{"id":19461,"date":"2025-12-22T13:51:23","date_gmt":"2025-12-22T13:51:23","guid":{"rendered":"https:\/\/www.ignition-technology.com\/benelux\/?p=19461"},"modified":"2026-01-13T10:05:51","modified_gmt":"2026-01-13T10:05:51","slug":"securing-the-foundations-of-trust","status":"publish","type":"post","link":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/","title":{"rendered":"Securing the foundations of trust"},"content":{"rendered":"<div style=\"font-family: 'Inter', -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Helvetica, Arial, sans-serif;font-size: 16px;line-height: 1.8;color: #0f2137;max-width: 1200px;width: 95%;margin: 40px auto;padding: 50px 40px;background-color: #ffffff;border-radius: 12px\">\n<h1 style=\"font-size: 26px;font-weight: 500;margin: 0 0 24px 0\">\n  How CrowdStrike is transforming identity and data protection for the<br \/>\n  <span>GenAI era<\/span><br \/>\n<\/h1>\n<p>Just as GenAI redefines how organisations operate, it also changes the rules of engagement for adversaries and threats. As businesses adopt GenAI tools through a calculated strategy to unlock productivity, accelerate workflows and capture the value of innovation, attackers are exploring how the same technologies can scale deception, automate intrusion, and exploit systemic weaknesses.<\/p>\n<p>In this environment, identity, and data are highly valuable and vulnerable assets. Compromised credentials, stolen tokens, and misused data can all be exploited by AI-powered threats that can strike move faster and deeper than before.<\/p>\n<p>This reality is one of the forcing factors behind the agentic SOC unveiled by CrowdStrike at Fal.Con Europe 2025. Their vision puts identity and data at the heart of a unified defence model that blends automation, intelligence, and human oversight into one, adaptive security fabric.<\/p>\n<h4 style=\"font-size: 18px;font-weight: 500;margin: 32px 0 16px 0\">A four-step approach to counter novel, AI-native threats<\/h4>\n<ol style=\"margin-left: 20px\">\n<li style=\"margin-bottom: 20px\"><strong style=\"font-weight: 600\">Evolving from authentication to autonomous trust<\/strong>\n<p style=\"margin-top: 8px\">Identity is still the number one target for modern cyberattacks. It\u2019s no longer enough to just authenticate users on entry to systems. Instead, businesses must continuously verify their trustworthiness through every action and session.<\/p>\n<p>CrowdStrike\u2019s Next-Gen Identity Security brings these capabilities together within the Falcon\u00ae platform, unifying authentication, access, and investigation into a single agentic solution.<\/li>\n<li style=\"margin-bottom: 20px\"><strong style=\"font-weight: 600\">Phish-proofing performance with passwordless MFA<\/strong>\n<p style=\"margin-top: 8px\">Using FIDO2 standards and real-time telemetry, FalconID eliminates passwords altogether \u2013 replacing them with secure, proximity-based authentication that can\u2019t be phished, replayed, or stolen.<\/p>\n<p>This agentic layer of verification continuously validates user identity in context, blocking credential misuse and session hijacking by design.<\/li>\n<li style=\"margin-bottom: 20px\"><strong style=\"font-weight: 600\">Minimising risk and tightening control with Enhanced Privileged Access<\/strong>\n<p style=\"margin-top: 8px\">Managing privileged accounts is one of the toughest challenges in enterprise security. CrowdStrike\u2019s Enhanced Privileged Access integrates directly with Microsoft Teams, allowing users to request, approve, or revoke permissions near-instantly.<\/p>\n<p>When combined with Fusion SOAR automation and just-in-time analytics, the solution ensures sensitive access is only granted when required, and automatically rescinded once the task is complete.<\/li>\n<li style=\"margin-bottom: 20px\"><strong style=\"font-weight: 600\">Automating response and accelerating decisions<\/strong>\n<p style=\"margin-top: 8px\">When an anomaly is detected, Identity-driven Case Management automatically creates and enriches cases in Falcon\u2019s next-generation SIEM. It then triggers contextual actions such as enforcing MFA, isolating devices, or escalating to an analyst.<\/p>\n<p>This automation reduces manual workload, accelerates investigations, and improves decision accuracy.<\/li>\n<\/ol>\n<p>Collectively, these innovations have been found to cut analyst workload by over 40 hours per week, deliver insights 75% faster, and achieve decision accuracy above 98%. Taking this step, to shift the identity model from reactive defence to continuous, autonomous verification, is essential for any organisation embracing GenAI.<\/p>\n<h4 style=\"font-size: 18px;font-weight: 500;margin: 32px 0 16px 0\">Protecting data is priority #1 for the GenAI workplace<\/h4>\n<p>As GenAI tools embed into everyday workflows, the line between legitimate use and data exfiltration is thinning. Sensitive data can now exit the enterprise via a simple prompt or plugin. CrowdStrike\u2019s enhanced Data Protection module provides the visibility and control to mitigate these new risks, by:<\/p>\n<ol style=\"margin-left: 20px\">\n<li>Monitoring data flows across browsers, local applications, and SaaS platforms, to provide a unified view of how information moves through the organisation.<\/li>\n<li>Using AI to classify sensitive data, supporting automatic detection of regulated or confidential content before it\u2019s shared externally or used by AI tools.<\/li>\n<li>Unifying exfiltration detection into a single framework combining agentic intelligence and real-time telemetry to identify unauthorised data transfers and insider threats.<\/li>\n<li>Providing an insider-threat dashboard that highlights risky behaviour and surfaces users whose actions deviate from normal patterns.<\/li>\n<\/ol>\n<p>These features empower SOC teams to monitor, classify, and protect data at the speed of computation, to help ensure security and compliance throughout AI innovation.<\/p>\n<h4 style=\"font-size: 18px;font-weight: 500;margin: 32px 0 16px 0\">Partners should position themselves as trusted advisors on security<\/h4>\n<p>These developments are an opportunity for partners to expand value across advisory and managed service portfolios. Partners can help customers implement CrowdStrike\u2019s unified platform as a foundation for zero-trust architecture \u2013 integrating FalconID, Privileged Access, and Data Protection modules for complete, flexible coverage across users, endpoints, and applications.<\/p>\n<p>By combining Next-Gen Identity Security with Data Protection, partners can offer end-to-end protection against compromised identity, insider risks, and AI-driven data loss. This holistic approach simplifies procurement and strengthens customers\u2019 resilience.<\/p>\n<p>As enterprises adopt generative AI tools, partners can provide expert consulting on safe AI usage, data classification frameworks, and policy enforcement to help organisations balance governance, risk management, and productivity.<\/p>\n<h4 style=\"font-size: 18px;font-weight: 500;margin: 32px 0 16px 0\">Identity and data protection are essential enablers of safe GenAI adoption<\/h4>\n<p>GenAI demands a new level of security maturity. Identity and data are the twin anchors of that maturity, defining both who is acting and what is at stake.<\/p>\n<p>CrowdStrike has set out the blueprint with innovations that enable organisations to embrace AI with the confidence that data access and integrity are continuously safeguarded.<\/p>\n<p>For partners and customers, the combination of intelligence, automation, and trust unlocks future-ready, zero-trust environments that empower the safe and responsible use of generative AI. To explore how Ignition Technology and CrowdStrike can help you secure customers\u2019 identities and data as they progress with their Gen AI roadmap, contact the Ignition team today.<\/p>\n<\/div>\n<div style=\"max-width: 1200px;width: 95%;margin: 40px auto;padding: 20px;background-color: #f0f4f8;border-left: 4px solid #0070f3;border-radius: 8px;font-family: 'Inter', -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Helvetica, Arial, sans-serif;color: #0f2137\">\n<p style=\"font-weight: 500;margin: 0\">&lt;sales-bnl@ignition-technology.eu&gt;<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>How CrowdStrike is transforming identity and data protection for the GenAI era Just as GenAI redefines how organisations operate, it<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":18,"featured_media":19472,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[10,78],"tags":[],"class_list":["post-19461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","category-crowdstrike-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing the foundations of trust - Ignition Technology Benelux<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the foundations of trust\" \/>\n<meta property=\"og:description\" content=\"How CrowdStrike is transforming identity and data protection for the GenAI era Just as GenAI redefines how organisations operate, it [\u2026]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology Benelux\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-22T13:51:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-13T10:05:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2025\/12\/adam_op_3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1313\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ignition Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ignition Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/\"},\"author\":{\"name\":\"Ignition Technology\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/person\\\/432b4d51b4a110d61e239ba04b66ff7d\"},\"headline\":\"Securing the foundations of trust\",\"datePublished\":\"2025-12-22T13:51:23+00:00\",\"dateModified\":\"2026-01-13T10:05:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/\"},\"wordCount\":837,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2025\\\/12\\\/adam_op_3.jpg\",\"articleSection\":[\"Blogs\",\"CrowdStrike Blogs\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/\",\"name\":\"Securing the foundations of trust - Ignition Technology Benelux\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2025\\\/12\\\/adam_op_3.jpg\",\"datePublished\":\"2025-12-22T13:51:23+00:00\",\"dateModified\":\"2026-01-13T10:05:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2025\\\/12\\\/adam_op_3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2025\\\/12\\\/adam_op_3.jpg\",\"width\":2048,\"height\":1313},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/securing-the-foundations-of-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the foundations of trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/#\\\/schema\\\/person\\\/432b4d51b4a110d61e239ba04b66ff7d\",\"name\":\"Ignition Technology\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2baca4dfa3a9e03072b5932d6688c916afb70f0aa8e1ff0012a55882ed6e76f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2baca4dfa3a9e03072b5932d6688c916afb70f0aa8e1ff0012a55882ed6e76f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2baca4dfa3a9e03072b5932d6688c916afb70f0aa8e1ff0012a55882ed6e76f?s=96&d=mm&r=g\",\"caption\":\"Ignition Technology\"},\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/benelux\\\/blog\\\/author\\\/harrybattershell\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing the foundations of trust - Ignition Technology Benelux","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/","og_locale":"en_GB","og_type":"article","og_title":"Securing the foundations of trust","og_description":"How CrowdStrike is transforming identity and data protection for the GenAI era Just as GenAI redefines how organisations operate, it [\u2026]","og_url":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/","og_site_name":"Ignition Technology Benelux","article_published_time":"2025-12-22T13:51:23+00:00","article_modified_time":"2026-01-13T10:05:51+00:00","og_image":[{"width":2048,"height":1313,"url":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2025\/12\/adam_op_3.jpg","type":"image\/jpeg"}],"author":"Ignition Technology","twitter_card":"summary_large_image","twitter_creator":"@ignition_tech","twitter_site":"@ignition_tech","twitter_misc":{"Written by":"Ignition Technology","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/#article","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/"},"author":{"name":"Ignition Technology","@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/person\/432b4d51b4a110d61e239ba04b66ff7d"},"headline":"Securing the foundations of trust","datePublished":"2025-12-22T13:51:23+00:00","dateModified":"2026-01-13T10:05:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/"},"wordCount":837,"commentCount":0,"publisher":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#organization"},"image":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2025\/12\/adam_op_3.jpg","articleSection":["Blogs","CrowdStrike Blogs"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/","url":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/","name":"Securing the foundations of trust - Ignition Technology Benelux","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2025\/12\/adam_op_3.jpg","datePublished":"2025-12-22T13:51:23+00:00","dateModified":"2026-01-13T10:05:51+00:00","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2025\/12\/adam_op_3.jpg","contentUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2025\/12\/adam_op_3.jpg","width":2048,"height":1313},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/benelux\/blog\/securing-the-foundations-of-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/benelux\/"},{"@type":"ListItem","position":2,"name":"Securing the foundations of trust"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/benelux\/#website","url":"https:\/\/www.ignition-technology.com\/benelux\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/benelux\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/benelux\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/benelux\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/benelux\/wp-content\/uploads\/sites\/18\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]},{"@type":"Person","@id":"https:\/\/www.ignition-technology.com\/benelux\/#\/schema\/person\/432b4d51b4a110d61e239ba04b66ff7d","name":"Ignition Technology","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/c2baca4dfa3a9e03072b5932d6688c916afb70f0aa8e1ff0012a55882ed6e76f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c2baca4dfa3a9e03072b5932d6688c916afb70f0aa8e1ff0012a55882ed6e76f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c2baca4dfa3a9e03072b5932d6688c916afb70f0aa8e1ff0012a55882ed6e76f?s=96&d=mm&r=g","caption":"Ignition Technology"},"url":"https:\/\/www.ignition-technology.com\/benelux\/blog\/author\/harrybattershell\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/posts\/19461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/comments?post=19461"}],"version-history":[{"count":10,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/posts\/19461\/revisions"}],"predecessor-version":[{"id":19478,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/posts\/19461\/revisions\/19478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/media\/19472"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/media?parent=19461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/categories?post=19461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ignition-technology.com\/benelux\/wp-json\/wp\/v2\/tags?post=19461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}