{"id":1885,"date":"2024-05-20T04:46:54","date_gmt":"2024-05-20T04:46:54","guid":{"rendered":"https:\/\/innovaryx.com\/datos-y-analitica-copy-copy-2\/"},"modified":"2024-07-30T00:18:50","modified_gmt":"2024-07-30T00:18:50","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/innovaryx.com\/en\/ciberseguridad\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1885\" class=\"elementor elementor-1885\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3833c42 e-flex e-con-boxed e-con e-parent\" data-id=\"3833c42\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fed2aad e-con-full e-flex e-con e-child\" data-id=\"fed2aad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88ced2b elementor-widget elementor-widget-heading\" data-id=\"88ced2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CYBERSECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896ff58 elementor-widget elementor-widget-text-editor\" data-id=\"896ff58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Raise your guard against digital threats: Where protection becomes the shield of your business in the cyber era.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb0d448 e-flex e-con-boxed e-con e-parent\" data-id=\"eb0d448\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5e2ffa elementor-widget elementor-widget-text-editor\" data-id=\"c5e2ffa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In today's digital era, cybersecurity is a critical concern for all businesses. <\/span><\/p><p><span style=\"font-weight: 400;\">With the rise of cyber threats, from ransomware attacks to data breaches, protecting confidential information and critical systems is essential for business continuity and customer trust. <\/span><\/p><p><span style=\"font-weight: 400;\">Cybersecurity not only involves protection against external attacks but also the prevention of internal errors and compliance with security regulations and standards. In a constantly evolving digital environment, cybersecurity is a priority that cannot be overlooked.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f32d86d e-flex e-con-boxed e-con e-parent\" data-id=\"f32d86d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3cc2d0 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"a3cc2d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad.jpg\" class=\"attachment-full size-full wp-image-1888\" alt=\"\" srcset=\"https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad.jpg 800w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-300x225.jpg 300w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-768x576.jpg 768w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-16x12.jpg 16w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f190a5a e-con-full e-flex e-con e-child\" data-id=\"f190a5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fea6de6 elementor-widget elementor-widget-heading\" data-id=\"fea6de6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why Innovaryx?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11baf2e elementor-widget elementor-widget-text-editor\" data-id=\"11baf2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Innovaryx stands out as a leader in cybersecurity for the following reasons:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0d3ada elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"c0d3ada\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-c0d3ada\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"c0d3ada\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"experiencia\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2021\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-sort-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M41 288h238c21.4 0 32.1 25.9 17 41L177 448c-9.4 9.4-24.6 9.4-33.9 0L24 329c-15.1-15.1-4.4-41 17-41z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><h5 class=\"eael-accordion-tab-title\">Experience<\/h5><\/div><div id=\"elementor-tab-content-2021\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"experiencia\">We have a team of cybersecurity experts with extensive experience in protecting critical systems and data. From vulnerability assessments to incident response, we have the knowledge and experience needed to protect your business against the most advanced cyber threats.<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"enfoque-personalizado\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2022\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-sort-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M41 288h238c21.4 0 32.1 25.9 17 41L177 448c-9.4 9.4-24.6 9.4-33.9 0L24 329c-15.1-15.1-4.4-41 17-41z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><h5 class=\"eael-accordion-tab-title\">Personalized Approach<\/h5><\/div><div id=\"elementor-tab-content-2022\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"enfoque-personalizado\">We understand that every company has unique cybersecurity needs and challenges. That's why we are committed to providing customized solutions that align with your specific requirements and effectively mitigate risks.<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"soluciones-integrales\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2023\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-sort-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M41 288h238c21.4 0 32.1 25.9 17 41L177 448c-9.4 9.4-24.6 9.4-33.9 0L24 329c-15.1-15.1-4.4-41 17-41z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><h5 class=\"eael-accordion-tab-title\">Comprehensive Solutions<\/h5><\/div><div id=\"elementor-tab-content-2023\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"soluciones-integrales\">We offer a complete range of cybersecurity services, from risk assessments to security policy development and customized solutions. We ensure to cover all bases to protect your digital assets and ensure business continuity.<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8ec11e e-flex e-con-boxed e-con e-parent\" data-id=\"e8ec11e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ec11ec elementor-widget elementor-widget-heading\" data-id=\"2ec11ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Service Description<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-109cae4 elementor-widget elementor-widget-text-editor\" data-id=\"109cae4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">At Innovaryx, we offer a wide range of cybersecurity services designed to protect your company in the digital world:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f801e3 e-flex e-con-boxed e-con e-parent\" data-id=\"8f801e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-602192a e-con-full e-flex e-con e-child\" data-id=\"602192a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3e8850a e-con-full e-flex e-con e-child\" data-id=\"3e8850a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89b62c3 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"89b62c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-1.png\" class=\"attachment-full size-full wp-image-1905\" alt=\"\" srcset=\"https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-1.png 200w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-1-150x150.png 150w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-1-12x12.png 12w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Vulnerability and Risk Assessment and Mitigation<\/h3><p class=\"elementor-image-box-description\">We identify and resolve potential vulnerabilities and security risks in your systems, ensuring protection against cyber threats. Our experts act quickly to strengthen your security and ensure the mitigation of future risks.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a3a9ba5 e-con-full e-flex e-con e-child\" data-id=\"a3a9ba5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3dc79fc e-con-full e-flex e-con e-child\" data-id=\"3dc79fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-182099f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"182099f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-2.png\" class=\"attachment-full size-full wp-image-1906\" alt=\"\" srcset=\"https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-2.png 200w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-2-150x150.png 150w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-2-12x12.png 12w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Development of Security Policies and Customized Solutions<\/h3><p class=\"elementor-image-box-description\">We work closely with you to develop security policies tailored to your specific needs and regulatory requirements. Additionally, we design customized security solutions that address the unique challenges of your company and effectively mitigate security risks.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8550a3e e-con-full e-flex e-con e-child\" data-id=\"8550a3e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-43c1ea4 e-con-full e-flex e-con e-child\" data-id=\"43c1ea4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9a05d8 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"d9a05d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-3.png\" class=\"attachment-full size-full wp-image-1904\" alt=\"\" srcset=\"https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-3.png 200w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-3-150x150.png 150w, https:\/\/innovaryx.com\/wp-content\/uploads\/2024\/05\/ciberseguridad-icon-3-12x12.png 12w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ethical Hacking<\/h3><p class=\"elementor-image-box-description\">We conduct penetration tests and cyber attack simulations to identify and correct vulnerabilities in your security infrastructure. Our team of cybersecurity experts performs controlled and authorized attacks to assess and strengthen the robustness of your systems and networks.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f180e81 e-flex e-con-boxed e-con e-parent\" data-id=\"f180e81\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f22dd0c elementor-widget elementor-widget-text-editor\" data-id=\"f22dd0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">At Innovaryx, we protect your company with advanced cybersecurity solutions, ensuring your peace of mind and success in today's digital environment.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7b64ff e-flex e-con-boxed e-con e-parent\" data-id=\"a7b64ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9714204 elementor-widget elementor-widget-html\" data-id=\"9714204\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script> \r\njQuery(document).ready(function($) { \r\nvar delay = 100; setTimeout(function() { \r\n$('.elementor-tab-title').removeClass('elementor-active');\r\n $('.elementor-tab-content').css('display', 'none'); }, delay); \r\n}); \r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>CIBERSEGURIDAD Eleva la guardia contra las amenazas digitales: Donde la protecci\u00f3n se convierte en el escudo de tu negocio en la era cibern\u00e9tica. En la era digital actual, la ciberseguridad es una preocupaci\u00f3n cr\u00edtica para todas las empresas. Con el aumento de las amenazas cibern\u00e9ticas, desde ataques de ransomware hasta brechas de datos, proteger la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1885","page","type-page","status-publish","hentry"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/innovaryx.com\/en\/wp-json\/wp\/v2\/pages\/1885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innovaryx.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/innovaryx.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/innovaryx.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/innovaryx.com\/en\/wp-json\/wp\/v2\/comments?post=1885"}],"version-history":[{"count":43,"href":"https:\/\/innovaryx.com\/en\/wp-json\/wp\/v2\/pages\/1885\/revisions"}],"predecessor-version":[{"id":2513,"href":"https:\/\/innovaryx.com\/en\/wp-json\/wp\/v2\/pages\/1885\/revisions\/2513"}],"wp:attachment":[{"href":"https:\/\/innovaryx.com\/en\/wp-json\/wp\/v2\/media?parent=1885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}