{"id":565,"date":"2025-01-22T06:28:16","date_gmt":"2025-01-22T05:28:16","guid":{"rendered":"https:\/\/kenthor.wedeon.it\/?page_id=565"},"modified":"2025-03-24T23:10:03","modified_gmt":"2025-03-24T22:10:03","slug":"ot-protect","status":"publish","type":"page","link":"https:\/\/www.kenthor.com\/en\/ot-protect\/","title":{"rendered":"OT Protect"},"content":{"rendered":"<div>\n<p>    <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/kenthor-ot-protect-hero.webp\" alt=\"\"><\/p>\n<div>Ma\u00dfgeschneiderte IT-Sicherheit f\u00fcr den Shopfloor<\/div>\n<p>OTProtect<\/p>\n<div>\n<p>OTProtect ist unsere neueste, adaptive Sicherheitsl\u00f6sung f\u00fcr den Shopfloor. Nutzen Sie die hochsicheren St\u00e4rken unserer patentierten L\u00f6sung f\u00fcr verteilte Sicherheitsl\u00f6sung, um Ihre Produktion zukunftssicher zu gestalten.<\/p>\n<\/div>\n<\/div>\n<h2>IT-Sicherheit f\u00fcr Bestandsmaschinen<\/h2>\n<div>\n<p>Unsere revolution\u00e4re, netzwerkbasierte Sicherheitsl\u00f6sung f\u00fcr den Shopfloor. Sichern Sie Ihre Produktionsmaschinen gegen Angriffe mit Hilfe unserer verteilten und intelligenten OTProtect-L\u00f6sungen.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<h4>Security by Cryptography<\/h4>\n<p>Security by Design war gestern. Unsere Plattform basiert auf einem einzigartigen und patentierten kryptographischen Verfahren zur sicheren Synchronisation und verteilten Verwaltung jeglicher Form von Daten. Damit bieten unsere Plattform-L\u00f6sungen eine g\u00e4nzlich neue Form der verteilten Sicherheit ohne den gef\u00e4hrlichen Single-Point-of-Attack.<\/p>\n<h4>Warum OTProtect von Kenthor?<\/h4>\n<p>Mit unserer langen Beratungs- und Technologieerfahrung bieten wir Ihnen individualisierte L\u00f6sungen auf Basis unserer neuartigen OTProtect Sicherheitsplattform. Sie k\u00f6nnen entscheiden, ob Sie eine ma\u00dfgeschneiderte L\u00f6sung ben\u00f6tigen oder unsere Plattformtechnologie sowie die zugrundeliegenden Patente lizenzieren m\u00f6chten.<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/OTProtect-Screens.png\" alt=\"\"><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/03\/DataOS-Crypto.png\" alt=\"\"><\/p>\n<div>\n<h4>Ben\u00f6tigen Sie eine exklusive Option?<\/h4>\n<p>Sie wollen Ihre bestehende Technologie erweitern? Sie m\u00f6chten Ihr Produkt auf die n\u00e4chste Ebene heben? Sie ben\u00f6tigen sichere kryptographische Verfahren zur Absicherung Ihrer L\u00f6sung?<\/p>\n<p>Gerne diskutieren wir mit Ihnen ein Angebot f\u00fcr den exklusiven Erwerb der Technologie samt aller Patente (EP 2 924 953 \/ US 10,630,474).<\/p>\n<p>Sprechen Sie uns an!<\/p>\n<\/div>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"name\":\"Hero\",\"type\":\"section\",\"props\":{\"animation_delay\":false,\"header_transparent\":false,\"header_transparent_noplaceholder\":true,\"height_offset_top\":true,\"height_viewport\":80,\"image_position\":\"center-center\",\"overlap\":false,\"padding\":\"none\",\"preserve_color\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"slideshow\",\"props\":{\"animation\":\"fade\",\"content_style\":\"text-lead\",\"image_loading\":true,\"image_width\":\"2560\",\"link_parallax_opacity\":\"0,1,1\",\"link_parallax_y\":\"50,0,0\",\"link_style\":\"primary\",\"link_text\":\"View House\",\"margin\":\"default\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_parallax_opacity\":\"0,1,1\",\"meta_parallax_y\":\"-50,0,0\",\"meta_style\":\"h6\",\"nav\":\"\",\"nav_align\":\"center\",\"nav_breakpoint\":\"\",\"nav_position\":\"bottom-center\",\"nav_position_margin\":\"medium\",\"overlay_animation\":\"parallax\",\"overlay_container\":\"default\",\"overlay_position\":\"center-left\",\"overlay_width\":\"2xlarge\",\"show_content\":true,\"show_link\":true,\"show_meta\":true,\"show_thumbnail\":true,\"show_title\":true,\"slidenav\":\"\",\"slidenav_breakpoint\":\"m\",\"slidenav_hover\":true,\"slidenav_margin\":\"medium\",\"slidenav_outside_breakpoint\":\"xl\",\"slideshow_autoplay\":false,\"slideshow_autoplay_pause\":true,\"slideshow_height\":\"viewport\",\"slideshow_height_offset_top\":true,\"slideshow_height_viewport\":80,\"slideshow_max_height\":\"840\",\"slideshow_min_height\":\"600\",\"slideshow_ratio\":\"16:7\",\"slideshow_velocity\":0.59999999999999997779553950749686919152736663818359375,\"text_align\":\"left\",\"text_align_fallback\":\"center\",\"text_color\":\"light\",\"thumbnav_height\":\"75\",\"thumbnav_svg_color\":\"emphasis\",\"thumbnav_width\":\"100\",\"title_element\":\"div\",\"title_hover_style\":\"reset\",\"title_parallax_opacity\":\"0,1,1\",\"title_parallax_x\":\"-200,0,200\",\"title_style\":\"heading-medium\"},\"children\":[{\"type\":\"slideshow_item\",\"props\":{\"content\":\"\n\n<p>OTProtect ist unsere neueste, adaptive Sicherheitsl\\u00f6sung f\\u00fcr den Shopfloor. Nutzen Sie die hochsicheren St\\u00e4rken unserer patentierten L\\u00f6sung f\\u00fcr verteilte Sicherheitsl\\u00f6sung, um Ihre Produktion zukunftssicher zu gestalten.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/kenthor-ot-protect-hero.webp\",\"item_element\":\"article\",\"link_text\":\"Mehr erfahren\",\"media_overlay\":\"rgba(0, 0, 0, 0.72)\",\"meta\":\"OTProtect\",\"title\":\"Ma\\u00dfgeschneiderte IT-Sicherheit f\\u00fcr den Shopfloor\"}}]}]}]}]},{\"name\":\"Hero Leistungen\",\"type\":\"section\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/blog-bg.svg\",\"image_effect\":\"parallax\",\"image_loading\":true,\"image_parallax_bgy\":\"80,290\",\"image_parallax_easing\":\"1\",\"image_position\":\"top-right\",\"padding_remove_bottom\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"xlarge\"},\"children\":[{\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"IT-Sicherheit f\\u00fcr Bestandsmaschinen\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"h2\"}}]}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Unsere revolution\\u00e4re, netzwerkbasierte Sicherheitsl\\u00f6sung f\\u00fcr den Shopfloor. Sichern Sie Ihre Produktionsmaschinen gegen Angriffe mit Hilfe unserer verteilten und intelligenten OTProtect-L\\u00f6sungen.<span class=\\\"Apple-converted-space\\\">\\u00a0<\\\/span><\\\/p>\\n\n\n<h4>Security by Cryptography<\\\/h4>\\n\n\n<p>Security by Design war gestern. Unsere Plattform basiert auf einem einzigartigen und patentierten kryptographischen Verfahren zur sicheren Synchronisation und verteilten Verwaltung jeglicher Form von Daten. Damit bieten unsere Plattform-L\\u00f6sungen eine g\\u00e4nzlich neue Form der verteilten Sicherheit ohne den gef\\u00e4hrlichen Single-Point-of-Attack.<\\\/p>\\n\n\n<h4>Warum OTProtect von Kenthor?<\\\/h4>\\n\n\n<p>Mit unserer langen Beratungs- und Technologieerfahrung bieten wir Ihnen individualisierte L\\u00f6sungen auf Basis unserer neuartigen OTProtect Sicherheitsplattform. Sie k\\u00f6nnen entscheiden, ob Sie eine ma\\u00dfgeschneiderte L\\u00f6sung ben\\u00f6tigen oder unsere Plattformtechnologie sowie die zugrundeliegenden Patente lizenzieren m\\u00f6chten.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/OTProtect-Screens.png\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2025\\\/03\\\/DataOS-Crypto.png\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h4>Ben\\u00f6tigen Sie eine exklusive Option?<\\\/h4>\\n\n\n<p>Sie wollen Ihre bestehende Technologie erweitern? Sie m\\u00f6chten Ihr Produkt auf die n\\u00e4chste Ebene heben? Sie ben\\u00f6tigen sichere kryptographische Verfahren zur Absicherung Ihrer L\\u00f6sung?<\\\/p>\\n\n\n<p>Gerne diskutieren wir mit Ihnen ein Angebot f\\u00fcr den exklusiven Erwerb der Technologie samt aller Patente (EP 2 924 953 \\\/ US 10,630,474).<\\\/p>\\n\n\n<p>Sprechen Sie uns an!<\\\/p>\",\"margin\":\"default\"}}]}],\"props\":{\"layout\":\"1-2,1-2\"}}]},{\"name\":\"Support\",\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"200\",\"image_effect\":\"parallax\",\"image_loading\":true,\"image_parallax_bgy\":\"0,500\",\"image_parallax_easing\":\"1\",\"image_position\":\"top-right\",\"image_width\":\"1100\",\"media_visibility\":\"xl\",\"padding\":\"xlarge\",\"padding_remove_bottom\":false,\"status\":\"disabled\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"xlarge\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Unsere Leistungen auf einen Blick\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"h2\"}}]}]},{\"type\":\"row\",\"props\":{\"id\":\"topics\",\"layout\":\"1-3,1-3,1-3\",\"margin\":\"xlarge\",\"margin_remove_bottom\":true,\"width\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"fade\",\"content\":\"\",\"content_column_breakpoint\":\"m\",\"height_expand\":true,\"icon\":\"\",\"icon_color\":\"primary\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/support-support-01.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_loading\":false,\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"kontakt\\\/\",\"link_style\":\"primary\",\"link_text\":\"Jetzt anfragen\",\"margin\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"content\",\"panel_image_no_padding\":false,\"panel_padding\":\"large\",\"panel_style\":\"card-default\",\"text_align\":\"center\",\"title\":\"Definition von IT-Sicherheitsprozessen\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\",\"content_column_breakpoint\":\"m\",\"height_expand\":true,\"icon\":\"\",\"icon_color\":\"primary\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/support-support-02.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_loading\":false,\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"kontakt\\\/\",\"link_style\":\"primary\",\"link_text\":\"Jetzt anfragen\",\"margin\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"content\",\"panel_image_no_padding\":false,\"panel_padding\":\"large\",\"panel_style\":\"card-default\",\"text_align\":\"center\",\"title\":\"Management und Durchsetzen von IT-Sicherheitsprozessen\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\",\"content_column_breakpoint\":\"m\",\"height_expand\":true,\"icon\":\"\",\"icon_color\":\"primary\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/support-support-03.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_loading\":false,\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"kontakt\\\/\",\"link_style\":\"primary\",\"link_text\":\"Jetzt anfragen\",\"margin\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"content\",\"panel_image_no_padding\":false,\"panel_padding\":\"large\",\"panel_style\":\"card-default\",\"text_align\":\"center\",\"title\":\"Durchf\\u00fchren von Bedrohungs- und Risiko-Analysen\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-3,1-3,1-3\",\"width\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\",\"content_column_breakpoint\":\"m\",\"height_expand\":true,\"icon\":\"\",\"icon_color\":\"primary\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/support-support-04.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"kontakt\\\/\",\"link_style\":\"primary\",\"link_text\":\"Jetzt anfragen\",\"margin\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"content\",\"panel_image_no_padding\":false,\"panel_padding\":\"large\",\"panel_style\":\"card-default\",\"text_align\":\"center\",\"title\":\"Ableiten von IT-Sicherheitsma\\u00dfnahmen\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\",\"content_column_breakpoint\":\"m\",\"height_expand\":true,\"icon\":\"\",\"icon_color\":\"primary\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/support-support-05.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"kontakt\\\/\",\"link_style\":\"primary\",\"link_text\":\"Jetzt anfragen\",\"margin\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"content\",\"panel_image_no_padding\":false,\"panel_padding\":\"large\",\"panel_style\":\"card-default\",\"text_align\":\"center\",\"title\":\"Evaluieren von Sicherheitsl\\u00f6sungen und Sicherheitsniveau\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\",\"content_column_breakpoint\":\"m\",\"height_expand\":true,\"icon\":\"\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/support-support-06.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"kontakt\\\/\",\"link_style\":\"primary\",\"link_text\":\"Jetzt anfragen\",\"margin\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"content\",\"panel_image_no_padding\":false,\"panel_padding\":\"large\",\"panel_style\":\"card-default\",\"text_align\":\"center\",\"title\":\"Management von Code-Reviews, Penetrationstest und Sicherheitsanalysen\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]}]}]}],\"version\":\"4.5.9\",\"yooessentialsVersion\":\"2.3.8\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ma\u00dfgeschneiderte IT-Sicherheit f\u00fcr den Shopfloor OTProtect OTProtect ist unsere neueste, adaptive Sicherheitsl\u00f6sung f\u00fcr den Shopfloor. Nutzen Sie die hochsicheren St\u00e4rken unserer patentierten L\u00f6sung f\u00fcr verteilte Sicherheitsl\u00f6sung, um Ihre Produktion zukunftssicher zu gestalten. IT-Sicherheit f\u00fcr Bestandsmaschinen Unsere revolution\u00e4re, netzwerkbasierte Sicherheitsl\u00f6sung f\u00fcr den Shopfloor. Sichern Sie Ihre Produktionsmaschinen gegen Angriffe mit Hilfe unserer verteilten und intelligenten OTProtect-L\u00f6sungen.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-565","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.kenthor.com\/en\/wp-json\/wp\/v2\/pages\/565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kenthor.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kenthor.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kenthor.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kenthor.com\/en\/wp-json\/wp\/v2\/comments?post=565"}],"version-history":[{"count":36,"href":"https:\/\/www.kenthor.com\/en\/wp-json\/wp\/v2\/pages\/565\/revisions"}],"predecessor-version":[{"id":649,"href":"https:\/\/www.kenthor.com\/en\/wp-json\/wp\/v2\/pages\/565\/revisions\/649"}],"wp:attachment":[{"href":"https:\/\/www.kenthor.com\/en\/wp-json\/wp\/v2\/media?parent=565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}