{"id":14160,"date":"2026-02-25T15:53:04","date_gmt":"2026-02-25T13:53:04","guid":{"rendered":"https:\/\/www.inprosec.com\/?page_id=14160"},"modified":"2026-02-25T17:46:19","modified_gmt":"2026-02-25T15:46:19","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.inprosec.com\/en\/services\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<section class=\"l-section wpb_row cabecera-interior height_medium color_primary with_img parallax_ver parallax_xpos_right\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1018\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-abstracto-azul.jpg);background-position: bottom right;\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h1 style=\"text-align: left;\">Information Security Services<\/h1>\n<h2>Protect your most important asset<\/h2>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"960\" height=\"640\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/03\/seguridad-de-la-informacio\u0301n.jpeg\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/03\/seguridad-de-la-informacio\u0301n.jpeg 960w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/03\/seguridad-de-la-informacio\u0301n-300x200.jpeg 300w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_row-fluid \">\n<div class=\"vc_span12 wpb_column vc_column_container \">\n<div class=\"vc_column-inner \">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div id=\"ct_p799w6bclzheo4yny2dp\" class=\"wpb_wrapper\">\n<h2>Experts in Protecting Your Information and Your Customers\u2019 Data<\/h2>\n<p><strong>Information security<\/strong> is a strategic pillar for any organization that aims to safeguard its critical assets, ensure business continuity, and comply with current regulatory frameworks.<\/p>\n<p>At <strong>Inprosec<\/strong>, we help companies design, implement, and continuously evolve their security model from a comprehensive and integrated perspective.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/security-architecture\/\" class=\"w-iconbox-link\" aria-label=\"Security Architecture\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">account_tree<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/security-architecture\/\" class=\"w-iconbox-link\" aria-label=\"Security Architecture\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Security Architecture<\/h2><\/a><div class=\"w-iconbox-text\"><p>We implement a <strong>robust security architecture aligned with business objectives<\/strong>, focused on protecting critical assets and reducing the organisation\u2019s exposure to risk. Our approach integrates technology, processes, and identities to create secure, scalable, and sustainable environments.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/audit-and-compliance\/\" class=\"w-iconbox-link\" aria-label=\"Audit and Compliance\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">policy<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/audit-and-compliance\/\" class=\"w-iconbox-link\" aria-label=\"Audit and Compliance\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Audit and Compliance<\/h2><\/a><div class=\"w-iconbox-text\"><p>We assess your organisation\u2019s security and compliance posture to<strong> identify risks, gaps, and areas for improvement<\/strong>. We support companies in meeting regulatory requirements while aligning security with both compliance and business needs.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\" class=\"w-iconbox-link\" aria-label=\"Cyber Intelligence\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">remove_red_eye<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\" class=\"w-iconbox-link\" aria-label=\"Cyber Intelligence\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Cyber Intelligence<\/h2><\/a><div class=\"w-iconbox-text\"><p>We provide <strong>visibility into external threats and potential data leaks<\/strong> that could affect your organisation. Through continuous monitoring of open and non-visible sources, we anticipate risks and enable a proactive response.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/culture-and-training\/\" class=\"w-iconbox-link\" aria-label=\"Culture and Training\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">school<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/culture-and-training\/\" class=\"w-iconbox-link\" aria-label=\"Culture and Training\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Culture and Training<\/h2><\/a><div class=\"w-iconbox-text\"><p>We promote a strong, organisation-wide security culture. <strong>By raising awareness and empowering people<\/strong>, we reduce human risk and reinforce the first line of defence.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\" class=\"w-iconbox-link\" aria-label=\"Governance and Strategy\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">assured_workload<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\" class=\"w-iconbox-link\" aria-label=\"Governance and Strategy\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Governance and Strategy<\/h2><\/a><div class=\"w-iconbox-text\"><p>We help define and execute a security strategy aligned with your business goals. <strong>We provide governance, visibility, and control<\/strong> to manage security efficiently and sustainably.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/privacy\/\" class=\"w-iconbox-link\" aria-label=\"Privacy\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">disabled_visible<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/privacy\/\" class=\"w-iconbox-link\" aria-label=\"Privacy\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Privacy<\/h2><\/a><div class=\"w-iconbox-text\"><p>We support organisations in <strong>managing privacy and personal data protection<\/strong>. Our approach ensures regulatory compliance and promotes the responsible use of information.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/microsoft-security\/\" class=\"w-iconbox-link\" aria-label=\"Microsoft Security\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">window<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/microsoft-security\/\" class=\"w-iconbox-link\" aria-label=\"Microsoft Security\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Microsoft Security<\/h2><\/a><div class=\"w-iconbox-text\"><p>We help <strong>safeguard Microsoft and Azure environments<\/strong> through proper configuration of their security capabilities. We maximise the value of native tools to reduce risk and enhance your security posture.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_left style_default color_primary align_left\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\" class=\"w-iconbox-link\" aria-label=\"Offensive Security\"><div class=\"w-iconbox-icon\" style=\"font-size:2rem;\"><i class=\"material-icons\">bug_report<\/i><\/div><\/a><div class=\"w-iconbox-meta\"><a href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\" class=\"w-iconbox-link\" aria-label=\"Offensive Security\"><h2 class=\"w-iconbox-title\" style=\"font-size:1.2rem;\">Offensive Security<\/h2><\/a><div class=\"w-iconbox-text\"><p><strong>We assess security from an attacker\u2019s perspective<\/strong> to identify genuine vulnerabilities. This approach helps predict potential attacks and reinforce your organisation\u2019s defensive capabilities.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large with_img parallax_ver\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1265\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-ordenador-composicion.jpg);\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-9 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Can we help with your company&#8217;s <span data-sheets-root=\"1\" data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Strategic Information Security&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:14783,&quot;3&quot;:{&quot;1&quot;:0,&quot;3&quot;:1},&quot;4&quot;:{&quot;1&quot;:2,&quot;2&quot;:14281427},&quot;5&quot;:{&quot;1&quot;:&#091;{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:13421772}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:2}&#093;},&quot;6&quot;:{&quot;1&quot;:&#091;{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:13421772}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:2}&#093;},&quot;7&quot;:{&quot;1&quot;:&#091;{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:13421772}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:2}&#093;},&quot;8&quot;:{&quot;1&quot;:&#091;{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:13421772}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:2}&#093;},&quot;10&quot;:1,&quot;11&quot;:4,&quot;14&quot;:{&quot;1&quot;:3,&quot;3&quot;:1},&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Strategic Information Security?<\/span><\/h2>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-3 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-btn-wrapper default_align_none laptops_align_none tablets_align_none mobiles_align_center\"><a class=\"w-btn us-btn-style_1\" title=\"Contacto\" href=\"https:\/\/www.inprosec.com\/en\/contact\/\"><span class=\"w-btn-label\">Contact us<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"Information Security Services Protect your most important asset Experts in Protecting Your Information and Your Customers\u2019 Data Information security is a strategic pillar for any organization that aims to safeguard its critical assets, ensure business continuity, and comply with current regulatory frameworks. At Inprosec, we help companies design, implement, and continuously evolve their security model...","protected":false},"author":6,"featured_media":0,"parent":6532,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-14160","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Information Security | Inprosec, information security<\/title>\n<meta name=\"description\" content=\"At Inprosec, we provide information security services to ensure that critical assets and data are protected within a controlled and secure environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security\" \/>\n<meta property=\"og:description\" content=\"At Inprosec, we provide information security services to ensure that critical assets and data are protected within a controlled and secure environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T15:46:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/\",\"name\":\"Information Security | Inprosec, information security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2026-02-25T13:53:04+00:00\",\"dateModified\":\"2026-02-25T15:46:19+00:00\",\"description\":\"At Inprosec, we provide information security services to ensure that critical assets and data are protected within a controlled and secure environment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/servicios\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security | Inprosec, information security","description":"At Inprosec, we provide information security services to ensure that critical assets and data are protected within a controlled and secure environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/services\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security","og_description":"At Inprosec, we provide information security services to ensure that critical assets and data are protected within a controlled and secure environment.","og_url":"https:\/\/www.inprosec.com\/en\/services\/information-security\/","og_site_name":"Inprosec","article_modified_time":"2026-02-25T15:46:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/","url":"https:\/\/www.inprosec.com\/en\/services\/information-security\/","name":"Information Security | Inprosec, information security","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2026-02-25T13:53:04+00:00","dateModified":"2026-02-25T15:46:19+00:00","description":"At Inprosec, we provide information security services to ensure that critical assets and data are protected within a controlled and secure environment.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/services\/information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.inprosec.com\/en\/servicios\/"},{"@type":"ListItem","position":3,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=14160"}],"version-history":[{"count":3,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14160\/revisions"}],"predecessor-version":[{"id":14305,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14160\/revisions\/14305"}],"up":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/6532"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=14160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}