{"id":18171,"date":"2024-01-17T10:30:00","date_gmt":"2024-01-17T10:30:00","guid":{"rendered":"https:\/\/www.ignition-technology.com\/ne\/?page_id=18171"},"modified":"2024-10-11T14:45:29","modified_gmt":"2024-10-11T14:45:29","slug":"corelight","status":"publish","type":"page","link":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/","title":{"rendered":"Corelight"},"content":{"rendered":"<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/corelight-white.svg\" alt=\"White Corelight logo\" \/><\/p>\n<h5 style=\"text-align: center;\"><span style=\"color: #fff;\">Evidence-based security<\/span><\/h5>\n<h5 style=\"text-align: left;\">Corelight Network Security gives defenders unparalleled insight into their networks, helping protect the world\u2019s most critical organisations and companies. Corelight Network Security helps proactive defenders, facing relentless, asymmetric threats, to reach, secure and hold the high ground by extracting, connecting, and analysing network evidence to gain enduring, structural advantage.<\/h5>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"https:\/\/corelight.com\"><span class=\"button_label\">Find Out More<\/span><\/a><\/p>\n<h2>Corelight Network Security Solutions<\/h2>\n<p style=\"color: #828896;\">\u00a0Leave attackers with no place to hide. Rely on Corelight&#8217;s complete network visibility. Confidently assess your cyber risk and security posture with Corelight network evidence.<\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Vendor-Icons_Corelight-01.svg\" alt=\"Blue Gradient Icon for Complete Visibility\" \/><\/p>\n<h5 style=\"text-align: center;\">Complete Visibility<\/h5>\n<p style=\"text-align: center;\">Gain a commanding view of your organisation and all devices that log onto your network\u2014with access to details such as DNS responses, file hashes, SSL certificate details, and user-agent strings\u2014rapidly, without relying on other teams to respond to data requests.<\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Vendor-Icons_Corelight-02.svg\" alt=\"Blue Gradient Icon for Next Level Analytics\" \/><\/p>\n<h5 style=\"text-align: center;\">Next Level Analytics<\/h5>\n<p style=\"text-align: center;\">Machine learning\u2014fueled with network evidence\u2014delivers powerful insights so you can focus on the most critical detections. Corelight\u2019s high-fidelity, correlated telemetry powers analytics, machine learning tools, and SOAR playbooks, improving efficiency and unlocking new capabilities so that you can make better decisions\u2014faster.<\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Vendor-Icons_Corelight-03.svg\" alt=\"Blue Gradient Icon for Faster Investigation\" \/><\/p>\n<h5 style=\"text-align: center;\">Faster Investigation<\/h5>\n<p style=\"text-align: center;\">Correlate alerts, evidence, and packets so you can establish baseline network activity and integrate that context directly into your existing workflows. Reduce false positives and your alert backlog\u2014with no redesign or retraining necessary. You get a full view of every incident so you can validate containment and remediation.<\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Vendor-Icons_Corelight-04.svg\" alt=\"Blue Gradient Icon for Expert Hunting\" \/><\/p>\n<h5 style=\"text-align: center;\">Expert Hunting<\/h5>\n<p style=\"text-align: center;\">Rich, organised, and security-specific evidence enables you to spot vulnerabilities, intruder artifacts, critical misconfigurations, signs of compromise and undetected attacks, further mitigating risk.<\/p>\n<h2 style=\"text-align: left;\"><span style=\"color: #ffffff;\">Benefits<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">\u00a0<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">\u00a0Deliver complete network telemetry into existing SIEM and SDR solutions.<\/span><\/p>\n<p>Open NDR platformCorelight transforms network and cloud activity into evidence. Easily deployed and available in on-prem and SaaS-based formats, Corelight combines the power of open source and proprietary technologies to deliver a complete Open Network Detection &amp; Response (NDR) Platform that includes intrusion detection (IDS), network security monitoring and Smart PCAP solutions.<\/p>\n<h2>Corelight Network Security Resources<\/h2>\n<p><a title=\"\" href=\"\/wp-content\/uploads\/sites\/17\/2024\/02\/corelight-complete-visibility-ds.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid\" src=\"\/wp-content\/uploads\/sites\/17\/2024\/01\/Datasheet.png#18049\" alt=\"Resource thumbnail for Datasheet\" width=\"1000\" height=\"1000\" \/>Complete Visibility with Open NDR<\/a><\/p>\n<p><strong>Datasheet<\/strong><\/p>\n<h5 style=\"text-align: left;\">Complete Visibility with Open NDR<\/h5>\n<p><a href=\"\/wp-content\/uploads\/sites\/17\/2024\/02\/corelight-complete-visibility-ds.pdf\" target=\"_blank\" rel=\"noopener\">Read More<\/a><\/p>\n<p><a title=\"\" href=\"\/wp-content\/uploads\/sites\/17\/2024\/02\/corelight-investigator-ds.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid\" src=\"\/wp-content\/uploads\/sites\/17\/2024\/01\/Datasheet.png#18049\" alt=\"Resource thumbnail for Datasheet\" width=\"1000\" height=\"1000\" \/>Open-source-powered network evidence integrated with machine learning and behavioural analytics <\/a><\/p>\n<p><strong>Datasheet<\/strong><\/p>\n<h5 style=\"text-align: left;\">Open-source-powered network evidence integrated with machine learning and behavioural analytics<\/h5>\n<p><a href=\"\/wp-content\/uploads\/sites\/17\/2024\/02\/corelight-investigator-ds.pdf\" target=\"_blank\" rel=\"noopener\">Read More<\/a><\/p>\n<p><a title=\"\" href=\"\/wp-content\/uploads\/sites\/17\/2024\/02\/corelight-product-guide-ds.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid\" src=\"\/wp-content\/uploads\/sites\/17\/2024\/01\/Datasheet.png#18049\" alt=\"Resource thumbnail for Datasheet\" width=\"1000\" height=\"1000\" \/>Disrupt Attacks with Network Evidence<\/a><\/p>\n<p><strong>Datasheet<\/strong><\/p>\n<h5 style=\"text-align: left;\">Disrupt Attacks with Network Evidence<\/h5>\n<p><a href=\"\/wp-content\/uploads\/sites\/17\/2024\/02\/corelight-product-guide-ds.pdf\" target=\"_blank\" rel=\"noopener\">Read More<\/a><\/p>\n<h3 class=\"title\">News<\/h3>\n<ul class=\"ul-first\">\n<li class=\"post-15044 type-post status-publish format-standard has-post-thumbnail hentry category-corelight-news category-news-archive mfn-tmpl-type-\"><a href=\"https:\/\/www.ignition-technology.com\/ne\/blog\/corelight-microsoft-2022\/\"><img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-720x720.jpg\" sizes=\"auto, (max-width:767px) 480px, 720px\" srcset=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-720x720.jpg 720w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-500x500.jpg 500w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-1200x1200.jpg 1200w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-300x300.jpg 300w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-768x768.jpg 768w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-150x150.jpg 150w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-75x75.jpg 75w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-1080x1080.jpg 1080w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06-480x480.jpg 480w, https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2022\/04\/Blog-News-Thumbnails-06.jpg 1500w\" alt=\"News thumbnail of the Corelight logo, with Corelight branding\" width=\"720\" height=\"720\" \/><\/a><br \/>\n<h5><a href=\"https:\/\/www.ignition-technology.com\/ne\/blog\/corelight-microsoft-2022\/\">Corelight Announces Integration for Microsoft Defender for IoT<\/a><\/h5>\n<p><span class=\"date\"> April 1, 2022<\/span><a class=\"mfn-love \" href=\"#\" data-id=\"15044\"><span class=\"label\">0<\/span><\/a><\/li>\n<\/ul>\n<h3 class=\"title\">Blogs<\/h3>\n<h2><span style=\"color: #ffffff;\">Interested in any of our<\/span> <span style=\"color: #41bfea; letter-spacing: 0px;\">Vendors?<\/span><\/h2>\n<h5><span style=\"color: #ffffff;\">Talk to one of our Team Today!<\/span><\/h5>\n<p>hbspt.forms.create({<br \/>\nregion: &#8220;eu1&#8221;,<br \/>\nportalId: &#8220;26909649&#8221;,<br \/>\nformId: &#8220;a111ff2c-424a-42cf-8677-37e2f98fe973&#8221;<br \/>\n});<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Evidence-based security Corelight Network Security gives defenders unparalleled insight into their networks, helping protect the world\u2019s most critical organisations and<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":241,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-18171","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Corelight Network Security Strategies<\/title>\n<meta name=\"description\" content=\"Corelight Network Security gives companies insight into their networks, safeguarding from threats with proactive defence strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Corelight\" \/>\n<meta property=\"og:description\" content=\"Corelight Network Security gives companies insight into their networks, safeguarding from threats with proactive defence strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology NEUR\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-11T14:45:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/corelight-white.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/corelight\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/corelight\\\/\",\"name\":\"Corelight Network Security Strategies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/corelight\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/corelight\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/corelight-white.svg\",\"datePublished\":\"2024-01-17T10:30:00+00:00\",\"dateModified\":\"2024-10-11T14:45:29+00:00\",\"description\":\"Corelight Network Security gives companies insight into their networks, safeguarding from threats with proactive defence strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/corelight\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/corelight\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/corelight\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/corelight-white.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/corelight-white.svg\",\"caption\":\"White Corelight logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/corelight\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vendors\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/vendors\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Corelight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Corelight Network Security Strategies","description":"Corelight Network Security gives companies insight into their networks, safeguarding from threats with proactive defence strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/","og_locale":"en_GB","og_type":"article","og_title":"Corelight","og_description":"Corelight Network Security gives companies insight into their networks, safeguarding from threats with proactive defence strategies.","og_url":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/","og_site_name":"Ignition Technology NEUR","article_modified_time":"2024-10-11T14:45:29+00:00","og_image":[{"url":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/corelight-white.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ignition_tech","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/","url":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/","name":"Corelight Network Security Strategies","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/corelight-white.svg","datePublished":"2024-01-17T10:30:00+00:00","dateModified":"2024-10-11T14:45:29+00:00","description":"Corelight Network Security gives companies insight into their networks, safeguarding from threats with proactive defence strategies.","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/corelight-white.svg","contentUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/corelight-white.svg","caption":"White Corelight logo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/ne\/vendors\/corelight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/ne\/"},{"@type":"ListItem","position":2,"name":"Vendors","item":"https:\/\/www.ignition-technology.com\/ne\/vendors\/"},{"@type":"ListItem","position":3,"name":"Corelight"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/ne\/#website","url":"https:\/\/www.ignition-technology.com\/ne\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/ne\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/ne\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/ne\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/ne\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/comments?post=18171"}],"version-history":[{"count":4,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18171\/revisions"}],"predecessor-version":[{"id":18738,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18171\/revisions\/18738"}],"up":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/241"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/media?parent=18171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}