{"id":22415,"date":"2023-05-09T02:31:38","date_gmt":"2023-05-09T09:31:38","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=22415"},"modified":"2025-02-19T08:21:47","modified_gmt":"2025-02-19T15:21:47","slug":"industries","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/en\/industries","title":{"rendered":"Industries"},"content":{"rendered":"\n\t\t<div  class=\"block-40b91a00-937b-4f0a-93e8-f4bc1941ddca areoi-element overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-d4b89a55-ea7f-4f44-ba69-8cf6ee06a5b9 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-70282db6-5eed-4c1d-81b8-bd9df95e98d9 col areoi-element px-3 px-md-5 px-xl-3 m-auto col-12 col-xl-8\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4 px-xl-5 mx-xl-5 h1-new-design has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Protect Every Industry with Syteca<\/h1>\n\n\n\n<p class=\"has-text-align-center mb-0 mx-auto text-22-16 has-white-color has-text-color\">Reinforce access control and endpoint visibility with the Syteca platform, ensuring comprehensive protection against internal threats and addressing your industry\u2019s unique challenges.<\/p>\n\n\n\n\t\t<div  class=\"block-3ea0e91e-bac8-403a-a13e-a854b0c693f9 areoi-element d-flex justify-content-center align-self-center  flex-wrap button-block\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-de3b11c2-c778-48a0-a657-1e43ada50480 btn areoi-has-url position-relative hsBtn-demo btn-primary me-md-1 mb-1 mb-md-0 btn-primary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-ca5e3a61-7bd8-407c-8af3-cc889cf46dbc btn areoi-has-url position-relative btn btn-outline-light ms-md-4 mt-3 mt-md-0 btn-outline-light\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ef2c1a6b-f7e9-4163-9a79-80751af872a9 areoi-element section-2\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,0)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-14e9f97b-214e-4aaa-935b-726896a49638 areoi-element linear-gradient-bg-2\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-3 mb-xl-4 h2-new-design\">Who we serve<\/h2>\n\n\n\n<p class=\"has-text-align-center text-20-16 mb-0 mx-3\" style=\"font-style:normal;font-weight:500\">Explore how Syteca\u2019s cybersecurity solutions are designed to meet the distinctive requirements of each industry we serve.<\/p>\n\n\n\n\t\t<div  class=\"block-2933689a-c1a9-4dea-ae4d-e4ab0e0bc3d7 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8c1ea9ae-5ea1-4971-8f2e-4d96b9c9bdd3 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-e31e6629-2661-4a7b-aada-0a66bb3afcdd col areoi-element equalize-height industries-card col-12 col-md-6 col-xl-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-1856e761-b33c-4ca6-8f03-2e58e87f379f areoi-element rounded-bg-20px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/17025900\/pic-Finance.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-731bba26-4f3d-4c02-8b60-151a4e8ce836 areoi-element d-flex flex-wrap h-100 align-items-center info-indastry rounded-div-20px\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-2 p-poppins\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">Finance<\/p>\n\n\n\n<p class=\"mt-1 text-14-16\">Protect financial assets, prevent privilege abuse, and ensure regulatory compliance.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0\"><a href=\"\/en\/industries\/finance\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b5cf2174-4ae0-433b-a2d0-b096d868ca00 col areoi-element equalize-height industries-card col-12 col-md-6 col-xl-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d62409c1-4938-4beb-af75-d783b552975f areoi-element rounded-bg-20px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/17025930\/pic-Healthcare.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-731bba26-4f3d-4c02-8b60-151a4e8ce836 areoi-element d-flex flex-wrap h-100 align-items-center info-indastry rounded-div-20px\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-2 p-poppins\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">Healthcare<\/p>\n\n\n\n<p class=\"mt-1 text-14-16\">Secure patient data and stay compliant with healthcare regulations like HIPAA.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0\"><a href=\"\/en\/industries\/healthcare\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b5cf2174-4ae0-433b-a2d0-b096d868ca00 col areoi-element equalize-height industries-card col-12 col-md-6 col-xl-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-86314290-3027-44aa-9463-83fa6546ed67 areoi-element rounded-bg-20px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/17025948\/pic-Government.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-731bba26-4f3d-4c02-8b60-151a4e8ce836 areoi-element d-flex flex-wrap h-100 align-items-center info-indastry rounded-div-20px\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-2 p-poppins\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">Government<\/p>\n\n\n\n<p class=\"mt-1 text-14-16\">Fortify access to sensitive information and critical infrastructure.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0\"><a href=\"\/en\/industries\/government\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b5cf2174-4ae0-433b-a2d0-b096d868ca00 col areoi-element equalize-height industries-card col-12 col-md-6 col-xl-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d62409c1-4938-4beb-af75-d783b552975f areoi-element rounded-bg-20px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/17030013\/pic-Energy.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-731bba26-4f3d-4c02-8b60-151a4e8ce836 areoi-element d-flex flex-wrap h-100 align-items-center info-indastry rounded-div-20px\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-2 p-poppins\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">Energy<\/p>\n\n\n\n<p class=\"mt-1 text-14-16\">Protect vital infrastructure and ensure network visibility against emerging threats.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0\"><a href=\"\/en\/industries\/energy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b5cf2174-4ae0-433b-a2d0-b096d868ca00 col areoi-element equalize-height industries-card col-12 col-md-6 col-xl-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6edf77d3-ac20-4ad9-a0b7-bf334354498c areoi-element rounded-bg-20px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/17030032\/pic-Manufacturing.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-731bba26-4f3d-4c02-8b60-151a4e8ce836 areoi-element d-flex flex-wrap h-100 align-items-center info-indastry rounded-div-20px\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-2 p-poppins\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">Manufacturing<\/p>\n\n\n\n<p class=\"mt-1 text-14-16\">Defend intellectual property and secure operational processes from insider risks.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0\"><a href=\"\/en\/industries\/manufacturing\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e31e6629-2661-4a7b-aada-0a66bb3afcdd col areoi-element equalize-height industries-card col-12 col-md-6 col-xl-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-dcdce535-7e37-46a4-9969-120525d1edba areoi-element rounded-bg-20px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/17030059\/pic-Education.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-731bba26-4f3d-4c02-8b60-151a4e8ce836 areoi-element d-flex flex-wrap h-100 align-items-center info-indastry rounded-div-20px\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-2 p-poppins\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">Education<\/p>\n\n\n\n<p class=\"mt-1 text-14-16\">Safeguard student and faculty data and protect institutional assets from internal threats.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0\"><a href=\"\/en\/industries\/education\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c1ae3684-f3c1-4960-9ef4-2a8a13c32149 col areoi-element equalize-height industries-card col-12 col-md-6 col-xl-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d62409c1-4938-4beb-af75-d783b552975f areoi-element rounded-bg-20px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/17030113\/pic-Insurance.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-731bba26-4f3d-4c02-8b60-151a4e8ce836 areoi-element d-flex flex-wrap h-100 align-items-center info-indastry rounded-div-20px\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-2 p-poppins\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">Insurance<\/p>\n\n\n\n<p class=\"mt-1 text-14-16\">Ensure the confidentiality of client information and secure sensitive data against breaches.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0\"><a href=\"\/en\/industries\/insurance\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2cd381b1-3959-4001-8311-916dcd9a5da2 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-37dbd293-9e11-4943-ab7d-d71ca3630556 areoi-element linear-gradient-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-76198181-cbb4-4cba-a2c6-a569c3904a27 areoi-element container home-accordion-with-image rounded-bg-20px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-7197fa8a-2a53-4c3a-b2f9-b42d51835935 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-78a6b30d-4b99-4183-97eb-c5c759d4dcaa col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-acd89781-689c-4faf-9fd6-22b5db04aa47 areoi-element mb-xl-5\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading mb-4 text-42-28\">How Syteca secures critical assets across industries<\/h3>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e9e6b69e-4ee1-4190-ab0f-3f012810f521 accordion home-accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-e60be158-7315-4b82-af73-094a1b57ee30 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-e60be158-7315-4b82-af73-094a1b57ee30-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-e60be158-7315-4b82-af73-094a1b57ee30-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-e60be158-7315-4b82-af73-094a1b57ee30-collapse\"\n\t\t\t\t>\n\t\t\t\t\tAdvanced user activity monitoring\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-e60be158-7315-4b82-af73-094a1b57ee30-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-e60be158-7315-4b82-af73-094a1b57ee30-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Gain visibility into your IT infrastructure through continuous monitoring of employee and vendor activity, enhanced with screen-capture recordings and indexed metadata.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-2 mb-xl-0 mt-4 mt-xl-0 order-1 text-center text-xl-start w-100\" style=\"font-size:0.88rem\"><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"1366\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063828\/pic-Powerful-user-activity-monitoring.png\" alt=\"\" class=\"wp-image-47808\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063828\/pic-Powerful-user-activity-monitoring.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063828\/pic-Powerful-user-activity-monitoring-277x300.png 277w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063828\/pic-Powerful-user-activity-monitoring-945x1024.png 945w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063828\/pic-Powerful-user-activity-monitoring-768x833.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-d5294691-4219-47ff-98ac-e02a5d9950b7-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHigh-end identity and access management\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Validate users\u2019 identities before giving them access to your endpoints, securely manage passwords, and distinguish between users of shared accounts.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-2 mb-xl-0 mt-4 mt-xl-0 order-1 text-center text-xl-start w-100\"><a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"1260\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01070308\/Identity-Management.png\" alt=\"\" class=\"wp-image-46230\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01070308\/Identity-Management.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01070308\/Identity-Management-300x300.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01070308\/Identity-Management-1024x1024.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01070308\/Identity-Management-150x150.png 150w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01070308\/Identity-Management-768x768.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0545d6c-53e7-4daf-be46-74c336632640 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-d0545d6c-53e7-4daf-be46-74c336632640-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-d0545d6c-53e7-4daf-be46-74c336632640-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-d0545d6c-53e7-4daf-be46-74c336632640-collapse\"\n\t\t\t\t>\n\t\t\t\t\tPowerful privileged access management\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-d0545d6c-53e7-4daf-be46-74c336632640-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-d0545d6c-53e7-4daf-be46-74c336632640-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Secure privileged access by limiting user permissions to only those necessary for employees to do their jobs. Leverage manual access approval workflow to protect your most valuable endpoints.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0 mt-4 mt-xl-0 order-1 text-center text-xl-start w-100\"><a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"1366\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063933\/pic-Lightweight-privileged-access-management.png\" alt=\"\" class=\"wp-image-47816\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063933\/pic-Lightweight-privileged-access-management.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063933\/pic-Lightweight-privileged-access-management-277x300.png 277w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063933\/pic-Lightweight-privileged-access-management-945x1024.png 945w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18063933\/pic-Lightweight-privileged-access-management-768x833.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-eac331c4-85f0-4b96-be7f-533508bae7c3-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3-collapse\"\n\t\t\t\t>\n\t\t\t\t\tComprehensive third-party vendor monitoring\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Mitigate security risks and ensure data and infrastructure integrity by providing third-party vendors with temporary access to your IT environment and monitoring the activity of all remotely connected users.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0 mt-4 mt-xl-0 order-1 text-center text-xl-start w-100\"><a href=\"\/en\/solutions\/third-party-vendor-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"1260\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071005\/User-Session-Recording.png\" alt=\"\" class=\"wp-image-46248\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071005\/User-Session-Recording.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071005\/User-Session-Recording-300x300.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071005\/User-Session-Recording-1024x1024.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071005\/User-Session-Recording-150x150.png 150w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071005\/User-Session-Recording-768x768.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d5633365-6948-4471-8bc8-87d5bd1229b1 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-d5633365-6948-4471-8bc8-87d5bd1229b1-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-d5633365-6948-4471-8bc8-87d5bd1229b1-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-d5633365-6948-4471-8bc8-87d5bd1229b1-collapse\"\n\t\t\t\t>\n\t\t\t\t\tReal-time user activity alerts and incident response\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-d5633365-6948-4471-8bc8-87d5bd1229b1-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-d5633365-6948-4471-8bc8-87d5bd1229b1-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Promptly respond to suspicious user activity by activating predefined or custom alerts. Implement rules to automatically block malicious actions.<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0 mt-4 mt-xl-0 order-1 text-center text-xl-start w-100\"><a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"1260\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071409\/Alerts-and-Incident-Response.png\" alt=\"\" class=\"wp-image-46256\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071409\/Alerts-and-Incident-Response.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071409\/Alerts-and-Incident-Response-300x300.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071409\/Alerts-and-Incident-Response-1024x1024.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071409\/Alerts-and-Incident-Response-150x150.png 150w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071409\/Alerts-and-Incident-Response-768x768.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4110f00b-b558-4914-b615-7d489a2e7757 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-4110f00b-b558-4914-b615-7d489a2e7757-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-4110f00b-b558-4914-b615-7d489a2e7757-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-4110f00b-b558-4914-b615-7d489a2e7757-collapse\"\n\t\t\t\t>\n\t\t\t\t\tEnhanced auditing and reporting\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-4110f00b-b558-4914-b615-7d489a2e7757-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-4110f00b-b558-4914-b615-7d489a2e7757-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Evaluate your current insider risk landscape through a variety of reports and seamless integration with Microsoft Power BI. Export tamper-proof evidence of malicious user activity for forensic audits and investigations<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0 mt-4 mt-xl-0 order-1 text-center text-xl-start w-100\"><a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"1260\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071549\/Auditing-and-User-Activity-Reporting.png\" alt=\"\" class=\"wp-image-46263\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071549\/Auditing-and-User-Activity-Reporting.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071549\/Auditing-and-User-Activity-Reporting-300x300.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071549\/Auditing-and-User-Activity-Reporting-1024x1024.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071549\/Auditing-and-User-Activity-Reporting-150x150.png 150w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01071549\/Auditing-and-User-Activity-Reporting-768x768.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b4220a39-6cd5-400a-a234-82bbffe93f84 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-b4220a39-6cd5-400a-a234-82bbffe93f84-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-b4220a39-6cd5-400a-a234-82bbffe93f84-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-b4220a39-6cd5-400a-a234-82bbffe93f84-collapse\"\n\t\t\t\t>\n\t\t\t\t\tAdvanced anonymization of monitored user data\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-b4220a39-6cd5-400a-a234-82bbffe93f84-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-b4220a39-6cd5-400a-a234-82bbffe93f84-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Protect sensitive user data from disclosure with pseudonymization of personal information in the monitoring results. For investigation purposes, you can easily de-anonymize the<\/p>\n\n\n\n<p class=\"btn-link-arrow mb-0 mt-4 mt-xl-0 order-1 text-center text-xl-start w-100\"><a href=\"\/en\/user-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1021\" height=\"880\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055927\/Thorough-anonymization-of-monitored-user-data-1.png\" alt=\"\" class=\"wp-image-37439\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055927\/Thorough-anonymization-of-monitored-user-data-1.png 1021w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055927\/Thorough-anonymization-of-monitored-user-data-1-300x259.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055927\/Thorough-anonymization-of-monitored-user-data-1-768x662.png 768w\" sizes=\"(max-width: 1021px) 100vw, 1021px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a073b712-cd45-4800-a1a4-50c713105e6e col areoi-element d-none d-sm-none d-md-none d-lg-none d-xl-block\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a6843be8-b6ef-4e75-8ed9-cd71db619166 areoi-element\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-95ac86b5-ef89-4fca-977d-39e2c71a7551 areoi-element section-4 overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(246, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-6970b546-5c9d-4c90-931e-24a3a8cfea41 areoi-element container reviews\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8e1d05b9-2b2d-4a7a-bbf5-65207c17a818 row areoi-element align-items-center\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-336c299e-bf70-48d5-b012-8e68f526ce61 col areoi-element col-md-12 col-xl-6 order-1 order-xl-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bc4c5ff0-ec75-4953-8d36-86047000db64 row areoi-element case-stadies-slider w-100 ms-0\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bdd0af1f-6a2d-4e51-87c5-14fcb5c45927 col areoi-element d-flex flex-column justify-content-between mx-2\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064629\/pic-Vakifbank.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4fdf6e1e-cb1e-45b8-8a49-7e0ce3a66147 areoi-element d-flex justify-content-between h-auto\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image alignwide size-full mt-2\" style=\"width: 173px;\"><img decoding=\"async\" width=\"519\" height=\"76\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064302\/logo-VakifBank.png\" alt=\"\" class=\"wp-image-47825\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064302\/logo-VakifBank.png 519w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064302\/logo-VakifBank-300x44.png 300w\" sizes=\"(max-width: 519px) 100vw, 519px\" \/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 rounded-3 px-3 py-2 has-text-color has-background has-link-color wp-elements-5ed2a5b43d1eec1019533c308516600b\" style=\"color:#ffffff;background-color:#3a62f2;font-size:14px;font-style:italic;font-weight:600\">Banking<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-97789b4c-fbb6-4312-8c8c-ae1208cbef2f areoi-element h-auto\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 px-3 py-2 text-28-18 p-poppins has-text-color has-link-color wp-elements-e4a293f8f24092872cc6faf006e4a6e4\" style=\"color:#ffffff\">Vakifbank manages terminal server activities of subcontractors and administrators with Syteca<\/p>\n\n\n\n<p class=\"p-poppins ps-3 mb-0 learn-more-link-hover has-text-color has-link-color wp-elements-ef9e2f63a3b4425adede7ac0c14856ac\" style=\"color:#ffffff;font-style:normal;font-weight:600\"><a href=\"\/en\/resources\/case-studies\/cecabank-case-study\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b74d419b-2783-4eeb-9a22-ecc577c038b4 col areoi-element d-flex flex-column justify-content-between mx-2\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-6320b283-8ad4-4c61-a703-1adf9fb36b28 areoi-element d-flex justify-content-between h-auto\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image alignwide size-large mt-2\"><img decoding=\"async\" width=\"59\" height=\"21\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01072642\/NDA.svg\" alt=\"\" class=\"wp-image-46401\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 rounded-3 px-3 py-2 has-text-color has-background has-link-color wp-elements-5ed2a5b43d1eec1019533c308516600b\" style=\"color:#ffffff;background-color:#3a62f2;font-size:14px;font-style:italic;font-weight:600\">Banking<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6d35fd45-7f80-4a98-8d00-2718f8fb6ae2 areoi-element h-auto\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 px-3 py-2 text-28-18 p-poppins has-text-color has-link-color wp-elements-e7f0eb7327404e1b94ccd5dccc612846\" style=\"color:#ffffff\">A US-based financial services company effectively monitors and audits privileged users with Syteca<\/p>\n\n\n\n<p class=\"p-poppins ps-3 mb-0 learn-more-link-hover has-text-color has-link-color wp-elements-ec6b16460ebf0a543d2c6aac85101cc8\" style=\"color:#ffffff;font-style:normal;font-weight:600\"><a href=\"\/en\/resources\/case-studies\/an-outsourcing-software-development-company-streamlines-access-management-with-ekran-system\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c0d4178e-07b3-443d-a49e-152142c82e5c col areoi-element d-flex flex-column justify-content-between mx-2\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/01072521\/image-4.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-f89eeda7-d2c3-415d-8eef-466abaaec5ae areoi-element d-flex justify-content-between h-auto\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image alignwide size-full\" style=\"width:104px;\"><img decoding=\"async\" width=\"313\" height=\"312\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064741\/logo-Pade-poriya.png\" alt=\"\" class=\"wp-image-47852\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064741\/logo-Pade-poriya.png 313w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064741\/logo-Pade-poriya-300x300.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064741\/logo-Pade-poriya-150x150.png 150w\" sizes=\"(max-width: 313px) 100vw, 313px\" \/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 rounded-3 px-3 py-2 has-text-color has-background has-link-color wp-elements-2d96f24d330cbf65fa70d8a02072fc6c\" style=\"color:#ffffff;background-color:#3a62f2;font-size:14px;font-style:italic;font-weight:600; height:38%\">Healthcare<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4d3f7441-9513-4670-81fc-79c7937b495d areoi-element h-auto\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 px-3 py-2 text-28-18 p-poppins has-text-color has-link-color wp-elements-6ba045e9d74c65f814020ca70e1646ba\" style=\"color:#ffffff\">Baruch Pada Medical Center secures third-party activities with Syteca<\/p>\n\n\n\n<p class=\"p-poppins ps-3 mb-0 learn-more-link-hover has-text-color has-link-color wp-elements-2b2debd420b21fec3e11f1f90e52ba36\" style=\"color:#ffffff;font-style:normal;font-weight:600\"><a href=\"\/en\/resources\/case-studies\/us-based-defense-organization-case-study\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-658c2f7d-b107-4475-a578-de8860f34190 col areoi-element ps-xl-5 ms-xl-4 order-0 order-xl-1\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-left text-42-28 text-center text-xl-start mb-3 pb-xl-1\">Proven results across industries<\/h3>\n\n\n\n<p class=\"text-20-16 text-center text-xl-start mb-0\" style=\"font-style:normal;font-weight:500\">From small businesses to Fortune 500 companies, Syteca has transformed perimeter security for organizations worldwide. Read our Success Stories to see how businesses like yours achieved peace of mind with this one powerful platform.<\/p>\n\n\n\n\t\t<div  class=\"block-8e68c4c9-e15f-4e7e-9c0e-dbf4c54b2be2 areoi-element new-design mw-100 d-none d-xl-flex justify-content-center justify-content-xl-start button-block\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-23c4d488-8d5e-469a-aa94-be50189510e4 btn areoi-has-url position-relative mb-0 btn-primary\"\n\t href=\"\/en\/resources\/case-studies\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tMore Success Stories \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bf296784-8c69-4bf3-9374-34523105e9e9 col areoi-element col-12 order-2 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ad0b6a6e-c0b3-4d0a-88b7-e5938419a159 areoi-element new-design mw-100 d-flex justify-content-center justify-content-xl-start button-block\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-23c4d488-8d5e-469a-aa94-be50189510e4 btn areoi-has-url position-relative mb-0 btn-primary\"\n\t href=\"\/en\/resources\/case-studies\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tMore Success Stories \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b7f688aa-f2c0-4d71-9299-84a66f388fc2 areoi-element text-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center text-54-42-36 p-poppins mb-5 has-text-color has-link-color wp-elements-66824428a1ed7e8a60f0320df4b9c6ff\" style=\"color:#ffffff;font-style:normal;font-weight:500\">Let&#8217;s get the conversation started<\/p>\n\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-ab31a90b-193f-48a1-add0-005312c5d774 btn areoi-has-url position-relative btn btn-primary mx-auto mb-0 btn-primary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":16,"featured_media":48950,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-22415","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industry-Specific Cybersecurity Solutions to Safeguard Your Assets | Syteca<\/title>\n<meta name=\"description\" content=\"Discover how Syteca secures critical assets across Finance, Healthcare, Government, Energy, Manufacturing, Education, and Insurance industries with tailored cybersecurity solutions. Enhance access control and endpoint visibility to protect against internal threats.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industry-Specific Cybersecurity Solutions to Safeguard Your Assets | Syteca\" \/>\n<meta property=\"og:description\" content=\"Discover how Syteca secures critical assets across Finance, Healthcare, Government, Energy, Manufacturing, Education, and Insurance industries with tailored cybersecurity solutions. Enhance access control and endpoint visibility to protect against internal threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/industries\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T15:21:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/31060610\/OG-Industry-category.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/industries\",\"url\":\"https:\/\/www.syteca.com\/en\/industries\",\"name\":\"Industry-Specific Cybersecurity Solutions to Safeguard Your Assets | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/industries#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/industries#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/31060610\/OG-Industry-category.jpg\",\"datePublished\":\"2023-05-09T09:31:38+00:00\",\"dateModified\":\"2025-02-19T15:21:47+00:00\",\"description\":\"Discover how Syteca secures critical assets across Finance, Healthcare, Government, Energy, Manufacturing, Education, and Insurance industries with tailored cybersecurity solutions. Enhance access control and endpoint visibility to protect against internal threats.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/industries\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/industries#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/31060610\/OG-Industry-category.jpg\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/31060610\/OG-Industry-category.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industry-Specific Cybersecurity Solutions to Safeguard Your Assets | Syteca","description":"Discover how Syteca secures critical assets across Finance, Healthcare, Government, Energy, Manufacturing, Education, and Insurance industries with tailored cybersecurity solutions. Enhance access control and endpoint visibility to protect against internal threats.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Industry-Specific Cybersecurity Solutions to Safeguard Your Assets | Syteca","og_description":"Discover how Syteca secures critical assets across Finance, Healthcare, Government, Energy, Manufacturing, Education, and Insurance industries with tailored cybersecurity solutions. Enhance access control and endpoint visibility to protect against internal threats.","og_url":"https:\/\/www.syteca.com\/en\/industries","og_site_name":"Syteca","article_modified_time":"2025-02-19T15:21:47+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/31060610\/OG-Industry-category.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/industries","url":"https:\/\/www.syteca.com\/en\/industries","name":"Industry-Specific Cybersecurity Solutions to Safeguard Your Assets | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/industries#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/industries#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/31060610\/OG-Industry-category.jpg","datePublished":"2023-05-09T09:31:38+00:00","dateModified":"2025-02-19T15:21:47+00:00","description":"Discover how Syteca secures critical assets across Finance, Healthcare, Government, Energy, Manufacturing, Education, and Insurance industries with tailored cybersecurity solutions. Enhance access control and endpoint visibility to protect against internal threats.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/industries"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/industries#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/31060610\/OG-Industry-category.jpg","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/31060610\/OG-Industry-category.jpg","width":1200,"height":630},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/22415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=22415"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/22415\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/48950"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=22415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}