{"id":2699,"date":"2020-04-28T09:49:00","date_gmt":"2020-04-28T08:49:00","guid":{"rendered":"https:\/\/apexsecurity.nl\/?p=2699"},"modified":"2025-01-17T12:42:53","modified_gmt":"2025-01-17T12:42:53","slug":"decompleximeren-van-cyber-security","status":"publish","type":"post","link":"https:\/\/www.apexsecurity.nl\/en\/decompleximeren-van-cyber-security\/","title":{"rendered":"Decompleximeren van cyber security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2699\" class=\"elementor elementor-2699\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f26fda0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f26fda0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15c761b0\" data-id=\"15c761b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57fa621a elementor-widget elementor-widget-text-editor\" data-id=\"57fa621a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<div>\n<p>Het eerste woord van bovenstaande titel heb ik zelf verzonnen. Het is een samenstelling van decimeren (Van Dale: sterk\u00a0terugbrengen\u00a0in aantal) en complex (samengesteld, ingewikkeld). De titel betekent dus vrij vertaald: het sterk terugbrengen van ingewikkelde cyber security. Dat is een van mijn stokpaardjes (onderwerp waarover iemand graag praat). En dat ga ik nu weer doen.<u><\/u><u><\/u><\/p>\n<h2><b>Ingewikkeld<\/b><u><\/u><u><\/u><\/h2>\n<p>In het Cybersecurity Woordenboek van Cyberveilig Nederland staan bijna 600 woorden, wat al een indicatie is van de omvang van het cyber security vakgebied. Veel termen gaan natuurlijk over techniek. En techniek kan best ingewikkeld zijn.<u><\/u><u><\/u><\/p>\n<h2><b>Complexiteit<\/b><u><\/u><u><\/u><\/h2>\n<p>Toen internet eind jaren \u201990 bij het brede publiek bekend werd, ging ik op pad om grote organisaties te overtuigen van de noodzaak van een firewall. Ik tekende op het whiteboard een wolk internet, een wolk intern netwerk, en daartussen een firewall met een DMZ, de gedemilitariseerde zone, voor het aanbieden van publieke zaken zoals een webserver.<u><\/u><u><\/u><\/p>\n<p><img decoding=\"async\" id=\"m_8724220246104189210Picture_x0020_3\" class=\"CToWUd\" src=\"https:\/\/mail.google.com\/mail\/u\/0?ui=2&amp;ik=856648246a&amp;attid=0.1&amp;permmsgid=msg-f:1698997645905437500&amp;th=17940d5b766b233c&amp;view=fimg&amp;sz=s0-l75-ft&amp;attbid=ANGjdJ8LXZL7XETw2HsKwiN6xh8MTjP-tYvjyaUWoTLS5NoXVVW8z_oWE0ajfMLWLaA3in75LpTL1MdYnkfHGKW7XEuDM8SsF32SnClMCpkbx_xvEF-lJ-_2JYTX6IA&amp;disp=emb\" alt=\"Decompleximeren\" width=\"300\" height=\"133\" data-image-whitelisted=\"\" \/><br \/>Even jaar of wat later breidden we die tekening uit met IPS, intrusion protection system, omdat een firewall alleen niet genoeg is om je voor narigheid te behoeden. Daarna kwamen antivirus, antimalware, sandboxing, webfilters, proxy, VPN\u2019s, DLP en nog veel meer. Op een gegeven moment paste onze tekening niet meer op \u00e9\u00e9n A4.<u><\/u><u><\/u><\/p>\n<h2><b>Decompleximeren<\/b><u><\/u><u><\/u><\/h2>\n<p>De meeste technische oplossingen kwamen van verschillende leveranciers. Zo was de ene leverancier specialist op firewall gebied, en de ander innovatief leider op het gebied van webfilters. Inmiddels zien we dat er een grotere efficiency te behalen is door het kiezen van zo weinig mogelijk verschillende oplossingen voor zoveel mogelijk beveiliging. Fabrikanten hebben door eigen ontwikkelingen en overnames een breed security portfolio. Denk bijvoorbeeld aan een Unified Threat Management of Next Generation firewall die bestaan uit verschillende modules. Meerdere ingewikkelde deeloplossingen van verschillende fabrikanten worden zo overzichtelijk en beheersbaar gedecompleximeerd in een totaaloplossing van \u00e9\u00e9n fabrikant.<u><\/u><u><\/u><\/p>\n<h2><b>Advantages<\/b><u><\/u><u><\/u><\/h2>\n<p>Gebundelde deeloplossingen zorgen voor overzicht en eenvoud. Door de afgenomen complexiteit is de kans op het maken van configuratiefouten kleiner. Door samenwerking van de deelcomponenten is de beschermingsgraad hoger. Centralisatie van dashboards en rapportages zorgen voor vereenvoudigd inzicht. Beheer is eenvoudiger en tegen lagere kosten uit te voeren. Of je dat laatste nou zelf doet of hebt uitbesteed.<u><\/u><u><\/u><\/p>\n<h2><b>Advies<\/b><u><\/u><u><\/u><\/h2>\n<p>Wil je meer weten over het decompleximeren van jouw security-omgeving of overweeg je om security-beheer uit te besteden? Neem dan contact met ons op. Wij zijn als managed security service provider ondermeer gespecialiseerd in het beheren en monitoren van de security-producten van Fortinet, zoals de Next Generation firewall FortiGate en analyse-platform FortiAnalyzer. Wij adviseren je graag over de voordelen<\/p>\n<\/div>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Het eerste woord van bovenstaande titel heb ik zelf verzonnen. Het is een samenstelling van decimeren (Van Dale: sterk\u00a0terugbrengen\u00a0in aantal) en complex [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5098,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-2699","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Verminder Complexiteit in Cybersecurity | Apex Security<\/title>\n<meta name=\"description\" content=\"Ontdek hoe het &#039;decompleximeren&#039; van uw cybersecurity-omgeving kan bijdragen aan effici\u00ebntere en effectievere beveiligingsmaatregelen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apexsecurity.nl\/en\/decompleximeren-van-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Verminder Complexiteit in Cybersecurity | Apex Security\" \/>\n<meta property=\"og:description\" content=\"Ontdek hoe het &#039;decompleximeren&#039; van uw cybersecurity-omgeving kan bijdragen aan effici\u00ebntere en effectievere beveiligingsmaatregelen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apexsecurity.nl\/en\/decompleximeren-van-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Apex Security Experts in Cyber\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-28T08:49:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T12:42:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/transformation-3746922_1920-1024x455-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Peter Pronk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter Pronk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/\"},\"author\":{\"name\":\"Peter Pronk\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\"},\"headline\":\"Decompleximeren van cyber security\",\"datePublished\":\"2020-04-28T08:49:00+00:00\",\"dateModified\":\"2025-01-17T12:42:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/\"},\"wordCount\":424,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/transformation-3746922_1920-1024x455-1.jpg\",\"articleSection\":[\"Security Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/\",\"name\":\"Verminder Complexiteit in Cybersecurity | Apex Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/transformation-3746922_1920-1024x455-1.jpg\",\"datePublished\":\"2020-04-28T08:49:00+00:00\",\"dateModified\":\"2025-01-17T12:42:53+00:00\",\"description\":\"Ontdek hoe het 'decompleximeren' van uw cybersecurity-omgeving kan bijdragen aan effici\u00ebntere en effectievere beveiligingsmaatregelen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/transformation-3746922_1920-1024x455-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/transformation-3746922_1920-1024x455-1.jpg\",\"width\":1024,\"height\":455,\"caption\":\"transformation-3746922_1920-1024x455\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/decompleximeren-van-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Decompleximeren van cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"name\":\"Apex Security\",\"description\":\"Fortifying Your Digital Future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apexsecurity.nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\",\"name\":\"Apex Security\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"width\":1272,\"height\":431,\"caption\":\"Apex Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/apex-security-b-v\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\",\"name\":\"Peter Pronk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"caption\":\"Peter Pronk\"},\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/en\\\/author\\\/petpro\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Verminder Complexiteit in Cybersecurity | Apex Security","description":"Ontdek hoe het 'decompleximeren' van uw cybersecurity-omgeving kan bijdragen aan effici\u00ebntere en effectievere beveiligingsmaatregelen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apexsecurity.nl\/en\/decompleximeren-van-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Verminder Complexiteit in Cybersecurity | Apex Security","og_description":"Ontdek hoe het 'decompleximeren' van uw cybersecurity-omgeving kan bijdragen aan effici\u00ebntere en effectievere beveiligingsmaatregelen.","og_url":"https:\/\/www.apexsecurity.nl\/en\/decompleximeren-van-cyber-security\/","og_site_name":"Apex Security Experts in Cyber","article_published_time":"2020-04-28T08:49:00+00:00","article_modified_time":"2025-01-17T12:42:53+00:00","og_image":[{"width":1024,"height":455,"url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/transformation-3746922_1920-1024x455-1.jpg","type":"image\/jpeg"}],"author":"Peter Pronk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter Pronk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/"},"author":{"name":"Peter Pronk","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688"},"headline":"Decompleximeren van cyber security","datePublished":"2020-04-28T08:49:00+00:00","dateModified":"2025-01-17T12:42:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/"},"wordCount":424,"publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/transformation-3746922_1920-1024x455-1.jpg","articleSection":["Security Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/","url":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/","name":"Verminder Complexiteit in Cybersecurity | Apex Security","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/transformation-3746922_1920-1024x455-1.jpg","datePublished":"2020-04-28T08:49:00+00:00","dateModified":"2025-01-17T12:42:53+00:00","description":"Ontdek hoe het 'decompleximeren' van uw cybersecurity-omgeving kan bijdragen aan effici\u00ebntere en effectievere beveiligingsmaatregelen.","breadcrumb":{"@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/#primaryimage","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/transformation-3746922_1920-1024x455-1.jpg","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/transformation-3746922_1920-1024x455-1.jpg","width":1024,"height":455,"caption":"transformation-3746922_1920-1024x455"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apexsecurity.nl\/decompleximeren-van-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.apexsecurity.nl\/"},{"@type":"ListItem","position":2,"name":"Decompleximeren van cyber security"}]},{"@type":"WebSite","@id":"https:\/\/www.apexsecurity.nl\/#website","url":"https:\/\/www.apexsecurity.nl\/","name":"Apex Security","description":"Fortifying Your Digital Future","publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apexsecurity.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apexsecurity.nl\/#organization","name":"Apex Security","url":"https:\/\/www.apexsecurity.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","width":1272,"height":431,"caption":"Apex Security"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/apex-security-b-v"]},{"@type":"Person","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688","name":"Peter Pronk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","caption":"Peter Pronk"},"url":"https:\/\/www.apexsecurity.nl\/en\/author\/petpro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/2699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/comments?post=2699"}],"version-history":[{"count":1,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/2699\/revisions"}],"predecessor-version":[{"id":5099,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/2699\/revisions\/5099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media\/5098"}],"wp:attachment":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media?parent=2699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/categories?post=2699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/tags?post=2699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}