{"id":2715,"date":"2024-12-03T14:49:13","date_gmt":"2024-12-03T13:49:13","guid":{"rendered":"https:\/\/enthec.com\/?p=2715"},"modified":"2024-12-03T14:49:14","modified_gmt":"2024-12-03T13:49:14","slug":"cybersecurity-solutions-that-you-should-apply-in-your-company","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/","title":{"rendered":"Cybersecurity solutions that you should apply in your company"},"content":{"rendered":"<p>Protecting your company&#8217;s information, nowadays, is no longer an option to consider, it is a necessity. Cyberattacks are on the rise, and with them, the <strong>risks to businesses of all sizes. <\/strong>If you&#8217;re not prepared, you could face financial loss, reputational damage, and, in some cases, legal consequences.<br \/>In this article, we&#8217;ll discover the most <strong>important cybersecurity solutions for businesses<\/strong>, both preventive, such as our <a href=\"https:\/\/enthec.com\/en\/\">Enthec cyber surveillance solutions<\/a> , and reactive, and how you can implement them in your organization. <\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-2664 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad.jpg\" alt=\"cybersecurity solutions\" width=\"661\" height=\"544\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad.jpg 661w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-300x247.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-350x288.jpg 350w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>The Need for Enterprise Cybersecurity Solutions<\/h2>\n<p>Digital transformation has revolutionized how businesses operate, but it has also expanded the attack surface for cybercriminals. The <strong>risks are more varied and sophisticated <\/strong>than ever, from ransomware to phishing attacks to sensitive data breaches.<br \/>Enterprise cybersecurity solutions protect information, <strong>ensure business continuity, increase customers&#8217; trust, and comply with legal regulations such as GDPR<\/strong>. However, choosing the proper measurements for your particular case is key. <\/p>\n<p>&nbsp;<\/p>\n<h2>Key cybersecurity solutions to protect businesses<\/h2>\n<p>Threats are not the same for all organizations, but several <a href=\"https:\/\/enthec.com\/en\/top-cybersecurity-tools-to-use-in-your-business\/\">cybersecurity tools<\/a> and <strong>strategies can be tailored to a business&#8217;s specific needs.<\/strong> Here, we show you the most important ones.<\/p>\n<h3>Perimeter Protection Solutions<\/h3>\n<p>Perimeter protection is the first line of defense against unauthorized access to your network. This involves <strong>establishing controls at entry points, such as firewalls, intrusion detection and prevention systems (IDS\/IPS), and network segmentation.<\/strong> These tools act as a wall that prevents cybercriminals from accessing internal systems.<br \/>For example, a firewall can block suspicious connections, while an IDS detects anomalous activity in real-time. This <a href=\"https:\/\/enthec.com\/en\/relevance-of-perimeter-cyber-security-for-your-business\/\">perimeter cybersecurity<\/a> is <strong>specially relevant to preventing attacks targeting servers and connected devices.<\/strong>  <\/p>\n<h3>Cyber Intelligence Solutions<\/h3>\n<p>Cyber intelligence is about collecting and analyzing data about potential threats before they occur. This includes using advanced platforms to <strong>monitor the digital environment for signs of malicious activity<\/strong>, such as suspicious patterns in emails or irregular network movements.<br \/>This approach allows companies to <strong>anticipate attackers and respond quickly.<\/strong> Corporate cyber-surveillance tools like <a href=\"https:\/\/enthec.com\/en\/kartos\/\">Kartos<\/a> identify vulnerabilities and plan mitigation strategies before irreversible damage occurs. <\/p>\n<h3>Data Protection Solutions<\/h3>\n<p>Data protection is essential for any company that handles sensitive information, whether from clients, employees or internal projects. <strong>Encryption tools, multi-factor authentication, and regular backups are essential measures. <\/strong>Furthermore, it is important to know that d<strong>ata protection solutions not only guarantee the privacy of information, but also protect its integrity.<\/strong> If an attacker manages to break into your systems, backups and encryption can be the last barrier to avoiding a catastrophe. <\/p>\n<p>&nbsp;<\/p>\n<h2>Differences between proactive and reactive cybersecurity solutions<\/h2>\n<p>A comprehensive approach to cybersecurity combines <a href=\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/\">proactive<\/a> and reactive security measures. Both approaches are complementary and necessary, but <strong>understanding their differences will help you prioritize according to your resources.<\/strong> <\/p>\n<h3>Proactive Threat Prevention Solutions<\/h3>\n<p>Proactive solutions seek to prevent an attack from occurring. They include security audits, training staff to identify phishing emails, attack simulations to assess system weaknesses and real-time <strong>detection of exposed vulnerabilities before they can be used by a cybercriminal to execute an attack,<\/strong> such as the Kartos platform.<br \/>These measures are crucial for businesses looking to <strong>stay ahead of cybercriminals and reduce risk before something happens.<\/strong> <\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-2666 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-empresarial.jpg\" alt=\"Corporate Cybersecurity Solutions\" width=\"661\" height=\"441\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-empresarial.jpg 661w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-empresarial-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-empresarial-350x234.jpg 350w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Reactive solutions for incident recovery<\/h3>\n<p>Conversely, reactive solutions focus on r<strong>esponding to an incident after it occurs.<\/strong> This is where disaster recovery plans (DRP), system restoration via backups, and post-incident investigations come into play to prevent recurring problems.<br \/>While prevention is ideal, <strong>having a solid response strategy can make the difference between a brief disruption or a complete shutdown of the business.<\/strong> <\/p>\n<p>&nbsp;<\/p>\n<h2>Kartos: the advanced solution in enterprise cyber surveillance<\/h2>\n<p>Choosing a trusted provider to manage your company&#8217;s cybersecurity is as important as the tools you implement. In this sense, <strong>Kartos is a leader in enterprise cyber-surveillance solutions.<\/strong><br \/>Kartos offers a personalized approach through constant monitoring, vulnerability detection, and real-time support. This platform is designed for c<strong>ompanies that want to stay one step ahead of cybercriminals.<\/strong> <\/p>\n<h3>Why choose Kartos?<\/h3>\n<ul>\n<li><strong>Real-time cyber intelligence. <\/strong>Identify threats before they become problems. <\/li>\n<li><strong>100% non-intrusive AI. <\/strong>It analyzes information on the Internet, Deep Web, Dark Web, and open sources to identify exposed data that cybercriminals could use. It is delivered to companies to protect themselves without carrying out attacks.<\/li>\n<li><strong>Third-Party Risks <\/strong>In addition to protecting the organization and its risks, Kratos allows organizations that need it to manage third-party risks.<\/li>\n<\/ul>\n<p>Investing in cybersecurity solutions is not just a technical issue but a<strong> strategic decision protecting your company&#8217;s present and future. <\/strong>Whether you take proactive or reactive measures, the most important thing is to act now.<br \/>If you are looking for an ally to help you implement these measures effectively, Kartos is the answer. With their experience and advanced technology, you can be sure that your company will be in the best hands. <a href=\"https:\/\/enthec.com\/en\/contact\/\">Contact us <\/a>today and <strong>take the first step towards a safer digital environment.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protecting your company&#8217;s information, nowadays, is no longer an option to consider, it is a necessity. Cyberattacks are on the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2669,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[24,32,38],"class_list":["post-2715","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-cybersecurity","tag-kartos-en","tag-organizations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Solutions<\/title>\n<meta name=\"description\" content=\"Learn about the main key cybersecurity solutions for companies and how Kartos can be the solution you are looking for \u27a1\ufe0f Find out more here!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Solutions\" \/>\n<meta property=\"og:description\" content=\"Learn about the main key cybersecurity solutions for companies and how Kartos can be the solution you are looking for \u27a1\ufe0f Find out more here!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-03T13:49:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-03T13:49:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1357\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Cybersecurity solutions that you should apply in your company\",\"datePublished\":\"2024-12-03T13:49:13+00:00\",\"dateModified\":\"2024-12-03T13:49:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\"},\"wordCount\":815,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Kartos\",\"Organizations\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\",\"url\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\",\"name\":\"Cybersecurity Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg\",\"datePublished\":\"2024-12-03T13:49:13+00:00\",\"dateModified\":\"2024-12-03T13:49:14+00:00\",\"description\":\"Learn about the main key cybersecurity solutions for companies and how Kartos can be the solution you are looking for \u27a1\ufe0f Find out more here!\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg\",\"width\":2560,\"height\":1357,\"caption\":\"Eye of a futuristic robot\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity solutions that you should apply in your company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Solutions","description":"Learn about the main key cybersecurity solutions for companies and how Kartos can be the solution you are looking for \u27a1\ufe0f Find out more here!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Solutions","og_description":"Learn about the main key cybersecurity solutions for companies and how Kartos can be the solution you are looking for \u27a1\ufe0f Find out more here!","og_url":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2024-12-03T13:49:13+00:00","article_modified_time":"2024-12-03T13:49:14+00:00","og_image":[{"width":2560,"height":1357,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Cybersecurity solutions that you should apply in your company","datePublished":"2024-12-03T13:49:13+00:00","dateModified":"2024-12-03T13:49:14+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/"},"wordCount":815,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg","keywords":["Cybersecurity","Kartos","Organizations"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/","url":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/","name":"Cybersecurity Solutions","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg","datePublished":"2024-12-03T13:49:13+00:00","dateModified":"2024-12-03T13:49:14+00:00","description":"Learn about the main key cybersecurity solutions for companies and how Kartos can be the solution you are looking for \u27a1\ufe0f Find out more here!","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/soluciones-ciberseguridad-organizaciones-scaled.jpg","width":2560,"height":1357,"caption":"Eye of a futuristic robot"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity solutions that you should apply in your company"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=2715"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2715\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/2669"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=2715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=2715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=2715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}