{"id":17989,"date":"2024-01-04T09:32:59","date_gmt":"2024-01-04T09:32:59","guid":{"rendered":"https:\/\/www.ignition-technology.com\/be\/?page_id=17989"},"modified":"2024-02-12T14:49:32","modified_gmt":"2024-02-12T14:49:32","slug":"cyber-risk-assessment","status":"publish","type":"page","link":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/","title":{"rendered":"Cyber Risk Assessment"},"content":{"rendered":"<h1 style=\"text-align: center;\">Cyber Risk Assesment<\/h1>\n<h5 style=\"text-align: center;\"><span style=\"color: #fff;\">Our comprehensive Cyber Risk Assessment (CRA) is a transformative service that identifies technology, services, and compliance gaps within an end user environment. Providing strategic insights and tailored recommendations, delivering unparalleled value.<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/be\/wp-content\/uploads\/sites\/18\/2024\/01\/Service-Icons_CRA.svg\" alt=\"Blue Gradient Icon for Cyber Risk Assessment\" \/><\/p>\n<h4>What is Cybersecurity Risk Assessment?<\/h4>\n<p>What sets our Cybersecurity Risk Assessment apart, is that it\u2019s powered by technology. Our tools provide a view and analysis of your environment without needing to deploy any agents. The findings are based on the risks and data the technologies find in your live environment.<\/p>\n<h4>Why do you Cybersecurity Risk Assessment?<\/h4>\n<p><span style=\"letter-spacing: 0px;\">Our assessment helps organisations prioritise some key areas of cyber risk and hygiene within their systems, allowing them to proactively identify their strength in areas such as asset management, email security and external attack surface. Armed with this knowledge, organisations can make informed decisions regarding cybersecurity investments, prioritise risk mitigation efforts, and allocate resources effectively.<\/span><\/p>\n<p>Our cyber risk assessment service is an essential step towards building a resilient and secure digital\u00a0<span style=\"letter-spacing: 0px;\">infrastructure, safeguarding valuable assets, and ensuring the long-term success and growth of an\u00a0<\/span><span style=\"letter-spacing: 0px;\">organisation in today&#8217;s high-risk cyber landscape.<\/span><\/p>\n<h2 style=\"text-align: left;\">What are the Benefits of Cybersecurity Risk Assessment?<\/h2>\n<p style=\"color: #828896; text-align: left;\"><span style=\"letter-spacing: 0px;\">A comprehensive report and presentation is produced which details various aspects of the organisations cybersecurity posture, including areas such as:<\/span><\/p>\n<p>Asset ManagementGain a more complete picture of numbers of users and devices, giving insights into factual license requirements and gaps where technology may be missing.<br \/>\nEmail SecurityUse AI Email Behavioural benchmarking to identify email attacks which may have gone undetected by other email protection solutions. Detect greymail, account takeovers and other email-based threats.<br \/>\nPrivileged AccessAudit Local Privileged Account hygiene, including number of administrative accounts per corporate device, to help identify lateral movement risk.<br \/>\nCloud Application SecurityRun an assessment on the security policies of your primary cloud application, such as M365 of Salesforce. Compare this data with best practice to help identify any immediate causes of concern.<br \/>\nExternal Attack SurfaceIdentify the global attack surface of your own organisation, including that of any subsidiaries. Discovering the details of public facing assets gives a picture of what an external attacker can see.<br \/>\nBrand and Third-Party ReputationUnderstand the external risks of your environment, as well as your critical suppliers. This data can be used to improve security posture, and to gain awareness of how your brand compares to competitors.<br \/>\nExposed CredentialsLearn what corporate credentials have been discovered upon the dark web, and compare this to what users are still active in your environment for a real-time picture of authentication attack risk.<\/p>\n<p>Asset ManagementGain a more complete picture of numbers of users and devices, giving insights into factual license requirements and gaps where technology may be missing.<br \/>\nEmail SecurityUse AI Email Behavioural benchmarking to identify email attacks which may have gone undetected by other email protection solutions. Detect greymail, account takeovers and other email-based threats.<br \/>\nPrivileged AccessAudit Local Privileged Account hygiene, including number of administrative accounts per corporate device, to help identify lateral movement risk.<br \/>\nCloud Application SecurityRun an assessment on the security policies of your primary cloud application, such as M365 of Salesforce. Compare this data with best practice to help identify any immediate causes of concern.<\/p>\n<p>External Attack SurfaceIdentify the global attack surface of your own organisation, including that of any subsidiaries. Discovering the details of public facing assets gives a picture of what an external attacker can see.<br \/>\nBrand and Third-Party ReputationUnderstand the external risks of your environment, as well as your critical suppliers. This data can be used to improve security posture, and to gain awareness of how your brand compares to competitors.<br \/>\nExposed CredentialsLearn what corporate credentials have been discovered upon the dark web, and compare this to what users are still active in your environment for a real-time picture of authentication attack risk.<\/p>\n<h2>What people have to say about Cybersecurity Risk Assessment&#8230;<\/h2>\n<ul class=\"testimonials_slider_ul\">\n<li><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/be\/wp-content\/themes\/betheme\/images\/testimonials-placeholder.png\" alt=\"\" \/>\u201cIt\u2019s good value, and I would pay more knowing what it is now\u201d<br \/>\n<h5 class=\"title\"><\/h5>\n<p>&nbsp;<\/li>\n<li><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/be\/wp-content\/themes\/betheme\/images\/testimonials-placeholder.png\" alt=\"\" \/>\u201cReally enjoyed the interview stage (questionnaire)\u201d<br \/>\n<h5 class=\"title\"><\/h5>\n<p>&nbsp;<\/li>\n<li><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/be\/wp-content\/themes\/betheme\/images\/testimonials-placeholder.png\" alt=\"\" \/>\u201cReally useful, right level of detail\u201d<br \/>\n<h5 class=\"title\"><\/h5>\n<p>&nbsp;<\/li>\n<li><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/be\/wp-content\/themes\/betheme\/images\/testimonials-placeholder.png\" alt=\"\" \/>\u201cLow maintenance, high value output\u201d<br \/>\n<h5 class=\"title\"><\/h5>\n<p>&nbsp;<\/li>\n<li><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/be\/wp-content\/themes\/betheme\/images\/testimonials-placeholder.png\" alt=\"\" \/>&#8220;The whole process was low overhead on our part&#8221;<br \/>\n<h5 class=\"title\"><\/h5>\n<p>&nbsp;<\/li>\n<\/ul>\n<h2>Other Services<\/h2>\n<p><a class=\"\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/services\/technical-services\/\"><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com \/wp-content\/uploads\/sites\/18\/2024\/01\/Service-Icons-05.svg\" alt=\"\" \/><\/a><\/p>\n<h4>Technical Services<\/h4>\n<p>&nbsp;<\/p>\n<p><a class=\"\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/services\/marketing-services\/\"><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com \/wp-content\/uploads\/sites\/18\/2024\/01\/Service-Icons-06-1.svg\" alt=\"\" \/><\/a><\/p>\n<h4>Marketing Services<\/h4>\n<p>&nbsp;<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/www.ignition-technology.com\/services\/\"><span class=\"button_label\">View all Services<\/span><\/a><\/p>\n<h2>How Do We Partner With Ignition?<\/h2>\n<p>We are keen to work with like-minded partners that are looking to drive business and successful outcomes for their customers. If you are a VAR interested in any of the technologies across our portfolio, get in touch with our team today.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"\/become-a-partner\/\"><span class=\"button_label\">Become a Partner<\/span><\/a><\/p>\n<p><span class=\"num\">1<\/span>How do I become an Ignition Technology Partner or VAR?You can get in touch with us by clicking on the Become a Partner button or via the information on our Contact Us page. Once we receive your request, we\u2019ll get one of Channel specialists to contact you and take you through our onboarding process.<br \/>\n<span class=\"num\">2<\/span>What support does Ignition Technology offer Partners or VARs?At Ignition Technology, we work as an extension of your team. Whether you need support with sales &amp; product training, pre-sales services, go-to-marketing &amp; lead-gen campaigns, or implementation, our team is ready to help you identify &amp; convert opportunities across our portfolio.<br \/>\n<span class=\"num\">3<\/span>Why partner with Ignition Technology?Nobody knows cloud &amp; Saas cybersecurity solutions like we do. Our team understands the intricacies of the industry, the complexities of the technologies in the market, and are committed to developing and supporting the channel.<br \/>\n<span class=\"num\">4<\/span>How long does it take to become a Partner?No two VARs are the same. Once our team has made contact with you and understood your requirements, we\u2019ll build out an onboarding programme that is unique to you and the vendors that you would like to sell. The programme will include a short qualification process and if successful will be followed by dedicated enablement sessions. You could be transacting in a matter of weeks.<br \/>\n<span class=\"num\">5<\/span>How do I transact through Ignition Technology?We work closely with our Vendors and will support you in protecting your opportunities by registering your deals. We will follow up, keeping you informed every step of the way.<\/p>\n<h2><span style=\"color: #ffffff;\">Follow us on<\/span> <span style=\"color: #41bfea; letter-spacing: 0px;\">LinkedIn<\/span> <span style=\"color: #ffffff; letter-spacing: 0px;\">for the latest industry news and events!<\/span><\/h2>\n<p><a class=\"button button_size_2\" title=\"\" href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwids6yAo4KEAxUPUkEAHSDLDxcQFnoECBEQAQ&amp;url=https%3A%2F%2Fuk.linkedin.com%2Fcompany%2Fignition-technology&amp;usg=AOvVaw26OjtsUw0Rb2qaWdv6TRzX&amp;opi=89978449\"><span class=\"button_label\">Follow Now<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Risk Assesment Our comprehensive Cyber Risk Assessment (CRA) is a transformative service that identifies technology, services, and compliance gaps<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":13,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-17989","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Risk Assessment Services<\/title>\n<meta name=\"description\" content=\"Our Cybersecurity Risk Assessment (CRA) identifies technology, services, and compliance gaps within an end-user cybersecurity posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Risk Assessment\" \/>\n<meta property=\"og:description\" content=\"Our Cybersecurity Risk Assessment (CRA) identifies technology, services, and compliance gaps within an end-user cybersecurity posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology Benelux\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T14:49:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ignition-technology.com\/be\/wp-content\/uploads\/sites\/18\/2024\/01\/Service-Icons_CRA.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/cyber-risk-assessment\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/cyber-risk-assessment\\\/\",\"name\":\"Cybersecurity Risk Assessment Services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/cyber-risk-assessment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/cyber-risk-assessment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/be\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2024\\\/01\\\/Service-Icons_CRA.svg\",\"datePublished\":\"2024-01-04T09:32:59+00:00\",\"dateModified\":\"2024-02-12T14:49:32+00:00\",\"description\":\"Our Cybersecurity Risk Assessment (CRA) identifies technology, services, and compliance gaps within an end-user cybersecurity posture.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/cyber-risk-assessment\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/cyber-risk-assessment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/cyber-risk-assessment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/be\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2024\\\/01\\\/Service-Icons_CRA.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/be\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2024\\\/01\\\/Service-Icons_CRA.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/cyber-risk-assessment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Risk Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Risk Assessment Services","description":"Our Cybersecurity Risk Assessment (CRA) identifies technology, services, and compliance gaps within an end-user cybersecurity posture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber Risk Assessment","og_description":"Our Cybersecurity Risk Assessment (CRA) identifies technology, services, and compliance gaps within an end-user cybersecurity posture.","og_url":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/","og_site_name":"Ignition Technology Benelux","article_modified_time":"2024-02-12T14:49:32+00:00","og_image":[{"url":"https:\/\/www.ignition-technology.com\/be\/wp-content\/uploads\/sites\/18\/2024\/01\/Service-Icons_CRA.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ignition_tech","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/","url":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/","name":"Cybersecurity Risk Assessment Services","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/be\/wp-content\/uploads\/sites\/18\/2024\/01\/Service-Icons_CRA.svg","datePublished":"2024-01-04T09:32:59+00:00","dateModified":"2024-02-12T14:49:32+00:00","description":"Our Cybersecurity Risk Assessment (CRA) identifies technology, services, and compliance gaps within an end-user cybersecurity posture.","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/be\/wp-content\/uploads\/sites\/18\/2024\/01\/Service-Icons_CRA.svg","contentUrl":"https:\/\/www.ignition-technology.com\/be\/wp-content\/uploads\/sites\/18\/2024\/01\/Service-Icons_CRA.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/benelux\/services\/cyber-risk-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/benelux\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.ignition-technology.com\/benelux\/services\/"},{"@type":"ListItem","position":3,"name":"Cyber Risk Assessment"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/benelux\/#website","url":"https:\/\/www.ignition-technology.com\/benelux\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/benelux\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/benelux\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/benelux\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/pages\/17989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/comments?post=17989"}],"version-history":[{"count":4,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/pages\/17989\/revisions"}],"predecessor-version":[{"id":18812,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/pages\/17989\/revisions\/18812"}],"up":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/pages\/13"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/media?parent=17989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}