{"id":4184,"date":"2018-05-21T14:43:35","date_gmt":"2018-05-21T14:43:35","guid":{"rendered":"http:\/\/testweb.v2s.us\/transform-your-security\/"},"modified":"2018-10-18T23:11:43","modified_gmt":"2018-10-18T23:11:43","slug":"transform-your-security","status":"publish","type":"page","link":"https:\/\/www.v2s.us\/en\/transform-your-security\/","title":{"rendered":"Transform your Security"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;container&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner 0=&#8221;&#8221; css=&#8221;.vc_custom_1497864291233{margin-top: 50px !important;margin-bottom: 50px !important;}&#8221;][vc_column_inner][vc_custom_heading text=&#8221;Deal with constantly changing and increasingly complex environments&#8221; font_container=&#8221;tag:h2|text_align:justify&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; el_width=&#8221;10&#8243;][vc_custom_heading text=&#8221;With the impetus of new forms of work, business mobility, regulatory compliance and the proliferation of applications, IT organizations face complex challenges to protect data and interactions among users. All this is surrounded by a constantly changing environment, so that the ability to adapt quickly is a key factor in the cybersecurity strategy. The virtualization of software defined networks (SDN) allows to create complete networks abstracted from the underlying physical hardware. All the network components can be provisioned in minutes, without the need to modify the applications, which allows us to adapt easily to the needs of each moment.&#8221; font_container=&#8221;tag:p|font_size:18|text_align:justify|line_height:1.4&#8243; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;3091&#8243; img_size=&#8221;200&#215;130&#8243; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInRightBig&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;50px&#8221;][vc_custom_heading text=&#8221;Key Benefits:&#8221; font_container=&#8221;tag:h2|font_size:24|text_align:center|line_height:1.4&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row gap=&#8221;35&#8243; equal_height=&#8221;yes&#8221; el_class=&#8221;container&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"key-icon-box icon-default icon-top  kd-animated zoomIn \" style=\"background-color: none;\" data-animation-delay=400><div class=\"tt-iconbox-customimg img_small_size\"><img width=\"150\" height=\"98\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/Seguridad.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"Seguridad\" \/><\/div><h4 class=\"service-heading\" > Flexibility and Agility<\/h4><p >Displacement of virtual machines and security policies between data centers<\/p><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"key-icon-box icon-default icon-top  kd-animated zoomIn \" style=\"background-color: none;\" data-animation-delay=400><div class=\"tt-iconbox-customimg img_small_size\"><img width=\"150\" height=\"98\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/Seguridad_2.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"Seguridad_2\" \/><\/div><h4 class=\"service-heading\" >Fast provisioning of networks.<\/h4><p >Centralized management reducing the implementation time from days to seconds.<\/p><\/div>[\/vc_column][\/vc_row][vc_row gap=&#8221;35&#8243; equal_height=&#8221;yes&#8221; el_class=&#8221;container&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"key-icon-box icon-default icon-top  kd-animated zoomIn \" style=\"background-color: none;\" data-animation-delay=400><div class=\"tt-iconbox-customimg img_small_size\"><img width=\"150\" height=\"98\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/Seguridad_3.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"Seguridad_3\" \/><\/div><h4 class=\"service-heading\" >Network Microsegmentation<\/h4><p >Granular security in the data center<\/p><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"key-icon-box icon-default icon-top  kd-animated zoomIn \" style=\"background-color: none;\" data-animation-delay=400><div class=\"tt-iconbox-customimg img_small_size\"><img width=\"150\" height=\"98\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/Seguridad_4.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"Seguridad_4\" \/><\/div><h4 class=\"service-heading\" >Automation of on-demand network operations<\/h4><p >Agility and simplification to recover activity times.<\/p><\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1499815633361{background-color: #ffffff !important;}&#8221;][vc_column css=&#8221;.vc_custom_1501668666792{padding-top: 0px !important;}&#8221;]<div class=\"kd-calltoaction no_icon \" style=\"background-color: #26a9e0;\">\n                <div class=\"container\"><div class=\"cta-text\">\n                        <h3 >Our experts are advising many clients on the best security practices according to current needs.<\/h3>\n                        <p ><\/p>\n                    <\/div>\n                    <div class=\"cta-btncontainer\">\n                        <a href=\"https:\/\/v2s.us\/en\/home\/contact-us\/\"  title=\"\" class=\"tt_button tt_secondary_button kd-animated zoomIn\" data-animation-delay=\"200\">Contact us<\/a>\n                    <\/div>\n                <\/div>\n            <\/div>[\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1499813980973{margin-top: 80px !important;}&#8221;][vc_custom_heading text=&#8221;Main technologies&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1496184006290{margin-top: 50px !important;}&#8221;][vc_column]<div class=\"slider clients zoomin-effect kd-client-69e88814d8642 \"><h6 class=\"clients-content\"><a href=\"https:\/\/www.alfresco.com\" target=\"_blank\" title=\"Alfresco\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/alfresco-1.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"alfresco\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.centrify.com\" target=\"_blank\" title=\"Centrify\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/centrify-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"centrify-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.cisco.com\" target=\"_blank\" title=\"Cisco\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/cisco-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"cisco-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.citrix.com\/\" target=\"_blank\" title=\"Citrix\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/citrix.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"citrix\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.datacore.com\" target=\"_blank\" title=\"Datacore Software\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/datacore_site.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"datacore_site\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www1.euro.dell.com\" target=\"_blank\" title=\"Dell EMC\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/DELL-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"DELL-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.efficientip.com\/\" target=\"_blank\" title=\"EfficientIP\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/efficientip.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"efficientip\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.fujitsu.com\/\" target=\"_blank\" title=\"Fujitsu\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/fujitsu.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"fujitsu\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.hp.com\/\" target=\"_blank\" title=\"HP\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/hp-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"hp-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.ibm.com\" target=\"_blank\" title=\"IBM\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/IBM-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"IBM-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.kaspersky.com\" target=\"_blank\" title=\"Kaspersky\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/kaspersky-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"kaspersky-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www3.lenovo.com\/\" target=\"_blank\" title=\"Lenovo\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/lenovo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"lenovo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.leostream.com\/\" target=\"_blank\" title=\"Leostream\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/leostream.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"leostream\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.linux.org\" target=\"_blank\" title=\"Linux\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/linux.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"linux\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.microsoft.com\" target=\"_blank\" title=\"Microsoft\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/microsoft-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"microsoft-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"http:\/\/www.nexsan.com\" target=\"_blank\" title=\"Nexsan\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/nexsan-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"nexsan-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.oracle.com\/\" target=\"_blank\" title=\"Oracle\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/oracle-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"oracle-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.supermicro.com\/\" target=\"_blank\" title=\"Supermicro\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/supermicro-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"supermicro-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.swhosting.com\/\" target=\"_blank\" title=\"SWhosting\"><img width=\"123\" height=\"28\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/Logo-SWhosting-OK-1900x414-Color-Corporatiu.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"Logo-SWhosting-OK-1900x414-Color-Corporatiu\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.veeam.com\" target=\"_blank\" title=\"Veeam\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/05\/veeam-logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"veeam-logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.vmware.com\" target=\"_blank\" title=\"VMware\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/vmware_logo.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"vmware_logo\" \/><\/a><\/h6><h6 class=\"clients-content\"><a href=\"https:\/\/www.zimbra.com\" target=\"_blank\" title=\"Veeam\"><img width=\"123\" height=\"29\" src=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/zimbra-1.png\" class=\"attachment-full\" alt=\"\" loading=\"lazy\" title=\"zimbra\" \/><\/a><\/h6><\/div><script type=\"text\/javascript\">\r\n              jQuery(document).ready(function($){\r\n                if ($(\".slider.clients.kd-client-69e88814d8642\").length) {\r\n                  $(\".slider.clients.kd-client-69e88814d8642\").owlCarousel({\r\n                    navigation: false,\r\n                    pagination: false,autoPlay: 3000,stopOnHover: false,\r\n                    items: 6,\r\n                    addClassActive: true,\r\n                  });\r\n                }\r\n              });\r\n            <\/script>[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;container&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner 0=&#8221;&#8221; css=&#8221;.vc_custom_1497864291233{margin-top: 50px !important;margin-bottom: 50px !important;}&#8221;][vc_column_inner][vc_custom_heading text=&#8221;Deal with constantly changing and increasingly complex environments&#8221; font_container=&#8221;tag:h2|text_align:justify&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4579,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mi_skip_tracking":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Transform your Security - V2S Corporation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.v2s.us\/en\/transform-your-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Transform your Security - V2S Corporation\" \/>\n<meta property=\"og:description\" content=\"[vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;container&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner 0=&#8221;&#8221; css=&#8221;.vc_custom_1497864291233{margin-top: 50px !important;margin-bottom: 50px !important;}&#8221;][vc_column_inner][vc_custom_heading text=&#8221;Deal with constantly changing and increasingly complex environments&#8221; font_container=&#8221;tag:h2|text_align:justify&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.v2s.us\/en\/transform-your-security\/\" \/>\n<meta property=\"og:site_name\" content=\"V2S Corporation\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-18T23:11:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/Transforma-SEGURIDADmarkus-spiske-152538.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.v2s.us\/en\/transform-your-security\/\",\"url\":\"https:\/\/www.v2s.us\/en\/transform-your-security\/\",\"name\":\"Transform your Security - V2S Corporation\",\"isPartOf\":{\"@id\":\"https:\/\/www.v2s.us\/#website\"},\"datePublished\":\"2018-05-21T14:43:35+00:00\",\"dateModified\":\"2018-10-18T23:11:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.v2s.us\/en\/transform-your-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.v2s.us\/en\/transform-your-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.v2s.us\/en\/transform-your-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.v2s.us\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Transform your Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.v2s.us\/#website\",\"url\":\"https:\/\/www.v2s.us\/\",\"name\":\"V2S Corporation\",\"description\":\"Add value to Digital Transformation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.v2s.us\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Transform your Security - V2S Corporation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.v2s.us\/en\/transform-your-security\/","og_locale":"en_US","og_type":"article","og_title":"Transform your Security - V2S Corporation","og_description":"[vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;container&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner 0=&#8221;&#8221; css=&#8221;.vc_custom_1497864291233{margin-top: 50px !important;margin-bottom: 50px !important;}&#8221;][vc_column_inner][vc_custom_heading text=&#8221;Deal with constantly changing and increasingly complex environments&#8221; font_container=&#8221;tag:h2|text_align:justify&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; [&hellip;]","og_url":"https:\/\/www.v2s.us\/en\/transform-your-security\/","og_site_name":"V2S Corporation","article_modified_time":"2018-10-18T23:11:43+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.v2s.us\/wp-content\/uploads\/2017\/06\/Transforma-SEGURIDADmarkus-spiske-152538.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.v2s.us\/en\/transform-your-security\/","url":"https:\/\/www.v2s.us\/en\/transform-your-security\/","name":"Transform your Security - V2S Corporation","isPartOf":{"@id":"https:\/\/www.v2s.us\/#website"},"datePublished":"2018-05-21T14:43:35+00:00","dateModified":"2018-10-18T23:11:43+00:00","breadcrumb":{"@id":"https:\/\/www.v2s.us\/en\/transform-your-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.v2s.us\/en\/transform-your-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.v2s.us\/en\/transform-your-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.v2s.us\/en\/"},{"@type":"ListItem","position":2,"name":"Transform your Security"}]},{"@type":"WebSite","@id":"https:\/\/www.v2s.us\/#website","url":"https:\/\/www.v2s.us\/","name":"V2S Corporation","description":"Add value to Digital Transformation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.v2s.us\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/pages\/4184\/"}],"collection":[{"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/pages\/"}],"about":[{"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/types\/page\/"}],"author":[{"embeddable":true,"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/users\/1\/"}],"replies":[{"embeddable":true,"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/comments\/?post=4184"}],"version-history":[{"count":9,"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/pages\/4184\/revisions\/"}],"predecessor-version":[{"id":4367,"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/pages\/4184\/revisions\/4367\/"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/media\/4579\/"}],"wp:attachment":[{"href":"https:\/\/www.v2s.us\/en\/wp-json\/wp\/v2\/media\/?parent=4184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}