 \\u0437\\u043b\\u043e\\u043c\\u0443. \\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u043f\\u0435\\u0440\\u0441\\u043e\\u043d\\u0430\\u043b\\u044c\\u043d\\u0438\\u0445 \\u0434\\u0430\\u043d\\u0438\\u0445.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Main\",\"item\":\"https:\/\/www.itis.net.ua\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\\u041d\\u0430\\u0448\\u0456 \\u0440\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f\",\"item\":\"https:\/\/www.itis.net.ua\/solution\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\\u041a\\u0438\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u044c\",\"item\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"MDM. \\u0423\\u043f\\u0440\\u0430\\u0432\\u043b\\u0435\\u043d\\u0438\\u0435 \\u043c\\u043e\\u0431\\u0438\\u043b\\u044c\\u043d\\u044b\\u043c\\u0438 \\u0443\\u0441\\u0442\\u0440\\u043e\\u0439\\u0441\\u0442\\u0432\\u0430\\u043c\\u0438\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0417\u0430\u0445\u0438\u0441\u0442 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0456\u0432 | Mobile Device Management (MDM) | ITIS","description":"\u041f\u043e\u043f\u0435\u0440\u0435\u0434\u0436\u0435\u043d\u043d\u044f \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0456\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043e \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 \u0432\u0456\u0434 \u0437\u043b\u043e\u043c\u0443. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/","og_locale":"en_US","og_type":"article","og_title":"\u0417\u0430\u0445\u0438\u0441\u0442 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0456\u0432 | Mobile Device Management (MDM) | ITIS","og_description":"\u041f\u043e\u043f\u0435\u0440\u0435\u0434\u0436\u0435\u043d\u043d\u044f \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0456\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043e \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 \u0432\u0456\u0434 \u0437\u043b\u043e\u043c\u0443. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445.","og_url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/","og_site_name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","article_modified_time":"2021-04-26T14:57:06+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/MDM.jpg","path":"\/var\/www\/itisyk\/itis.net.ua\/wp-content\/uploads\/2020\/04\/MDM.jpg","size":"full","id":2608,"alt":"","pixels":1707200,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.itis.net.ua\/#website","url":"https:\/\/www.itis.net.ua\/","name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","description":"\u041f\u0440\u043e\u0444\u0435\u0441\u0456\u0439\u043d\u0430 I\u0422-\u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0430 \u0412\u0430\u0448\u043e\u0433\u043e \u0431\u0456\u0437\u043d\u0435\u0441\u0443","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itis.net.ua\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/MDM.jpg","contentUrl":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/MDM.jpg","width":1600,"height":1067},{"@type":"WebPage","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#webpage","url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/","name":"\u0417\u0430\u0445\u0438\u0441\u0442 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0456\u0432 | Mobile Device Management (MDM) | ITIS","isPartOf":{"@id":"https:\/\/www.itis.net.ua\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#primaryimage"},"datePublished":"2019-12-26T11:02:33+00:00","dateModified":"2021-04-26T14:57:06+00:00","description":"\u041f\u043e\u043f\u0435\u0440\u0435\u0434\u0436\u0435\u043d\u043d\u044f \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0456\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043e \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432. \u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 \u0432\u0456\u0434 \u0437\u043b\u043e\u043c\u0443. \u0417\u0430\u0445\u0438\u0441\u0442 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445.","breadcrumb":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Main","item":"https:\/\/www.itis.net.ua\/"},{"@type":"ListItem","position":2,"name":"\u041d\u0430\u0448\u0456 \u0440\u0456\u0448\u0435\u043d\u043d\u044f","item":"https:\/\/www.itis.net.ua\/solution\/"},{"@type":"ListItem","position":3,"name":"\u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","item":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/"},{"@type":"ListItem","position":4,"name":"MDM. \u0423\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u043c\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c\u0438"}]}]}},"_links":{"self":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/297"}],"collection":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":31,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/297\/revisions"}],"predecessor-version":[{"id":5081,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/297\/revisions\/5081"}],"up":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media\/2608"}],"wp:attachment":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media?parent=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}