{"id":2705,"date":"2020-04-20T09:51:00","date_gmt":"2020-04-20T08:51:00","guid":{"rendered":"https:\/\/apexsecurity.nl\/?p=2705"},"modified":"2025-01-17T12:49:52","modified_gmt":"2025-01-17T12:49:52","slug":"goed-beheer-is-het-hele-werk","status":"publish","type":"post","link":"https:\/\/www.apexsecurity.nl\/en\/goed-beheer-is-het-hele-werk\/","title":{"rendered":"Good management is the whole job"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2705\" class=\"elementor elementor-2705\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f26fda0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f26fda0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15c761b0\" data-id=\"15c761b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57fa621a elementor-widget elementor-widget-text-editor\" data-id=\"57fa621a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<div>\n<p><strong>Hoeveel miljarden zouden er de afgelopen jaren zijn ge\u00efnvesteerd in cyber security-oplossingen?<\/strong><u><\/u><u><\/u><\/p>\n<p><strong>In beveiligingssystemen, zoals firewalls, antivirus en malware protectie. Fysiek, virtueel of in \u2018de cloud\u2019.<\/strong><u><\/u><u><\/u><\/p>\n<p><strong>En hoeveel procent van die systemen zouden goed worden beheerd? En wat is goed? Of goed genoeg?<\/strong><u><\/u><u><\/u><\/p>\n<h2><b>Onkruid vergaat niet<\/b><u><\/u><u><\/u><\/h2>\n<p>Mijn ervaring is dat veel organisaties investeren in goede oplossingen. In de laatste techniek. Die met de beste specs en de beste performance. Het liefst van een fabrikant ergens rechtsboven in het betreffende Gartner Quadrant: die van leiders met een stevige visie die zij tot uitvoer brengen in goede producten.<u><\/u><u><\/u><\/p>\n<p>Maar met het implementeren van een goede oplossing alleen ben je er nog niet. Net na aanschaf van een nieuw product is het voor beheerders natuurlijk heel interessant om te ontdekken wat de nieuwe techniek allemaal kan. Na een eventuele training gaan zij enthousiast aan de slag met de mooie dashboards en rapportages die worden meegeleverd.<u><\/u><u><\/u><\/p>\n<p>De waan van alle dag zorgt er daarna vaak voor dat de prioriteiten weer op andere zaken komen te liggen. Er doen zich incidenten voor, er moeten projecten worden gedraaid, er wordt vergaderd, en voor je het weet ben je alweer een jaar verder na aanschaf van je mooie security-oplossing.<u><\/u><u><\/u><\/p>\n<p>Dit is eigenlijk net zoiets als een mooie tuin aanleggen en na een poosje het onderhoud laten versloffen. Onkruid vergaat niet en voor je het weet is je tuin niet meer wat je ooit voor ogen had.<strong>\u00a0<\/strong><u><\/u><u><\/u><\/p>\n<h2><b>Winst behalen<\/b><u><\/u><u><\/u><\/h2>\n<p>Een security-oplossing moet dagelijks beheerd worden. Dit beheer bestaat uit werkzaamheden die niet altijd even interessant gevonden worden: operationeel en functioneel beheer.<u><\/u><u><\/u><\/p>\n<h2><b>Operationeel beheer<\/b><u><\/u><u><\/u><\/h2>\n<\/div>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-708c412 elementor-widget elementor-widget-image\" data-id=\"708c412\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/apexsecurity.nl\/wp-content\/uploads\/2020\/04\/datacenter.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc18dd0 elementor-widget elementor-widget-text-editor\" data-id=\"bc18dd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<div>\n<p>Dit omvat het dagelijks routinematig controleren en het doorvoeren van verbeteringen in de techniek. Denk hierbij aan het monitoren van performance, beschikbaarheid en capaciteit en het maken van back-ups. Ook het controleren op kwetsbaarheden, zogenaamde vulnerabilities, en het installeren van patches of updates om deze te verhelpen horen bij dagelijks operationeel beheer. Dit vormt de basis voor het beheren van de functie waarvoor de oplossing is aangeschaft: security.<u><\/u><u><\/u><\/p>\n<h2><b>Functioneel beheer<\/b><u><\/u><u><\/u><\/h2>\n<p>De basis van goed beheer wordt dus gevormd door het uitvoeren van regulier operationeel beheer van de security-oplossing. Daarna moet de focus liggen op het beheren van de security-functies van de gekozen oplossing. Denk aan functies zoals firewall, web filter, malwareprotectie en remote access. Deze moeten voortdurend worden gecontroleerd of zij hun werk optimaal doen, of er alarmen zijn die moeten worden opgevolgd en of er verbeteringen kunnen worden doorgevoerd.<u><\/u><u><\/u><\/p>\n<h2><b>Optimaal rendement<\/b><u><\/u><u><\/u><\/h2>\n<p>Er is veel winst te behalen door een goede security-oplossing beter te beheren. Met een combinatie van operationeel en functioneel beheer haal je optimaal rendement uit je investering.<u><\/u><u><\/u><\/p>\n<p>Kom je hier zelf niet uit? Overweeg dan om het beheer uit te besteden aan een specialist. Zij hebben de kennis, ervaring en middelen om dit effectief voor je te organiseren.<\/p>\n<\/div>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Hoeveel miljarden zouden er de afgelopen jaren zijn ge\u00efnvesteerd in cyber security-oplossingen? In beveiligingssystemen, zoals firewalls, antivirus en malware protectie. Fysiek, virtueel [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-2705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Effectief Beheer van Cybersecurity Oplossingen | Apex Security<\/title>\n<meta name=\"description\" content=\"Ontdek het belang van operationeel en functioneel beheer voor het optimaliseren van uw cybersecurity-oplossingen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apexsecurity.nl\/en\/goed-beheer-is-het-hele-werk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Effectief Beheer van Cybersecurity Oplossingen | Apex Security\" \/>\n<meta property=\"og:description\" content=\"Ontdek het belang van operationeel en functioneel beheer voor het optimaliseren van uw cybersecurity-oplossingen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apexsecurity.nl\/en\/goed-beheer-is-het-hele-werk\/\" \/>\n<meta property=\"og:site_name\" content=\"Apex Security Experts in Cyber\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-20T08:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T12:49:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Peter Pronk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter Pronk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/\"},\"author\":{\"name\":\"Peter Pronk\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\"},\"headline\":\"Good management is the whole job\",\"datePublished\":\"2020-04-20T08:51:00+00:00\",\"dateModified\":\"2025-01-17T12:49:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/\"},\"wordCount\":473,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg\",\"articleSection\":[\"Security Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/\",\"name\":\"Effectief Beheer van Cybersecurity Oplossingen | Apex Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg\",\"datePublished\":\"2020-04-20T08:51:00+00:00\",\"dateModified\":\"2025-01-17T12:49:52+00:00\",\"description\":\"Ontdek het belang van operationeel en functioneel beheer voor het optimaliseren van uw cybersecurity-oplossingen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg\",\"width\":1024,\"height\":682,\"caption\":\"Server_pexels-brett-sayles-5050305_1920-1024x682\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/goed-beheer-is-het-hele-werk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Good management is the whole job\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"name\":\"Apex Security\",\"description\":\"Fortifying Your Digital Future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apexsecurity.nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\",\"name\":\"Apex Security\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"width\":1272,\"height\":431,\"caption\":\"Apex Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/apex-security-b-v\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/8c733f21304cf340d6e61f5a8fae2688\",\"name\":\"Peter Pronk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g\",\"caption\":\"Peter Pronk\"},\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/en\\\/author\\\/petpro\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Effectief Beheer van Cybersecurity Oplossingen | Apex Security","description":"Ontdek het belang van operationeel en functioneel beheer voor het optimaliseren van uw cybersecurity-oplossingen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apexsecurity.nl\/en\/goed-beheer-is-het-hele-werk\/","og_locale":"en_US","og_type":"article","og_title":"Effectief Beheer van Cybersecurity Oplossingen | Apex Security","og_description":"Ontdek het belang van operationeel en functioneel beheer voor het optimaliseren van uw cybersecurity-oplossingen.","og_url":"https:\/\/www.apexsecurity.nl\/en\/goed-beheer-is-het-hele-werk\/","og_site_name":"Apex Security Experts in Cyber","article_published_time":"2020-04-20T08:51:00+00:00","article_modified_time":"2025-01-17T12:49:52+00:00","og_image":[{"width":1024,"height":682,"url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg","type":"image\/jpeg"}],"author":"Peter Pronk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter Pronk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/#article","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/"},"author":{"name":"Peter Pronk","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688"},"headline":"Good management is the whole job","datePublished":"2020-04-20T08:51:00+00:00","dateModified":"2025-01-17T12:49:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/"},"wordCount":473,"publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg","articleSection":["Security Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/","url":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/","name":"Effectief Beheer van Cybersecurity Oplossingen | Apex Security","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/#primaryimage"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg","datePublished":"2020-04-20T08:51:00+00:00","dateModified":"2025-01-17T12:49:52+00:00","description":"Ontdek het belang van operationeel en functioneel beheer voor het optimaliseren van uw cybersecurity-oplossingen.","breadcrumb":{"@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/#primaryimage","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2020\/04\/Server_pexels-brett-sayles-5050305_1920-1024x682-1.jpg","width":1024,"height":682,"caption":"Server_pexels-brett-sayles-5050305_1920-1024x682"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apexsecurity.nl\/goed-beheer-is-het-hele-werk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.apexsecurity.nl\/"},{"@type":"ListItem","position":2,"name":"Good management is the whole job"}]},{"@type":"WebSite","@id":"https:\/\/www.apexsecurity.nl\/#website","url":"https:\/\/www.apexsecurity.nl\/","name":"Apex Security","description":"Fortifying Your Digital Future","publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apexsecurity.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apexsecurity.nl\/#organization","name":"Apex Security","url":"https:\/\/www.apexsecurity.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","width":1272,"height":431,"caption":"Apex Security"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/apex-security-b-v"]},{"@type":"Person","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/8c733f21304cf340d6e61f5a8fae2688","name":"Peter Pronk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa81f3f7edf195e4947258e4c53539587fa0430e58226677d2be32cb982bf183?s=96&d=mm&r=g","caption":"Peter Pronk"},"url":"https:\/\/www.apexsecurity.nl\/en\/author\/petpro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/2705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/comments?post=2705"}],"version-history":[{"count":2,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/2705\/revisions"}],"predecessor-version":[{"id":6054,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/2705\/revisions\/6054"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media\/5096"}],"wp:attachment":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media?parent=2705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/categories?post=2705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/tags?post=2705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}