{"id":23786,"date":"2022-12-14T09:31:21","date_gmt":"2022-12-14T07:31:21","guid":{"rendered":"https:\/\/datanets.ro\/datanet-workshop-take-control-of-digital-identities-with-cyberark-solutions\/"},"modified":"2022-12-14T09:31:21","modified_gmt":"2022-12-14T07:31:21","slug":"datanet-workshop-take-control-of-digital-identities-with-cyberark-solutions","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/datanet-workshop-take-control-of-digital-identities-with-cyberark-solutions\/","title":{"rendered":"Datanet workshop: Take control of digital identities with CyberArk solutions"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Over the past two years, organizations have been confronted with a proliferation of digital identities to manage, with each newly created identity, whether it belongs to a human user, an app, or a device, representing potential access for attackers.<\/strong><\/p>\n<p style=\"text-align: justify;\">Digital identities do not pose security risks as long as they are effectively managed and properly protected. But enterprise transformation initiatives, such as Cloud migration, automation, DevOps, remote work, etc., generated an unprecedented increase in the number of privileged identities, making them valuable targets.<\/p>\n<p>In fact, statistics show that over 80% of security breaches are based on compromised login data<span style=\"font-size: 16px;\">.<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-23776 size-full\" title=\"Identity Security\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1.jpg\" alt=\"\" width=\"1200\" height=\"629\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1.jpg 1200w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1-300x157.jpg 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1-1024x537.jpg 1024w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1-768x403.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">To help companies keep this growing category of risks under control, Datanet Systems recently organized, in partnership with CyberArk and <a href=\"https:\/\/clico.ro\/\">Clico Rom\u00e2nia<\/a>, the main local distributor of CyberArk solutions, a seminar dedicated to digital identity protection solutions.<\/p>\n<p style=\"text-align: justify;\">CyberArk is a market leader in Identity Security solutions, with the help of which organizations can ensure the extended protection of not only IT environments but also operational ones and critical infrastructures.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Identity Security, the pillar of modern security architectures<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">The Identity Security concept, promoted by CyberArk, is based on intelligent control of privileges associated with each identity, automatic management of their life cycle, and continuous detection and protection against threats, all through a unified approach.<\/p>\n<blockquote><p>\u201ePrivileged access management is at the heart of the modern security framework, giving companies the ability to protect all identities &#8211; not just those that IT identifies as privileged accounts &#8211; regardless of where they are located,&#8221; mentioned\u00a0<strong>Tamir Ben Ari, Sales Engineer at CyberArk.<\/strong><\/p><\/blockquote>\n<p style=\"text-align: justify;\">Intelligent privilege management \u2013 through specific measures such as isolating and monitoring sessions, restricting or lifting rights, applying measures based on the risk profile of each identity, etc. \u2013 is integrated with access and identity management capabilities.<\/p>\n<p style=\"text-align: justify;\">This enables IT departments and\/or Security Operations (SOC) teams to continuously monitor access to users, applications, and equipment in both on-premises, hybrid, and multi-cloud environments<span style=\"font-size: 16px;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Business benefits gained by companies<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>Using CyberArk&#8217;s Identity Security solutions, organizations get the support they need to:<\/p>\n<ul>\n<li><strong>Increase operational efficiency<\/strong> \u2013 CyberArk solutions provide organization-wide protection, enabling just-in-time user access, and eliminating the complexity associated with protecting identities;<\/li>\n<li><strong>Accelerate digital transformation efforts <\/strong>\u2013 Identity Security applications provide end users with a frictionless experience (with options for Single-Sign-On, MFA, biometric authentication, etc.), as well as extended protection, regardless of the environment (on-premises, hybrid or multi-cloud);<\/li>\n<li><strong>Mitigate cyber risks<\/strong>: Using CyberArk solutions, security teams can quickly identify compromised identities, prevent the theft of critical data by applying the principle of least privilege, isolate, and block threats before they propagate, and more;<\/li>\n<li><strong>Compliance with audit and compliance requirements: <\/strong>Identity Security provides a common framework for all audit and compliance requirements, providing higher visibility. Thus, all identities (IT administrators, remote workers, third-party providers, etc.) and resources (applications and services, sensitive data, terminal equipment, etc.) are easier to monitor, manage, and audit.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><strong>Work scenarios and practical use-cases<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">The &#8220;<strong>Your path to Identity Security<\/strong>&#8221; seminar included several presentation sessions. Thus, <strong>Eduard Stoica, Presales Consultant at Datanet Systems<\/strong>, showed a series of common working scenarios with CyberArk Privileged Access Management (PAM) solution, practical ways to monitor user actions, and set rules and automatic response measures, etc.<\/p>\n<p>In turn, the CyberArk specialist showed how a 3rd-party access account (for vendors, partners, suppliers, etc.) can be set up in less than two minutes using the<a style=\"font-size: 16px; background-color: #ffffff;\" href=\"https:\/\/datanets.ro\/webinar-datanet-management-conturi-privilegiate-cu-cyberark-pam\/\"> PAM solution<\/a><span style=\"font-size: 16px;\">, <\/span>but also how it can be used to develop a Zero Trust security strategy.<\/p>\n<p>For more information on how you can achieve privileged access management with CyberArk solutions, we also invite you to watch Datanet Systems&#8217; recent webinar, available below, in Romanian<span style=\"font-size: 16px; text-align: justify;\">:<\/span><\/p>\n<div class=\"ast-oembed-container\"><iframe title=\"Webinar Datanet: Managementul accesului privilegiat cu solu\u021biile CyberArk\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/AWplZ41dbNM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Also, for additional technical data about CyberArk solutions, as well as about the full range of services provided by Datanet, you can contact us via email at <a href=\"mailto:sales@datanets.ro\">sales@datanets.ro<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out how to control the digital identities with CyberArk solutions!<\/p>\n","protected":false},"author":9,"featured_media":23777,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[37],"tags":[250,310,248,165,295,209,311],"class_list":["post-23786","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lastest-news","tag-automation-en","tag-cyberark-en","tag-cybersecurity-en-2","tag-efficiency","tag-hybrid-cloud-en-2","tag-it-security-architecture-en","tag-pam-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Datanet workshop: Take control of digital identities with CyberArk solutions<\/title>\n<meta name=\"description\" content=\"CyberArk Identity Security is an advanced solution for controlling digital identities and privileged accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberArk Identity Security is an advanced solution for controlling digital identities and privileged accounts.\" \/>\n<meta property=\"og:description\" content=\"CyberArk Identity Security is an advanced solution for controlling digital identities and privileged accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-14T07:31:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vasile Gabriel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasile Gabriel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/\"},\"author\":{\"name\":\"Vasile Gabriel\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\"},\"headline\":\"Datanet workshop: Take control of digital identities with CyberArk solutions\",\"datePublished\":\"2022-12-14T07:31:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/CyberArc-Security-Identity-1.jpg\",\"keywords\":[\"Automation\",\"CyberArk\",\"Cybersecurity\",\"Efficiency\",\"Hybrid cloud\",\"IT Security Architecture\",\"PAM\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/\",\"name\":\"Datanet workshop: Take control of digital identities with CyberArk solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/CyberArc-Security-Identity-1.jpg\",\"datePublished\":\"2022-12-14T07:31:21+00:00\",\"description\":\"CyberArk Identity Security is an advanced solution for controlling digital identities and privileged accounts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/CyberArc-Security-Identity-1.jpg\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/CyberArc-Security-Identity-1.jpg\",\"width\":1200,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/webinar-datanet-control-identitate-digitala-cu-identitity-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NOUT\u0102\u021aI \u0218I EVENIMENTE\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u0218tiri \u0219i nout\u0103\u021bi\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/stiri-si-noutati\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Datanet workshop: Take control of digital identities with CyberArk solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\",\"name\":\"Vasile Gabriel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"caption\":\"Vasile Gabriel\"},\"sameAs\":[\"https:\\\/\\\/datanets.ro\"],\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/gabrielv\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Datanet workshop: Take control of digital identities with CyberArk solutions","description":"CyberArk Identity Security is an advanced solution for controlling digital identities and privileged accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/","og_locale":"en_US","og_type":"article","og_title":"CyberArk Identity Security is an advanced solution for controlling digital identities and privileged accounts.","og_description":"CyberArk Identity Security is an advanced solution for controlling digital identities and privileged accounts.","og_url":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2022-12-14T07:31:21+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1.jpg","type":"image\/jpeg"}],"author":"Vasile Gabriel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vasile Gabriel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/"},"author":{"name":"Vasile Gabriel","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b"},"headline":"Datanet workshop: Take control of digital identities with CyberArk solutions","datePublished":"2022-12-14T07:31:21+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/"},"wordCount":659,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1.jpg","keywords":["Automation","CyberArk","Cybersecurity","Efficiency","Hybrid cloud","IT Security Architecture","PAM"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/","url":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/","name":"Datanet workshop: Take control of digital identities with CyberArk solutions","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1.jpg","datePublished":"2022-12-14T07:31:21+00:00","description":"CyberArk Identity Security is an advanced solution for controlling digital identities and privileged accounts.","breadcrumb":{"@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1.jpg","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/12\/CyberArc-Security-Identity-1.jpg","width":1200,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/webinar-datanet-control-identitate-digitala-cu-identitity-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NOUT\u0102\u021aI \u0218I EVENIMENTE","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/"},{"@type":"ListItem","position":3,"name":"\u0218tiri \u0219i nout\u0103\u021bi","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/stiri-si-noutati\/"},{"@type":"ListItem","position":4,"name":"Datanet workshop: Take control of digital identities with CyberArk solutions"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b","name":"Vasile Gabriel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","caption":"Vasile Gabriel"},"sameAs":["https:\/\/datanets.ro"],"url":"https:\/\/datanets.ro\/en\/author\/gabrielv\/"}]}},"modified_by":null,"_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=23786"}],"version-history":[{"count":0,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23786\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/23777"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=23786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=23786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=23786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}