{"id":1178,"date":"2018-05-21T15:14:57","date_gmt":"2018-05-21T13:14:57","guid":{"rendered":"http:\/\/emiralmedia.com\/site\/datanet\/cum-se-construieste-o-arhitectura-integrata-de-securitate\/"},"modified":"2020-04-14T18:58:29","modified_gmt":"2020-04-14T15:58:29","slug":"how-build-integrated-security-architecture-0","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/","title":{"rendered":"How to Build an Integrated Security Architecture"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><em>Apr. 2018<\/em><\/p>\n<p>Data and application protection in on-premises infrastructures, virtual environments and Cloud is a critical priority for most organizations. To support that, Datanet Systems organized a workshop in mid-April to present and analyze the constituent elements of security architectures, illustrating the benefits of an integrated approach.<\/p>\n<p><strong>Forrester Consulting<\/strong>\u00a0carried out in 2016 an analysis of the economic impact (<strong>Total Economic Impact<\/strong>) generated by adopting and implementing Cisco&#8217;s integrated security architecture within an organization. TEI analysis, completed over a three year period, revealed three major benefits:<\/p>\n<ul>\n<li>38% yield;<\/li>\n<li>20% CAPEX reduction (decrease of investments in hardware);<\/li>\n<li>25% OPEX savings (lower license fees).<\/li>\n<\/ul>\n<p>Since 2016, Cisco has constantly expanded its portfolio with new security applications and is adding new features in a fast pace. For this reason Datanet Systems Specialists, Cisco&#8217;s main local partner (as per number of projects and number of certified engineers) recently presented in a workshop the main news brought by the updated solutions:<\/p>\n<ul>\n<li>Identity Service Engine (ISE v2.3 si 2.4);<\/li>\n<li>Firepower Threat Defense (FTG v6.2.0);<\/li>\n<li>Email Security Appliance (ESA OS 10.x, 11.x si 12.x);<\/li>\n<li>Web Security Appliance (WSA OS 10.x si 11.x)<\/li>\n<li>Adaptive Security Appliance (OS 9.6, 9.7, 9.8 si 9.9);<\/li>\n<\/ul>\n<p>as well as new features integrated with Advanced Malware Protection (AMP) and Umbrella.<\/p>\n<p>Datanets consultants\u00a0<strong>Alexandru Nacea and Faruk Hairedin<\/strong>\u2019s presentations did not solely focus on Cisco&#8217;s technological advances. Datanet Systems&#8217;s IT security consultants have illustrated practically by usage scenarios how and what benefits are provided by integrating these solutions into a unitary security architecture that is capable of improving protection across the entire organization. A special attention has been paid to the automation options offered by Cisco solutions that help: \u2022 early detection of potential threats; \u2022 decreasing the detection time and the magnitude of a security incident; \u2022 increasing the effectiveness of remediation solutions and \u2022 reducing operational effort.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Multivendor approach, a necessity<\/strong><\/h2>\n<p>In order to deliver complete and effective local protection,\u00a0<strong>Datanet<\/strong>\u00a0promotes the concept of a multivendor integrated security architecture, capable of covering specific functional areas. A justifiable approach, in terms of vendor specialization in niche areas, and which Datanet supports through advanced security system integrator competences, accumulated over the course of 20 years.<\/p>\n<p>In this context,\u00a0<strong>Datanet Systems<\/strong>\u00a0specialists have presented the main advantages of BIG-IP Application Security Manager (ASM), a scalable F5 Web Application Firewall solution dedicated to the protection of classic, virtual and Cloud media infrastructures that provide protection against an extended range of attacks (&#8220;Zero-day&#8221;, DoS \/ DDoS, SQL injections, CSRF, etc.). The presentation focused on practical aspects such as ways of defining, implementing, and enforcing security policies using ASM, or how the solution identifies early on the pattern of a DoS Layer 7 attack.<\/p>\n<p>Another F5 solution from the Datanet Systems portfolio, presented in the workshop, was\u00a0<strong>Advanced Web Application Firewall (AWAF)<\/strong>, which protects web and mobile applications against a wide range of threats. For this solution Datanet specialists have detailed the usual usage scenarios, namely how F5 AWAF protects organizations from theft of credentials, what are the benefits of Behavioral Analysis of DoS attacks (Behavioral Analysis DoS), and how Anti-Bot Mobile SDK can be used to detect legitimate traffic generated by mobile applications.<\/p>\n<p>The multivendor approach was completed by\u00a0<strong>Petre Popescu, Presales Manager Datanet Systems<\/strong>, who explained the advantages provided by StableNet Enterprise, an Infosim network management solution. The Datanet Specialist has analyzed and detailed the benefits of advanced tools for monitoring performance of business applications and processes, and automated tools for detecting issues and network events.<\/p>\n<p>The Security Architecture Workshop is part of an extended series of events organized by Datanet Systems and addressed to cybersecurity professionals and organizations for which data, applications and business process protection are a priority.<\/p>\n<p>Datanet Systems is one of the leading system integrators in Romania, with advanced competences in the field of integrated security architectures, as confirmed by the numerous projects implemented in critical infrastructures, financial-banking institutions, telecom operators, etc.<\/p>\n<p>For more information, visit\u00a0<a href=\"https:\/\/www.datanets.ro\/\">www.datanets.ro<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Datanet Systems organized a workshop dedicated to security architectures (Apr. 2018)<\/p>\n","protected":false},"author":8,"featured_media":12652,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[37],"tags":[257,247,129],"class_list":["post-1178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lastest-news","tag-cisco-firepower-en","tag-cisco-ise-en-2","tag-network-management-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Build an Integrated Security Architecture &#8211; Datanet Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Build an Integrated Security Architecture &#8211; Datanet Systems\" \/>\n<meta property=\"og:description\" content=\"Datanet Systems organized a workshop dedicated to security architectures (Apr. 2018)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-21T13:14:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-14T15:58:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2018\/05\/workshop-website-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"filip\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"filip\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/\"},\"author\":{\"name\":\"filip\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/206cb0915add7d47c92a63448566abf0\"},\"headline\":\"How to Build an Integrated Security Architecture\",\"datePublished\":\"2018-05-21T13:14:57+00:00\",\"dateModified\":\"2020-04-14T15:58:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/\"},\"wordCount\":652,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/workshop-website-1.jpg\",\"keywords\":[\"Cisco Firepower\",\"Cisco ISE\",\"Network Management\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/\",\"name\":\"How to Build an Integrated Security Architecture &#8211; Datanet Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/workshop-website-1.jpg\",\"datePublished\":\"2018-05-21T13:14:57+00:00\",\"dateModified\":\"2020-04-14T15:58:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/workshop-website-1.jpg\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/workshop-website-1.jpg\",\"width\":640,\"height\":427},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/how-build-integrated-security-architecture-0\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEWS AND EVENTS\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/category\\\/all-articles\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Latest News\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/category\\\/all-articles\\\/lastest-news\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How to Build an Integrated Security Architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/206cb0915add7d47c92a63448566abf0\",\"name\":\"filip\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/416dbcb59a37cf6717a86cfaa3d10ffa67d1b906fbbd6263461f74d154fb3fe4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/416dbcb59a37cf6717a86cfaa3d10ffa67d1b906fbbd6263461f74d154fb3fe4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/416dbcb59a37cf6717a86cfaa3d10ffa67d1b906fbbd6263461f74d154fb3fe4?s=96&d=mm&r=g\",\"caption\":\"filip\"},\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/filipas\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Build an Integrated Security Architecture &#8211; Datanet Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/","og_locale":"en_US","og_type":"article","og_title":"How to Build an Integrated Security Architecture &#8211; Datanet Systems","og_description":"Datanet Systems organized a workshop dedicated to security architectures (Apr. 2018)","og_url":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2018-05-21T13:14:57+00:00","article_modified_time":"2020-04-14T15:58:29+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2018\/05\/workshop-website-1.jpg","type":"image\/jpeg"}],"author":"filip","twitter_card":"summary_large_image","twitter_misc":{"Written by":"filip","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/"},"author":{"name":"filip","@id":"https:\/\/datanets.ro\/#\/schema\/person\/206cb0915add7d47c92a63448566abf0"},"headline":"How to Build an Integrated Security Architecture","datePublished":"2018-05-21T13:14:57+00:00","dateModified":"2020-04-14T15:58:29+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/"},"wordCount":652,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2018\/05\/workshop-website-1.jpg","keywords":["Cisco Firepower","Cisco ISE","Network Management"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/","url":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/","name":"How to Build an Integrated Security Architecture &#8211; Datanet Systems","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2018\/05\/workshop-website-1.jpg","datePublished":"2018-05-21T13:14:57+00:00","dateModified":"2020-04-14T15:58:29+00:00","breadcrumb":{"@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2018\/05\/workshop-website-1.jpg","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2018\/05\/workshop-website-1.jpg","width":640,"height":427},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/en\/how-build-integrated-security-architecture-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NEWS AND EVENTS","item":"https:\/\/datanets.ro\/en\/category\/all-articles\/"},{"@type":"ListItem","position":3,"name":"Latest News","item":"https:\/\/datanets.ro\/en\/category\/all-articles\/lastest-news\/"},{"@type":"ListItem","position":4,"name":"How to Build an Integrated Security Architecture"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/206cb0915add7d47c92a63448566abf0","name":"filip","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/416dbcb59a37cf6717a86cfaa3d10ffa67d1b906fbbd6263461f74d154fb3fe4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/416dbcb59a37cf6717a86cfaa3d10ffa67d1b906fbbd6263461f74d154fb3fe4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/416dbcb59a37cf6717a86cfaa3d10ffa67d1b906fbbd6263461f74d154fb3fe4?s=96&d=mm&r=g","caption":"filip"},"url":"https:\/\/datanets.ro\/en\/author\/filipas\/"}]}},"modified_by":null,"_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/1178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=1178"}],"version-history":[{"count":4,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/1178\/revisions"}],"predecessor-version":[{"id":12655,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/1178\/revisions\/12655"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/12652"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=1178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=1178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=1178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}