{"id":18004,"date":"2024-01-04T13:00:16","date_gmt":"2024-01-04T13:00:16","guid":{"rendered":"https:\/\/www.ignition-technology.com\/ne\/?page_id=18004"},"modified":"2026-01-14T11:19:00","modified_gmt":"2026-01-14T11:19:00","slug":"compliance","status":"publish","type":"page","link":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/","title":{"rendered":"Compliance"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Compliance<\/h1>\n<h5 style=\"text-align: center\"><span style=\"color: #fff\">Our carefully curated portfolio of solutions help with adherence to industry regulations, standards, and laws related to cybersecurity and data protection.<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Compliance-1.svg\" alt=\"Blue Gradient Icon for Compliance\" \/><\/p>\n<h4>Adhering to compliance frameworks<\/h4>\n<p>The increased reliance on technology for businesses to run optimally means more opportunities for cyber criminals to take advantage of. To mitigate this risk and help companies to better protect themselves and their data, Government organisations and agencies have built a number of cybersecurity compliance frameworks that regulate online practices, policies, and controls.<\/p>\n<p>By meeting cybersecurity compliance requirements and framewoks, businesses can ensure they follow best practice and adhere to regulations which protect sensitive information and prevent cyber threats.<\/p>\n<h2 style=\"text-align: center\">Our Cybersecurity Compliance Vendors<\/h2>\n<ul class=\"clients clients_slider_ul\">\n<li><a title=\"Axonius\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/axonius\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Axonius.svg\" alt=\"Axonius logo\" \/><\/a><\/li>\n<li><a title=\"BeyondTrust\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/beyondtrust\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/BeyondTrust-1.svg\" alt=\"BeyondTrust logo\" \/><\/a><\/li>\n<li><a title=\"BlackBerry \u2013 Cybersecurity\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/blackberry-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Blackberry.svg\" alt=\"BlackBerry logo\" \/><\/a><\/li>\n<li><a title=\"Corelight\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/corelight.svg\" alt=\"Corelight logo\" \/><\/a><\/li>\n<li><a title=\"Okta\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/okta\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/okta.svg\" alt=\"Okta logo\" \/><\/a><\/li>\n<li><a title=\"RiskRecon\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/riskrecon\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/riskrecon.svg\" alt=\"RiskRecon logo\" \/><\/a><\/li>\n<\/ul>\n<h2 style=\"text-align: center\"><span style=\"color: #fcfcfc\">Cybersecurity Compliance Frameworks in Focus<\/span><\/h2>\n<p style=\"text-align: center\"><span style=\"color: #fcfcfc\">\u00a0<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"color: #fcfcfc\">Navigating the sheer complexity and volume of frameworks can be daunting. We turned our focus to these industry frameworks to build the foundation of good cybersecurity practice.<\/span><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/IG_Compliance_logos_DORA.svg\" alt=\"White DORA logo\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">DORA &#8211; Digital Operational Resilience Act<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/IG_Compliance_logos_NIS2.svg\" alt=\"White NIS2 logo\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">NIS2 &#8211; Network &amp; Information Security Directive<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/IG_Compliance_logos_NIST-1.svg\" alt=\"White NIST logo\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">NIST CSF &#8211; National Institute of Standards &amp; Technology &#8211; Cybersecurity Framework<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/IG_Compliance_logos_CyberEssentials-1.svg\" alt=\"White Cyber Essentials logo\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">Cyber Essentials &amp; Cyber Essentials +<\/span><\/h5>\n<h2 style=\"text-align: left\">Why Cybersecurity Compliance Matters<\/h2>\n<p style=\"color: #828896;text-align: left\"><span style=\"letter-spacing: 0px\">By adhering to these key cybersecurity frameworks not only will you be meeting the legislative requirements, you&#8217;ll see the benefits in other areas too.<\/span><\/p>\n<p>Legal RequirementsMany industries and jurisdictions have specific laws and regulations mandating the protection of sensitive data. Compliance with these laws, such as the General Data Protection Regulation (GDPR), the Data Operational Resilience Act (DORA), or the Network and Information Security Directive (NIS2), is essential to avoid legal penalties and fines.<br \/>\nCustomer TrustDemonstrating compliance with cybersecurity standards builds trust with customers, partners, and stakeholders. It assures them that your business takes data security seriously and is committed to protecting their information.<br \/>\nRisk MitigationIs an authentication process that allows a user to access multiple applications or systems with a single set of login credentials (such as username and password).<br \/>\nData ProtectionCompliance frameworks often include specific requirements for securing sensitive data, such as encryption, access controls, and regular risk assessments. Adhering to these guidelines helps ensure the confidentiality and integrity of your organisation&#8217;s data.<br \/>\nBusiness ReputationA data breach can have severe consequences for a company&#8217;s reputation. Being compliant with cybersecurity standards demonstrates a commitment to security best practices, which can mitigate reputational damage in the event of a cyber incident.<br \/>\nGlobal OperationsFor businesses operating across borders, compliance with international cybersecurity standards is crucial. Adhering to global regulations ensures a consistent and standardised approach to cybersecurity, especially when dealing with the data of customers or partners in different regions.<br \/>\nFinancial ImpactNon-compliance can result in significant financial penalties, legal fees, and regulatory sanctions. The financial repercussions of a data breach or failure to meet cybersecurity standards can be substantial, making compliance a cost-effective investment in risk management.<br \/>\nCompetitive AdvantageMany customers and partners prioritise working with organisations that demonstrate a commitment to cybersecurity and compliance. Achieving and maintaining compliance can serve as a competitive differentiator, giving your business an edge in the market.<\/p>\n<p>Legal RequirementsMany industries and jurisdictions have specific laws and regulations mandating the protection of sensitive data. Compliance with these laws, such as the General Data Protection Regulation (GDPR), the Data Operational Resilience Act (DORA), or the Network and Information Security Directive (NIS2), is essential to avoid legal penalties and fines.<br \/>\nCustomer TrustDemonstrating compliance with cybersecurity standards builds trust with customers, partners, and stakeholders. It assures them that your business takes data security seriously and is committed to protecting their information.<br \/>\nRisk MitigationIs an authentication process that allows a user to access multiple applications or systems with a single set of login credentials (such as username and password).<br \/>\nData ProtectionCompliance frameworks often include specific requirements for securing sensitive data, such as encryption, access controls, and regular risk assessments. Adhering to these guidelines helps ensure the confidentiality and integrity of your organisation&#8217;s data.<\/p>\n<p>Business ReputationA data breach can have severe consequences for a company&#8217;s reputation. Being compliant with cybersecurity standards demonstrates a commitment to security best practices, which can mitigate reputational damage in the event of a cyber incident.<br \/>\nGlobal OperationsFor businesses operating across borders, compliance with international cybersecurity standards is crucial. Adhering to global regulations ensures a consistent and standardised approach to cybersecurity, especially when dealing with the data of customers or partners in different regions.<br \/>\nFinancial ImpactNon-compliance can result in significant financial penalties, legal fees, and regulatory sanctions. The financial repercussions of a data breach or failure to meet cybersecurity standards can be substantial, making compliance a cost-effective investment in risk management.<br \/>\nCompetitive AdvantageMany customers and partners prioritise working with organisations that demonstrate a commitment to cybersecurity and compliance. Achieving and maintaining compliance can serve as a competitive differentiator, giving your business an edge in the market.<\/p>\n<h4 style=\"text-align: left\">Not sure which frameworks relate to you or what technologies you need to help with cybersecurity compliance?<\/h4>\n<h4 style=\"text-align: left\">Book a discovery call with one of our Cybersecurity experts.<\/h4>\n<p style=\"text-align: left\"><a class=\"button button_size_2 button_theme\" title=\"\" href=\"mailto:enquiries@ignition-technology.com?subject=Cybersecurity%20Compliance%20Booking\"><span class=\"button_label\">Book Now<\/span><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/shutterstock_2104483976-1.png\" alt=\"A man smiling while looking at a computer screen\" width=\"2241\" height=\"1258\" \/><\/p>\n<h2>How Do We Partner With Ignition?<\/h2>\n<p>We are keen to work with like-minded partners that are looking to drive business and successful outcomes for their customers. If you are a VAR interested in any of the technologies across our portfolio, get in touch with our team today.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"\/become-a-partner\/\"><span class=\"button_label\">Become a Partner<\/span><\/a><\/p>\n<p><span class=\"num\">1<\/span>How do I become an Ignition Technology Partner or VAR?You can get in touch with us by clicking on the Become a Partner button or via the information on our Contact Us page. Once we receive your request, we\u2019ll get one of Channel specialists to contact you and take you through our onboarding process.<br \/>\n<span class=\"num\">2<\/span>What support does Ignition Technology offer Partners or VARs?At Ignition Technology, we work as an extension of your team. Whether you need support with sales &amp; product training, pre-sales services, go-to-marketing &amp; lead-gen campaigns, or implementation, our team is ready to help you identify &amp; convert opportunities across our portfolio.<br \/>\n<span class=\"num\">3<\/span>Why partner with Ignition Technology?Nobody knows cloud &amp; Saas cybersecurity solutions like we do. Our team understands the intricacies of the industry, the complexities of the technologies in the market, and are committed to developing and supporting the channel.<br \/>\n<span class=\"num\">4<\/span>How long does it take to become a Partner?No two VARs are the same. Once our team has made contact with you and understood your requirements, we\u2019ll build out an onboarding programme that is unique to you and the vendors that you would like to sell. The programme will include a short qualification process and if successful will be followed by dedicated enablement sessions. You could be transacting in a matter of weeks.<br \/>\n<span class=\"num\">5<\/span>How do I transact through Ignition Technology?We work closely with our Vendors and will support you in protecting your opportunities by registering your deals. We will follow up, keeping you informed every step of the way.<\/p>\n<h2><span style=\"color: #ffffff\">Follow us on<\/span> <span style=\"color: #41bfea;letter-spacing: 0px\">LinkedIn<\/span> <span style=\"color: #ffffff;letter-spacing: 0px\">for the latest industry news and events!<\/span><\/h2>\n<p><a class=\"button button_size_2\" title=\"\" href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwids6yAo4KEAxUPUkEAHSDLDxcQFnoECBEQAQ&amp;url=https%3A%2F%2Fuk.linkedin.com%2Fcompany%2Fignition-technology&amp;usg=AOvVaw26OjtsUw0Rb2qaWdv6TRzX&amp;opi=89978449\"><span class=\"button_label\">Follow Now<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Compliance Our carefully curated portfolio of solutions help with adherence to industry regulations, standards, and laws related to cybersecurity<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":389,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-18004","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Complete Cybersecurity Compliance<\/title>\n<meta name=\"description\" content=\"Our carefully selected portfolio of solutions help adherence to cybersecurity compliance and data protection regulations, standards, and laws.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance\" \/>\n<meta property=\"og:description\" content=\"Our carefully selected portfolio of solutions help adherence to cybersecurity compliance and data protection regulations, standards, and laws.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology NEUR\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-14T11:19:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Compliance-1.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/compliance\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/compliance\\\/\",\"name\":\"Complete Cybersecurity Compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/Solution-Icons_Compliance-1.svg\",\"datePublished\":\"2024-01-04T13:00:16+00:00\",\"dateModified\":\"2026-01-14T11:19:00+00:00\",\"description\":\"Our carefully selected portfolio of solutions help adherence to cybersecurity compliance and data protection regulations, standards, and laws.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/Solution-Icons_Compliance-1.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/Solution-Icons_Compliance-1.svg\",\"caption\":\"Blue Gradient Icon for Compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Complete Cybersecurity Compliance","description":"Our carefully selected portfolio of solutions help adherence to cybersecurity compliance and data protection regulations, standards, and laws.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_GB","og_type":"article","og_title":"Compliance","og_description":"Our carefully selected portfolio of solutions help adherence to cybersecurity compliance and data protection regulations, standards, and laws.","og_url":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/","og_site_name":"Ignition Technology NEUR","article_modified_time":"2026-01-14T11:19:00+00:00","og_image":[{"url":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Compliance-1.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ignition_tech","twitter_misc":{"Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/","url":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/","name":"Complete Cybersecurity Compliance","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Compliance-1.svg","datePublished":"2024-01-04T13:00:16+00:00","dateModified":"2026-01-14T11:19:00+00:00","description":"Our carefully selected portfolio of solutions help adherence to cybersecurity compliance and data protection regulations, standards, and laws.","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Compliance-1.svg","contentUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Compliance-1.svg","caption":"Blue Gradient Icon for Compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/ne\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.ignition-technology.com\/ne\/solutions\/"},{"@type":"ListItem","position":3,"name":"Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/ne\/#website","url":"https:\/\/www.ignition-technology.com\/ne\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/ne\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/ne\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/ne\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/ne\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/comments?post=18004"}],"version-history":[{"count":5,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18004\/revisions"}],"predecessor-version":[{"id":19123,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18004\/revisions\/19123"}],"up":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/389"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/media?parent=18004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}