{"id":23227,"date":"2022-06-08T13:12:48","date_gmt":"2022-06-08T11:12:48","guid":{"rendered":"https:\/\/datanets.ro\/challenges-and-solutions-in-securing-remote-work\/"},"modified":"2022-07-25T13:14:10","modified_gmt":"2022-07-25T11:14:10","slug":"challenges-and-solutions-in-securing-remote-work","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/","title":{"rendered":"Challenges and solutions in securing remote work"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Remote work forces companies to adopt IT security solutions to ensure both the protection of employees and their terminals, as well as data traffic and accessed IT infrastructures. Without an integrated approach, however, companies can end up in a paradoxical situation where, although they have acquired and are already using the necessary applications, such as VPN, Endpoint Security, Multi-factor Authentication, Firewall, etc., they still face difficulties in ensuring protection.\u00a0<\/strong><\/p>\n<p style=\"text-align: justify;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-large wp-image-23097 aligncenter\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s-1024x683.jpg\" alt=\"\" width=\"1024\" height=\"683\" data-wp-editing=\"1\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s-1024x683.jpg 1024w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s-300x200.jpg 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s-768x512.jpg 768w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s.jpg 1773w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: justify;\">To prevent such situations, Datanet Systems proposes a unified approach to IT security, through complementary solutions, which are natively integrated and can ensure end-to-end protection. Globally, 89% of companies have already implemented or are assessing remote work strategies (*). This is a reality also in Romania, but the adoption of the hybrid model requires not only new working procedures and investments in collaboration tools, but also new IT security strategies and solutions.<\/p>\n<p style=\"text-align: justify;\">Addressing the security requirements of hybrid work may be a challenge for many organizations, as it involves<span style=\"font-size: 16px;\">:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>Ensuring the protection of terminal devices (workstations, laptops, tablets, or smartphones) on which employees work,<\/li>\n<li>Verifying the identity of users who want to access resources and applications from the company&#8217;s IT infrastructure or from public cloud environments,<\/li>\n<li>Securing access to sensitive files and data and protecting information in transit,<\/li>\n<li>Detecting, blocking, and preventing attempts to gain unauthorized access, breach of security policies, attacks, and threats to the company&#8217;s infrastructure.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">When these &#8220;working tasks&#8221; are addressed isolated, without a coherent overview, the end result is a heterogeneous, complex, and difficult-to-manage infrastructure. Because of this, many companies are in a situation where, although they have invested in cybersecurity products, they still have low visibility into threats and potential security breaches, a low speed of response to attacks, and a low efficiency of remedial measures taken.<\/p>\n<p style=\"text-align: justify;\">\n<h4 style=\"text-align: justify;\"><strong>The advantages of the integrated security approach<\/strong><\/h4>\n<p style=\"text-align: justify;\">To prevent organizations from confronting such situations, Datanet Systems recommends an integrated security approach, based on Cisco solutions, to achieve:<\/p>\n<ul style=\"text-align: justify;\">\n<li><em><strong>Real-time security of terminal equipment and its employees<\/strong><\/em>, stored and in transit data, as well as infrastructure owned by companies, by automating detection and response measures.<\/li>\n<li><strong><em>End-to-end retrospective protection<\/em><\/strong> &#8211; from the employee level to the entire organization &#8211; against persistent threats and multi-vector attacks that manage to bypass some of the security measures and solutions.<\/li>\n<li><em><strong>Optimizing the end-user experience<\/strong><\/em> by ensuring smooth, fast, and secure workflows, adding the security component without affecting employee performance.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Cisco security solutions recommended by Datanet Systems specialists &#8211; Secure Endpoint, Duo, AnyConnect, Umbrella, and Secure Firewall &#8211; stand out not only for a high level of performance but also for their complementary approach, benefiting from the advantage of native integration. Companies can thus rely on superior protection, which also achieves significant CapEx and OpEx savings.<\/p>\n<p style=\"text-align: justify;\">\n<h4 style=\"text-align: justify;\"><strong>How Cisco solutions work together<\/strong><\/h4>\n<p style=\"text-align: justify;\">For example, Cisco AnyConnect is a VPN solution that secures employee access to data and applications and integrates numerous modules and features that increase the efficiency of the IT department. Thus, via the Umbrella Roaming module, administrators can block access to sites with a negative reputation and analyze the web traffic generated by end-users. Also, through AnyConnect, it can be installed the Cisco Duo multi-factor authentication solution on any terminal, remotely, which blocks unauthorized access. However, Duo also offers Single Sign-On functionalities, as well as tools for monitoring the level of protection of employees&#8217; equipment.<\/p>\n<p style=\"text-align: justify;\">In addition, Secure Endpoint identifies and blocks real-time threats to terminal devices and automatically detects vulnerabilities and attacks at this level, by analyzing compromise indicators, application behavior, etc. At the infrastructure level, Secure Firewall filters and controls traffic, monitors the files\u2019 trajectory in the network and uniformly enforces security policies, providing protection against advanced threats, and multi-vector attacks<span style=\"font-size: 16px;\">.<\/span><\/p>\n<p style=\"text-align: justify;\">\n<h4 style=\"text-align: justify;\"><strong>Integration requires a higher level of skills<\/strong><\/h4>\n<p style=\"text-align: justify;\">Cisco solutions can be integrated with security products and applications from other vendors, allowing companies to capitalize on investments already made in security infrastructure and achieve a higher level of protection.<\/p>\n<p style=\"text-align: justify;\">However, the implementation, customization, and integration of security solutions in an optimized security architecture, with end-to-end coverage, requires skills that frequently exceed the level of training and expertise of internal IT departments.<\/p>\n<p style=\"text-align: justify;\">By using Datanet Systems services, you can overcome these limitations as<span style=\"font-size: 16px;\">:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: 16px;\">we have IT system integrator skills and certified multi-vendor skills,<\/span><\/li>\n<li><span style=\"font-size: 16px;\">we have an accumulated solid experience in projects carried out in the field of critical security infrastructures,<\/span><\/li>\n<li><span style=\"font-size: 16px;\">we are Cisco&#8217;s partner with the largest team of certified specialists in Romania,<\/span><\/li>\n<li><span style=\"font-size: 16px;\">we provide fast technical assistance services with national coverage and training in the administration, and operation of the systems provided.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\">For more technical and business information about Cisco\u2019s integrated security architecture, the recommended solutions and Datanet\u2019s services, please contact us at <\/span><a style=\"font-size: 16px; background-color: #ffffff;\" href=\"mailto:sales@datanets.ro\" target=\"_blank\" rel=\"noopener\">sales@datanets.ro<\/a><span style=\"font-size: 16px;\">.<\/span><\/p>\n<p style=\"text-align: justify;\">______________________<\/p>\n<p style=\"text-align: justify;\"><em>Not\u0103: Original article published on www.profit.ro &#8211; <a href=\"https:\/\/www.profit.ro\/povesti-cu-profit\/it-c\/provocari-si-solutii-in-securizarea-muncii-la-distanta-20733933\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">* KPMG \u201e<a href=\"https:\/\/assets.kpmg\/content\/dam\/kpmg\/bg\/pdf\/current-trends-in-remote-working.pdf\" target=\"_blank\" rel=\"noopener\">Work from Anywhere: Insights from the research and governement perspective<\/a>\u201c<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the benefits of an integrated approach to remote work security needs based on Cisco solutions!<\/p>\n","protected":false},"author":10,"featured_media":23098,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[28],"tags":[250,305,53,248,165,209],"class_list":["post-23227","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-trends","tag-automation-en","tag-cisco-secure-endpoint-en","tag-cisco-umbrella-en","tag-cybersecurity-en-2","tag-efficiency","tag-it-security-architecture-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Challenges and solutions in securing remote work<\/title>\n<meta name=\"description\" content=\"Learn about the benefits of an integrated approach to remote work security needs based on Cisco solutions!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Challenges and solutions in securing remote work\" \/>\n<meta property=\"og:description\" content=\"Learn about the benefits of an integrated approach to remote work security needs based on Cisco solutions!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-08T11:12:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-25T11:14:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s-1024x683.jpg\" \/>\n<meta name=\"author\" content=\"Diana Zaharia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana Zaharia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/\"},\"author\":{\"name\":\"Diana Zaharia\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/8e0fc08f37652fac2a619b527cca0248\"},\"headline\":\"Challenges and solutions in securing remote work\",\"datePublished\":\"2022-06-08T11:12:48+00:00\",\"dateModified\":\"2022-07-25T11:14:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/\"},\"wordCount\":800,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/shutterstock_1848825748s.jpg\",\"keywords\":[\"Automation\",\"Cisco Secure Endpoint\",\"Cisco Umbrella\",\"Cybersecurity\",\"Efficiency\",\"IT Security Architecture\"],\"articleSection\":[\"Industry Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/\",\"name\":\"Challenges and solutions in securing remote work\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/shutterstock_1848825748s.jpg\",\"datePublished\":\"2022-06-08T11:12:48+00:00\",\"dateModified\":\"2022-07-25T11:14:10+00:00\",\"description\":\"Learn about the benefits of an integrated approach to remote work security needs based on Cisco solutions!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/shutterstock_1848825748s.jpg\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/shutterstock_1848825748s.jpg\",\"width\":1773,\"height\":1182},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/challenges-and-solutions-in-securing-remote-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NOUT\u0102\u021aI \u0218I EVENIMENTE\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tendin\u021be \u00een industrie\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/tendinte-in-industrie\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Challenges and solutions in securing remote work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/8e0fc08f37652fac2a619b527cca0248\",\"name\":\"Diana Zaharia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g\",\"caption\":\"Diana Zaharia\"},\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/diana-zaharia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Challenges and solutions in securing remote work","description":"Learn about the benefits of an integrated approach to remote work security needs based on Cisco solutions!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/","og_locale":"en_US","og_type":"article","og_title":"Challenges and solutions in securing remote work","og_description":"Learn about the benefits of an integrated approach to remote work security needs based on Cisco solutions!","og_url":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2022-06-08T11:12:48+00:00","article_modified_time":"2022-07-25T11:14:10+00:00","og_image":[{"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s-1024x683.jpg","type":"","width":"","height":""}],"author":"Diana Zaharia","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Diana Zaharia","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/"},"author":{"name":"Diana Zaharia","@id":"https:\/\/datanets.ro\/#\/schema\/person\/8e0fc08f37652fac2a619b527cca0248"},"headline":"Challenges and solutions in securing remote work","datePublished":"2022-06-08T11:12:48+00:00","dateModified":"2022-07-25T11:14:10+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/"},"wordCount":800,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s.jpg","keywords":["Automation","Cisco Secure Endpoint","Cisco Umbrella","Cybersecurity","Efficiency","IT Security Architecture"],"articleSection":["Industry Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/","url":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/","name":"Challenges and solutions in securing remote work","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s.jpg","datePublished":"2022-06-08T11:12:48+00:00","dateModified":"2022-07-25T11:14:10+00:00","description":"Learn about the benefits of an integrated approach to remote work security needs based on Cisco solutions!","breadcrumb":{"@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s.jpg","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/06\/shutterstock_1848825748s.jpg","width":1773,"height":1182},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/en\/challenges-and-solutions-in-securing-remote-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NOUT\u0102\u021aI \u0218I EVENIMENTE","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/"},{"@type":"ListItem","position":3,"name":"Tendin\u021be \u00een industrie","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/tendinte-in-industrie\/"},{"@type":"ListItem","position":4,"name":"Challenges and solutions in securing remote work"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/8e0fc08f37652fac2a619b527cca0248","name":"Diana Zaharia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/940ddcf02b41762428b83926178c2e7e9e96e170965e8ca77fe2387a66e8af56?s=96&d=mm&r=g","caption":"Diana Zaharia"},"url":"https:\/\/datanets.ro\/en\/author\/diana-zaharia\/"}]}},"modified_by":"Diana Zaharia","_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=23227"}],"version-history":[{"count":1,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23227\/revisions"}],"predecessor-version":[{"id":23229,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23227\/revisions\/23229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/23098"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=23227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=23227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=23227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}