{"id":2888,"date":"2024-01-16T11:25:53","date_gmt":"2024-01-16T10:25:53","guid":{"rendered":"https:\/\/enical-ci.com\/?p=2888"},"modified":"2024-02-22T15:05:33","modified_gmt":"2024-02-22T14:05:33","slug":"enical-technologies-lance-palo-alto-en-cote-divoire","status":"publish","type":"post","link":"https:\/\/enical-ci.com\/en\/enical-technologies-lance-palo-alto-en-cote-divoire\/","title":{"rendered":"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire."},"content":{"rendered":"<h2>Pourquoi Palo Alto ?<\/h2>\n<p>Le firewall est le composant le plus strat\u00e9gique de l\u2019infrastructure de s\u00e9curit\u00e9 r\u00e9seau. Il surveille tout le trafic et se positionne \u00e0 l\u2019emplacement le plus efficace pour renforcer la politique de s\u00e9curit\u00e9.Malheureusement, les firewalls traditionnels s\u2019appuient sur les ports et les protocoles pour classifier le trafic, permettant aux applications et aux utilisateurs f\u00e9rus de technologies de les contourner avec facilit\u00e9, en sautant des ports, en utilisant le SSL, en se faufilant \u00e0 travers le port 80, ou en utilisant des ports non standards.Le firewall est le composant le plus strat\u00e9gique de l\u2019infrastructure de s\u00e9curit\u00e9 r\u00e9seau. Il surveille tout le trafic et se positionne \u00e0 l\u2019emplacement le plus efficace pour renforcer la politique de s\u00e9curit\u00e9.Malheureusement, les firewalls traditionnels s\u2019appuient sur les ports et les protocoles pour classifier le trafic, permettant aux applications et aux utilisateurs f\u00e9rus de technologies de les contourner avec facilit\u00e9, en sautant des ports, en utilisant le SSL, en se faufilant \u00e0 travers le port 80, ou en utilisant des ports non standards.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" class=\"wp-image-705\" src=\"http:\/\/enical-group.com\/technologies\/wp-content\/uploads\/2019\/02\/palo-alto.png\" sizes=\"(max-width: 309px) 100vw, 309px\" srcset=\"http:\/\/enical-group.com\/technologies\/wp-content\/uploads\/2019\/02\/palo-alto.png 309w, http:\/\/enical-group.com\/technologies\/wp-content\/uploads\/2019\/02\/palo-alto-300x158.png 300w\" alt=\"\" \/><\/figure>\n<p>La perte de visibilit\u00e9 et de contr\u00f4le placent les administrateurs dans une situation dangereuse et exposent les entreprises \u00e0 des pannes r\u00e9seaux, des violations de conformit\u00e9, une augmentation des d\u00e9penses op\u00e9rationnelles et une \u00e9ventuelle perte de donn\u00e9es. L\u2019approche historique pour restaurer cette visibilit\u00e9 et ce contr\u00f4le, n\u00e9cessite que les \u00ab\u00a0firewall helpers\u00a0\u00bb soient d\u00e9ploy\u00e9s individuellement.Aucune de ces m\u00e9thodes ne permet de r\u00e9soudre ces probl\u00e8mes en raison d\u2019une visibilit\u00e9 limit\u00e9e du trafic, une gestion lourde, et une latence des processus de num\u00e9risation.Restaurer la visibilit\u00e9 et le contr\u00f4le n\u00e9cessite une nouvelle approche.Ce qu\u2019il faut, c\u2019est un firewall next-generation.Principales exigences du Next-Generation Firewall :Identifier les applications, pas les ports : identifier exactement en quoi consiste l\u2019application, \u00e0 travers tous les ports, ind\u00e9pendamment des protocoles, cryptage SSL, ou tactiques \u00e9vasives. L\u2019identit\u00e9 de l\u2019application devient la base de toute politique de s\u00e9curit\u00e9.Identifier les utilisateurs, pas seulement les adresses IP : tirer parti des informations stock\u00e9es dans le r\u00e9pertoire de l\u2019entreprise pour la visibilit\u00e9, la cr\u00e9ation de politique, de rapports et d\u2019enqu\u00eates juridiques.Inspecter le contenu en temps r\u00e9el : prot\u00e9ger votre r\u00e9seau contre les attaques et les menaces incorpor\u00e9es dans le trafic des applications \u00e0 faible latence, vitesse haut d\u00e9bit.Simplifier la politique de management : restaurer la visibilit\u00e9 et le contr\u00f4le avec des outils graphiques simples d\u2019utilisation et un \u00e9diteur de politique liant les applications, les utilisateurs et le contenu d\u2019une mani\u00e8re unifi\u00e9e.D\u00e9livrer un d\u00e9bit multi-gigabit : combiner un hardware performant et un software con\u00e7u \u00e0 cet effet.Palo Alto Networks a \u00e9t\u00e9 fond\u00e9e par le visionnaire de s\u00e9curit\u00e9 Nir Zuk, avec pour mission de r\u00e9inventer le firewall de fa\u00e7on \u00e0 ce qu\u2019il puisse devenir le dispositif de s\u00e9curit\u00e9 r\u00e9seau le plus important strat\u00e9giquement parlant.Le firewall next-generation de Palo Alto Networks permet une visibilit\u00e9 et un contr\u00f4le des applications et du contenu sans pr\u00e9c\u00e9dent \u2013 par utilisateur et non uniquement par adresses IP \u2013 jusqu\u2019\u00e0 10 Gbps.Bas\u00e9 sur la technologie App-ID\u2122 en instance de brevet, les next-generation firewall de Palo Alto identifient avec pr\u00e9cision les applications \u2013 quels que soient le port, protocole, tactiques \u00e9vasives ou chiffrement SSL \u2013 et num\u00e9risent le contenu pour stopper les menaces et emp\u00eacher la fuite de donn\u00e9es.Avec Palo Alto, les entreprises peuvent, pour la premi\u00e8re fois, adopter et b\u00e9n\u00e9ficier d\u2019une nouvelle g\u00e9n\u00e9ration d\u2019applications tout en conservant une visibilit\u00e9 et un contr\u00f4le complets.<\/p>\n<p><a href=\"http:\/\/www.paloaltonetworks.fr\/\">www.paloaltonetworks.fr<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Pourquoi Palo Alto ? Le firewall est le composant le plus strat\u00e9gique de l\u2019infrastructure de s\u00e9curit\u00e9 r\u00e9seau. Il surveille tout le trafic et se positionne \u00e0 l\u2019emplacement le plus efficace pour renforcer la politique de s\u00e9curit\u00e9.Malheureusement, les firewalls traditionnels s\u2019appuient sur les ports et les protocoles pour classifier le trafic, permettant aux applications et aux [&hellip;]<\/p>","protected":false},"author":1,"featured_media":2890,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[66],"tags":[],"class_list":["post-2888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enical lance Palo Alto en C\u00f4te d\u2019Ivoire. - enical<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enical-ci.com\/en\/enical-technologies-lance-palo-alto-en-cote-divoire\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire. - enical\" \/>\n<meta property=\"og:description\" content=\"Pourquoi Palo Alto ? Le firewall est le composant le plus strat\u00e9gique de l\u2019infrastructure de s\u00e9curit\u00e9 r\u00e9seau. Il surveille tout le trafic et se positionne \u00e0 l\u2019emplacement le plus efficace pour renforcer la politique de s\u00e9curit\u00e9.Malheureusement, les firewalls traditionnels s\u2019appuient sur les ports et les protocoles pour classifier le trafic, permettant aux applications et aux [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enical-ci.com\/en\/enical-technologies-lance-palo-alto-en-cote-divoire\/\" \/>\n<meta property=\"og:site_name\" content=\"enical\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/enical.technologies\/?locale=fr_FR\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-16T10:25:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-22T14:05:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enical-ci.com\/wp-content\/uploads\/2024\/01\/Palo-alto.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enical\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enical\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/\"},\"author\":{\"name\":\"Enical\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#\\\/schema\\\/person\\\/641b1a49c9b2e0ab30caf6f51bf072ec\"},\"headline\":\"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire.\",\"datePublished\":\"2024-01-16T10:25:53+00:00\",\"dateModified\":\"2024-02-22T14:05:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/\"},\"wordCount\":637,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/enical-ci.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Palo-alto.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/\",\"url\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/\",\"name\":\"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire. - enical\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/enical-ci.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Palo-alto.png\",\"datePublished\":\"2024-01-16T10:25:53+00:00\",\"dateModified\":\"2024-02-22T14:05:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/#primaryimage\",\"url\":\"https:\\\/\\\/enical-ci.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Palo-alto.png\",\"contentUrl\":\"https:\\\/\\\/enical-ci.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Palo-alto.png\",\"width\":850,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/enical-technologies-lance-palo-alto-en-cote-divoire\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/enical-ci.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#website\",\"url\":\"https:\\\/\\\/enical-ci.com\\\/\",\"name\":\"enical\",\"description\":\"Fournisseur de solution num\u00e9riques\",\"publisher\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/enical-ci.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#organization\",\"name\":\"enical\",\"url\":\"https:\\\/\\\/enical-ci.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/enical-ci.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cropped-logo-nobackground-1000.png\",\"contentUrl\":\"https:\\\/\\\/enical-ci.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cropped-logo-nobackground-1000.png\",\"width\":716,\"height\":243,\"caption\":\"enical\"},\"image\":{\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/enical.technologies\\\/?locale=fr_FR\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/enical-ci.com\\\/#\\\/schema\\\/person\\\/641b1a49c9b2e0ab30caf6f51bf072ec\",\"name\":\"Enical\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a02b94fed00e8c435a3897ad7d08ec73dbd1d19229eb1c39ab931bf3c187570a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a02b94fed00e8c435a3897ad7d08ec73dbd1d19229eb1c39ab931bf3c187570a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a02b94fed00e8c435a3897ad7d08ec73dbd1d19229eb1c39ab931bf3c187570a?s=96&d=mm&r=g\",\"caption\":\"Enical\"},\"sameAs\":[\"https:\\\/\\\/enical-ci.com\"],\"url\":\"https:\\\/\\\/enical-ci.com\\\/en\\\/author\\\/tamon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire. - enical","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enical-ci.com\/en\/enical-technologies-lance-palo-alto-en-cote-divoire\/","og_locale":"en_GB","og_type":"article","og_title":"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire. - enical","og_description":"Pourquoi Palo Alto ? Le firewall est le composant le plus strat\u00e9gique de l\u2019infrastructure de s\u00e9curit\u00e9 r\u00e9seau. Il surveille tout le trafic et se positionne \u00e0 l\u2019emplacement le plus efficace pour renforcer la politique de s\u00e9curit\u00e9.Malheureusement, les firewalls traditionnels s\u2019appuient sur les ports et les protocoles pour classifier le trafic, permettant aux applications et aux [&hellip;]","og_url":"https:\/\/enical-ci.com\/en\/enical-technologies-lance-palo-alto-en-cote-divoire\/","og_site_name":"enical","article_publisher":"https:\/\/www.facebook.com\/enical.technologies\/?locale=fr_FR","article_published_time":"2024-01-16T10:25:53+00:00","article_modified_time":"2024-02-22T14:05:33+00:00","og_image":[{"width":850,"height":480,"url":"https:\/\/enical-ci.com\/wp-content\/uploads\/2024\/01\/Palo-alto.png","type":"image\/png"}],"author":"Enical","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enical","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/#article","isPartOf":{"@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/"},"author":{"name":"Enical","@id":"https:\/\/enical-ci.com\/#\/schema\/person\/641b1a49c9b2e0ab30caf6f51bf072ec"},"headline":"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire.","datePublished":"2024-01-16T10:25:53+00:00","dateModified":"2024-02-22T14:05:33+00:00","mainEntityOfPage":{"@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/"},"wordCount":637,"commentCount":0,"publisher":{"@id":"https:\/\/enical-ci.com\/#organization"},"image":{"@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/#primaryimage"},"thumbnailUrl":"https:\/\/enical-ci.com\/wp-content\/uploads\/2024\/01\/Palo-alto.png","articleSection":["News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/","url":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/","name":"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire. - enical","isPartOf":{"@id":"https:\/\/enical-ci.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/#primaryimage"},"image":{"@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/#primaryimage"},"thumbnailUrl":"https:\/\/enical-ci.com\/wp-content\/uploads\/2024\/01\/Palo-alto.png","datePublished":"2024-01-16T10:25:53+00:00","dateModified":"2024-02-22T14:05:33+00:00","breadcrumb":{"@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/#primaryimage","url":"https:\/\/enical-ci.com\/wp-content\/uploads\/2024\/01\/Palo-alto.png","contentUrl":"https:\/\/enical-ci.com\/wp-content\/uploads\/2024\/01\/Palo-alto.png","width":850,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/enical-ci.com\/enical-technologies-lance-palo-alto-en-cote-divoire\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/enical-ci.com\/"},{"@type":"ListItem","position":2,"name":"Enical lance Palo Alto en C\u00f4te d\u2019Ivoire."}]},{"@type":"WebSite","@id":"https:\/\/enical-ci.com\/#website","url":"https:\/\/enical-ci.com\/","name":"enical","description":"Fournisseur de solution num\u00e9riques","publisher":{"@id":"https:\/\/enical-ci.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enical-ci.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/enical-ci.com\/#organization","name":"enical","url":"https:\/\/enical-ci.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/enical-ci.com\/#\/schema\/logo\/image\/","url":"https:\/\/enical-ci.com\/wp-content\/uploads\/2024\/01\/cropped-logo-nobackground-1000.png","contentUrl":"https:\/\/enical-ci.com\/wp-content\/uploads\/2024\/01\/cropped-logo-nobackground-1000.png","width":716,"height":243,"caption":"enical"},"image":{"@id":"https:\/\/enical-ci.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/enical.technologies\/?locale=fr_FR"]},{"@type":"Person","@id":"https:\/\/enical-ci.com\/#\/schema\/person\/641b1a49c9b2e0ab30caf6f51bf072ec","name":"Enical","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/a02b94fed00e8c435a3897ad7d08ec73dbd1d19229eb1c39ab931bf3c187570a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a02b94fed00e8c435a3897ad7d08ec73dbd1d19229eb1c39ab931bf3c187570a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a02b94fed00e8c435a3897ad7d08ec73dbd1d19229eb1c39ab931bf3c187570a?s=96&d=mm&r=g","caption":"Enical"},"sameAs":["https:\/\/enical-ci.com"],"url":"https:\/\/enical-ci.com\/en\/author\/tamon\/"}]}},"_links":{"self":[{"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/posts\/2888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/comments?post=2888"}],"version-history":[{"count":0,"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/posts\/2888\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/media\/2890"}],"wp:attachment":[{"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/media?parent=2888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/categories?post=2888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enical-ci.com\/en\/wp-json\/wp\/v2\/tags?post=2888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}