{"id":22783,"date":"2022-04-28T11:15:35","date_gmt":"2022-04-28T09:15:35","guid":{"rendered":"https:\/\/datanets.ro\/?p=22783"},"modified":"2022-04-28T11:22:38","modified_gmt":"2022-04-28T09:22:38","slug":"datanet-webinar-identity-protection-illusive-networks","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/","title":{"rendered":"Datanet webinar: Reducing the risk of identity compromise with Illusive Networks"},"content":{"rendered":"<p>The rapid adoption of multi-cloud services and the hybrid work generates a massive increase of the level of vulnerability, the digital identities of end-users becoming an important risk factor. For example, 1 in 5 endpoint devices currently caches critical security information &#8211; such as administrator logins &#8211; that hackers can use to increase the success rate of ransomware attacks<sup>(1)<\/sup>. The problem is intensified by the fact that, although they have dedicated solutions &#8211; such as Privileged Account Management (WFP) &#8211; 87% of local administrators do not use them<sup>(2)<\/sup>.<\/p>\n<p>In order to support the companies looking to improve their protection against such threats, Datanet Systems organized a seminar on managing identity risk with the use of Illusive Networks solutions, one of the most efficient protection systems on the market. The performance of <a href=\"https:\/\/illusive.com\/\">Illusive technologies<\/a> has been confirmed in over 130 tests performed in real conditions by \u201cred teams&#8221; security specialists.<\/p>\n<p>&nbsp;<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-22720 size-full\" title=\"Illusive Networks\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive.jpg\" alt=\"Illusive Networks\" width=\"1072\" height=\"595\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive.jpg 1072w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive-300x167.jpg 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive-1024x568.jpg 1024w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive-768x426.jpg 768w\" sizes=\"(max-width: 1072px) 100vw, 1072px\" \/><\/p>\n<p><em>\u201eIllusive Networks solutions are designed to provide an active defense system. Thus, using Illusive technologies, organizations can create a hostile environment for attackers by stopping lateral movements of threats before they compromise critical data, and can automatically block initial attempts to encrypt ransomware attacks by creating \u00abfalse targets\u00bb\u201c<\/em>, explained <strong>Mihai P\u00eervu, presales consultant at Datanet Systems<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Illusive Networks Architecture\u00a0<\/strong><\/h2>\n<p>To achieve these results, Illusive uses &#8211; unlike classic protection systems &#8211; an Agentless architecture, which prevents attackers from detecting and disabling existing protection measures, based on three key components:<\/p>\n<ul>\n<li><strong>Attack Detection System (ADS)<\/strong>, which detects threats by analyzing the interaction between them and a set of false targets added in the IT infrastructure, while blocking lateral movements through integrations with Endpoint Detection and Response applications. ADS uses more than 75 techniques to imitate systems, connections, credentials, and other targets targeted by attackers, both internal and external.<\/li>\n<li><strong>Attack Surface Manager (ASM)<\/strong>, which reduces the attack surface by identifying and removing credentials, and access rights that can allow attackers to create breaches and escalate privileges, constantly monitor login processes and breaches of connection rules, facilitate automatic creation and enforcement of access rules and corrective action.<\/li>\n<li><strong>Attack Intelligence System (AIS)<\/strong>, which speeds up the investigation and remediation of attacks, ensuring real-time telemetry data delivered (such as installed files, registry information, Active Directory data, captures of attackers&#8217; activity, tools used by them, etc.)<\/li>\n<\/ul>\n<p><em>\u201eThe Illusive solution can work both on-premises and in the Cloud, and automatically integrates with operating systems. The implementation takes only few hours, does not require large resources, and works seamlessly in any environment. A single Illusive server supports up to 150,000 endpoint devices, which can be monitored and managed within half the of time allocated by an operator which uses traditional identity management solutions\u201c<\/em>, also pointed out <strong>Mihai P\u00eervu.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Presentation and demo<\/strong><\/h2>\n<p>To show how the Illusive solution works, the Datanet specialist gave an overview of the working interface, as well as the standard components and information provided. The presentation was completed with a demonstration detailing the implementation and configuration of the Illusive solution, presenting how to enroll users, create policies and deceptive files, how to use the integrated automation options, etc. The final session of the Datanet webinar included a hands-on demonstration of how a ransomware attack can be detected and monitored and how it can be effectively blocked, by reducing the encryption speed to a few kilobits, giving companies valuable time to take remedial action necessary.<\/p>\n<p>The Illusive Networks solution presentation and demo, made by the Datanet specialist, can be viewed by accessing the full video registration of the <strong><u>\u201eManaging identity risks with Illusive Networks<\/u><\/strong>\u201c webinar.<\/p>\n<div class=\"ast-oembed-container\"><iframe title=\"Webinar Datanet: Managementul riscurilor de identitate cu Illusive Networks\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/FC51Vbzogp8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p>&nbsp;<\/p>\n<p>For additional information about endpoint protection solutions recommended by Datanet Systems specialists, as well as about the <a href=\"https:\/\/datanets.ro\/en\/technologies-and-it-solutions\/\">services delivered by our company<\/a>, please contact us by e-mail at <a href=\"mailto:sales@datanets.ro\">sales@datanets.ro<\/a>.<\/p>\n<p>______________________<\/p>\n<p><em>1 \u2013 Ransomware &#8211; A Global Data Pandemic<\/em><\/p>\n<p><em>2 \u2013 Analyzing Identity Risks 2022<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out about the digital identities of end-users protection with Illusive Networks solution.<\/p>\n","protected":false},"author":9,"featured_media":22721,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[37],"tags":[250,248,165],"class_list":["post-22783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lastest-news","tag-automation-en","tag-cybersecurity-en-2","tag-efficiency"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Datanet webinar: Reducing the risk of identity compromise with Illusive Networks<\/title>\n<meta name=\"description\" content=\"Datanet Systems webinar: Managing identity risks using agentless Illusive Networks solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datanet Systems webinar: Managing identity risks using agentless Illusive Networks solutions.\" \/>\n<meta property=\"og:description\" content=\"Datanet Systems webinar: Managing identity risks using agentless Illusive Networks solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-28T09:15:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-28T09:22:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1072\" \/>\n\t<meta property=\"og:image:height\" content=\"595\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vasile Gabriel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasile Gabriel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/\"},\"author\":{\"name\":\"Vasile Gabriel\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\"},\"headline\":\"Datanet webinar: Reducing the risk of identity compromise with Illusive Networks\",\"datePublished\":\"2022-04-28T09:15:35+00:00\",\"dateModified\":\"2022-04-28T09:22:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Webinar-Illusive.jpg\",\"keywords\":[\"Automation\",\"Cybersecurity\",\"Efficiency\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/\",\"name\":\"Datanet webinar: Reducing the risk of identity compromise with Illusive Networks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Webinar-Illusive.jpg\",\"datePublished\":\"2022-04-28T09:15:35+00:00\",\"dateModified\":\"2022-04-28T09:22:38+00:00\",\"description\":\"Datanet Systems webinar: Managing identity risks using agentless Illusive Networks solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Webinar-Illusive.jpg\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Webinar-Illusive.jpg\",\"width\":1072,\"height\":595},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/datanet-webinar-identity-protection-illusive-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEWS AND EVENTS\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/category\\\/all-articles\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u0218tiri \u0219i nout\u0103\u021bi\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/stiri-si-noutati\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Datanet webinar: Reducing the risk of identity compromise with Illusive Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\",\"name\":\"Vasile Gabriel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"caption\":\"Vasile Gabriel\"},\"sameAs\":[\"https:\\\/\\\/datanets.ro\"],\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/gabrielv\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Datanet webinar: Reducing the risk of identity compromise with Illusive Networks","description":"Datanet Systems webinar: Managing identity risks using agentless Illusive Networks solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/","og_locale":"en_US","og_type":"article","og_title":"Datanet Systems webinar: Managing identity risks using agentless Illusive Networks solutions.","og_description":"Datanet Systems webinar: Managing identity risks using agentless Illusive Networks solutions.","og_url":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2022-04-28T09:15:35+00:00","article_modified_time":"2022-04-28T09:22:38+00:00","og_image":[{"width":1072,"height":595,"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive.jpg","type":"image\/jpeg"}],"author":"Vasile Gabriel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vasile Gabriel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/"},"author":{"name":"Vasile Gabriel","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b"},"headline":"Datanet webinar: Reducing the risk of identity compromise with Illusive Networks","datePublished":"2022-04-28T09:15:35+00:00","dateModified":"2022-04-28T09:22:38+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/"},"wordCount":653,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive.jpg","keywords":["Automation","Cybersecurity","Efficiency"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/","url":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/","name":"Datanet webinar: Reducing the risk of identity compromise with Illusive Networks","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive.jpg","datePublished":"2022-04-28T09:15:35+00:00","dateModified":"2022-04-28T09:22:38+00:00","description":"Datanet Systems webinar: Managing identity risks using agentless Illusive Networks solutions.","breadcrumb":{"@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive.jpg","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/04\/Webinar-Illusive.jpg","width":1072,"height":595},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/en\/datanet-webinar-identity-protection-illusive-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NEWS AND EVENTS","item":"https:\/\/datanets.ro\/en\/category\/all-articles\/"},{"@type":"ListItem","position":3,"name":"\u0218tiri \u0219i nout\u0103\u021bi","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/stiri-si-noutati\/"},{"@type":"ListItem","position":4,"name":"Datanet webinar: Reducing the risk of identity compromise with Illusive Networks"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b","name":"Vasile Gabriel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","caption":"Vasile Gabriel"},"sameAs":["https:\/\/datanets.ro"],"url":"https:\/\/datanets.ro\/en\/author\/gabrielv\/"}]}},"modified_by":"Diana Zaharia","_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/22783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=22783"}],"version-history":[{"count":5,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/22783\/revisions"}],"predecessor-version":[{"id":22791,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/22783\/revisions\/22791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/22721"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=22783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=22783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=22783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}