{"id":10750,"date":"2024-05-03T10:37:58","date_gmt":"2024-05-03T08:37:58","guid":{"rendered":"https:\/\/www.inprosec.com\/?page_id=10750"},"modified":"2025-10-09T12:52:25","modified_gmt":"2025-10-09T10:52:25","slug":"sap-security","status":"publish","type":"page","link":"https:\/\/www.inprosec.com\/en\/sap-security\/","title":{"rendered":"SAP Security"},"content":{"rendered":"<section class=\"l-section wpb_row cabecera-interior height_medium color_primary with_img parallax_ver parallax_xpos_right\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1018\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-abstracto-azul.jpg);background-position: bottom right;\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h1 style=\"text-align: left;\">SAP\u00ae Security Services<\/h1>\n<h2>Optimize the security level of your SAP\u00ae installation.<\/h2>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"800\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/seguridad-SAP.jpg\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/seguridad-SAP.jpg 800w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/seguridad-SAP-300x202.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/04\/seguridad-SAP-600x404.jpg 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_row-fluid \">\n<div class=\"vc_span12 wpb_column vc_column_container \">\n<div class=\"vc_column-inner \">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div id=\"ct_p799w6bclzheo4yny2dp\" class=\"wpb_wrapper\">\n<h2>Secure your SAP\u00ae systems and minimise risks<\/h2>\n<p>At Inprosec, we have in-depth experience in <strong>SAP\u00ae security services<\/strong> and can help you implement policies and procedures to improve productivity and avoid risks in SAP\u00ae systems, such as <strong>role design, SAP\u00ae security assessment, identity management and customised projects<\/strong>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-2 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-hwrapper child-pages valign_top wrap align_none\" style=\"--hwrapper-gap:1.5rem\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/role-model-design\/\" class=\"w-iconbox-link\" aria-label=\"Role Model Design\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">manage_accounts<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/role-model-design\/\" class=\"w-iconbox-link\" aria-label=\"Role Model Design\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Role Model Design<\/h2><\/a><div class=\"w-iconbox-text\"><p><strong>Role model design in SAP\u00ae systems<\/strong> involves implementing a role model based on best practices with the primary goal of <strong>reducing Segregation of Duties (SoD) conflicts<\/strong>. In addition, this type of role model also makes it possible to <strong>simplify access management in SAP\u00ae systems, which reduces maintenance effort and costs.<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-security-assessment\/\" class=\"w-iconbox-link\" aria-label=\"Security Assessment\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">report_problem<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-security-assessment\/\" class=\"w-iconbox-link\" aria-label=\"Security Assessment\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Security Assessment<\/h2><\/a><div class=\"w-iconbox-text\"><p>SAP\u00ae Security Assessment is a <strong>comprehensive security product<\/strong> that Inprosec offers its clients to have <strong>real-time<\/strong> <strong>information on the main risks<\/strong> and unsafe configuration settings in SAP\u00ae systems. Do you want to know how secure your SAP\u00ae systems are?<\/p>\n<\/div><\/div><\/div><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-single-sign-on\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae Single Sign-On\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">password<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-single-sign-on\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae Single Sign-On\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">SAP\u00ae Single Sign-On<\/h2><\/a><div class=\"w-iconbox-text\"><p>One of the most common problems with SAP\u00ae systems is <strong>forgetting the access password<\/strong>. The solution to this problem is <strong>SAP\u00ae Single Sign-On<\/strong>, which allows us to log in securely without having to remember the password, thus simplifying the <strong>authentication process<\/strong> for various applications and programmes.<\/p>\n<\/div><\/div><\/div><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/ui-masking\/\" class=\"w-iconbox-link\" aria-label=\"UI Masking\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">visibility_off<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/ui-masking\/\" class=\"w-iconbox-link\" aria-label=\"UI Masking\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">UI Masking<\/h2><\/a><div class=\"w-iconbox-text\"><p>UI Masking is a solution that allows <strong>sensitive fields to be hidden<\/strong> from users who are not individually authorised to access those fields. This tool improves compliance with privacy,<strong> data protection<\/strong>, regulatory and internal requirements by controlling access to certain sensitive information.<\/p>\n<\/div><\/div><\/div><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-security-tools\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae Security Tools\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">lock<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-security-tools\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae Security Tools\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">SAP\u00ae Security Tools<\/h2><\/a><div class=\"w-iconbox-text\"><p><strong>SAP\u00ae has standard tools<\/strong> that enable us to increase the <strong>security of SAP\u00ae systems.<\/strong><\/p>\n<p><strong>System Recommendations<\/strong> allow us to know the security patches that affect SAP systems.<\/p>\n<p><strong>Configuration Validation<\/strong> allow us to automate the security analysis of SAP\u00ae systems.<\/p>\n<\/div><\/div><\/div><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-security-training\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae Security Training\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">class<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-security-training\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae Security Training\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">SAP\u00ae Security Training<\/h2><\/a><div class=\"w-iconbox-text\"><p>At Inprosec, we offer <strong>training sessions<\/strong> aimed at training the internal teams of organisations in SAP\u00ae and SAP\u00ae GRC security, within the different variants of SAP\u00ae systems such as ECC, HANA, Fiori, Cloud, etc.<\/p>\n<\/div><\/div><\/div><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-license-audit\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae License Audit\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">content_paste_search<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-license-audit\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae License Audit\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">SAP\u00ae License Audit<\/h2><\/a><div class=\"w-iconbox-text\"><p><strong>SAP\u00ae Licence Audit<\/strong> provides an analysis of your SAP\u00ae licensing based on your <strong>existing customer agreement with SAP\u00ae<\/strong>. We help to unravel the complexities of understanding and managing SAP\u00ae licensing, as well as potential non-compliance situations arising from incorrect <strong>allocations or licence counts<\/strong>.<\/p>\n<\/div><\/div><\/div><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/tailor-made-projects\/\" class=\"w-iconbox-link\" aria-label=\"Tailor Made Projects\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">build_circle<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/tailor-made-projects\/\" class=\"w-iconbox-link\" aria-label=\"Tailor Made Projects\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Tailor Made Projects<\/h2><\/a><div class=\"w-iconbox-text\"><p>Delivering <strong>projects<\/strong> tailored to <strong>customer needs<\/strong>. <strong>Examples include PowerBI dashboards of the security status of your SAP\u00ae systems<\/strong>, monitoring reports, <strong>policy and procedure definitions in SAP\u00ae systems, and many others. <\/strong><\/p>\n<\/div><\/div><\/div><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-user-role-management-support\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae User &amp; Role Management Support\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">support_agent<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-user-role-management-support\/\" class=\"w-iconbox-link\" aria-label=\"SAP\u00ae User &amp; Role Management Support\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">SAP\u00ae User &amp; Role Management Support<\/h2><\/a><div class=\"w-iconbox-text\"><p>With this service, <strong>access management in SAP\u00ae is completely outsourced<\/strong>. Our consultants manage all incident tickets opened by users within SAP\u00ae systems. They ensure effective management of authorisations and roles.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large with_img parallax_ver\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1265\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-ordenador-composicion.jpg);\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-9 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Can we help with your company&#8217;s SAP\u00ae Security?<\/h2>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-3 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-btn-wrapper default_align_none laptops_align_none tablets_align_none mobiles_align_center\"><a class=\"w-btn us-btn-style_1\" title=\"Contacto\" href=\"https:\/\/www.inprosec.com\/en\/contact\/\"><span class=\"w-btn-label\">Contact us<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"SAP\u00ae Security Services Optimize the security level of your SAP\u00ae installation. Secure your SAP\u00ae systems and minimise risks At Inprosec, we have in-depth experience in SAP\u00ae security services and can help you implement policies and procedures to improve productivity and avoid risks in SAP\u00ae systems, such as role design, SAP\u00ae security assessment, identity management and...","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-10750","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP security services | Inprosec, information security<\/title>\n<meta name=\"description\" content=\"In Inprosec we have a solid experience in SAP security services and, therefore, we can help you with the implementation of a series of policies and procedures that improve productivity and avoid risks in SAP systems such as role design, SAP secuity assessment, identity management and customized projects.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security\" \/>\n<meta property=\"og:description\" content=\"In Inprosec we have a solid experience in SAP security services and, therefore, we can help you with the implementation of a series of policies and procedures that improve productivity and avoid risks in SAP systems such as role design, SAP secuity assessment, identity management and customized projects.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-09T10:52:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security\\\/\",\"name\":\"SAP security services | Inprosec, information security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2024-05-03T08:37:58+00:00\",\"dateModified\":\"2025-10-09T10:52:25+00:00\",\"description\":\"In Inprosec we have a solid experience in SAP security services and, therefore, we can help you with the implementation of a series of policies and procedures that improve productivity and avoid risks in SAP systems such as role design, SAP secuity assessment, identity management and customized projects.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP security services | Inprosec, information security","description":"In Inprosec we have a solid experience in SAP security services and, therefore, we can help you with the implementation of a series of policies and procedures that improve productivity and avoid risks in SAP systems such as role design, SAP secuity assessment, identity management and customized projects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security","og_description":"In Inprosec we have a solid experience in SAP security services and, therefore, we can help you with the implementation of a series of policies and procedures that improve productivity and avoid risks in SAP systems such as role design, SAP secuity assessment, identity management and customized projects.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security\/","og_site_name":"Inprosec","article_modified_time":"2025-10-09T10:52:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security\/","url":"https:\/\/www.inprosec.com\/en\/sap-security\/","name":"SAP security services | Inprosec, information security","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2024-05-03T08:37:58+00:00","dateModified":"2025-10-09T10:52:25+00:00","description":"In Inprosec we have a solid experience in SAP security services and, therefore, we can help you with the implementation of a series of policies and procedures that improve productivity and avoid risks in SAP systems such as role design, SAP secuity assessment, identity management and customized projects.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/10750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=10750"}],"version-history":[{"count":7,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/10750\/revisions"}],"predecessor-version":[{"id":13643,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/10750\/revisions\/13643"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=10750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}