{"id":252,"date":"2024-07-10T09:17:04","date_gmt":"2024-07-10T09:17:04","guid":{"rendered":"https:\/\/manufacturingitsummit.com\/blogs\/?p=252"},"modified":"2024-08-29T09:17:25","modified_gmt":"2024-08-29T09:17:25","slug":"simplifying-cybersecurity-with-sequreteks-pctem-platform","status":"publish","type":"post","link":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/","title":{"rendered":"Simplifying Cybersecurity with Sequretek&#8217;s PCTEM Platform."},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>Introduction<\/strong><\/p>\n\n\n\n<p>In today\u2019s hyper-connected digital world, cyberattacks pose a massive threat to businesses and consumers. User Identities, their devices and the cloud networks that they access are the new digital perimeters exploited by attackers to compromise business assets. Manufacturing and IT businesses have become increasingly more susceptible to cyberattacks in the post-pandemic world. While more businesses have realized the need for efficient cybersecurity management, the lack of easy-to-use, budget-friendly consolidated solutions and inadequate in-house resources have created a large security gap in this sector.<\/p>\n\n\n\n<p>Sequretek empowers businesses to grow without fear by being their trusted cybersecurity partner,<br>simplifying security, and consolidating their technology landscape.<\/p>\n\n\n\n<p>Sequretek\u2019s Percept Continuous Threat Exposure Management (PCTEM) platform provides a<br>comprehensive security solution for businesses. By providing end-to-end security visibility, and unified threat prevention, detection, and response capabilities within a single console, the platform helps businesses stay ahead of potential threats.<\/p>\n\n\n\n<p>The PCTEM platform is AI-powered to enhance detection &amp; response, covering critical security areas of<br>threat detection &amp; response (Percept XDR &amp; NG SIEM), identity security and governance (Percept<br>Identity), endpoint detection &amp; response (Percept EDR), and continuous compliance &amp; governance (Percept Compliance Manager).<\/p>\n\n\n\n<p>The platform addresses key aspects of modern cyber risk management. Moreover, the platform\u2019s open and modular architecture enables seamless integration across Sequretek and third-party products and solutions.<br>Sequretek\u2019s PCTEM-based security products can coexist with existing technology infrastructure,<br>allowing customers and partners to consolidate at their pace. This flexibility also allows customers to protect their investments, mitigate migration risks, and facilitate a smoother transition.<\/p>\n\n\n\n<p>Overall, the PCTEM platform offers a robust, adaptable, and comprehensive solution for businesses seeking to enhance their cybersecurity posture to combat the ever-evolving threat landscape.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Sequretek is founded by domain experts with a team of 400+ security professionals serving more than 200 customers across industries worldwide. Over the past decade, Sequretek has successfully implemented its vision of simplifying security by developing cutting-edge AI-powered cybersecurity products and solutions at affordable price points. These offerings are designed for large enterprises and small &amp; medium businesses across the world.<\/p>\n\n\n\n<p>Author : <a href=\"https:\/\/www.linkedin.com\/in\/pankit\/\">Pankit Desai<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In today\u2019s hyper-connected digital world, cyberattacks pose a massive threat to businesses and consumers. User Identities, their devices and the cloud networks that they<\/p>\n","protected":false},"author":1,"featured_media":253,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-manufacturing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Simplifying Cybersecurity with Sequretek&#039;s PCTEM Platform.<\/title>\n<meta name=\"description\" content=\"Sequretek Empowers Businesses to grow without fear by being their Trusted Cybersecurity Partner, Simplifying Security, and Consolidating their Technology Landscape.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Simplifying Cybersecurity with Sequretek&#039;s PCTEM Platform.\" \/>\n<meta property=\"og:description\" content=\"Sequretek Empowers Businesses to grow without fear by being their Trusted Cybersecurity Partner, Simplifying Security, and Consolidating their Technology Landscape.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"Manufacturing IT Summit | Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-10T09:17:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-29T09:17:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/manufacturingitsummit.com\/blogs\/wp-content\/uploads\/2024\/07\/3824033_Mesa-de-trabajo-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1458\" \/>\n\t<meta property=\"og:image:height\" content=\"833\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Exito\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Exito\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/\"},\"author\":{\"name\":\"Exito\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"headline\":\"Simplifying Cybersecurity with Sequretek&#8217;s PCTEM Platform.\",\"datePublished\":\"2024-07-10T09:17:04+00:00\",\"dateModified\":\"2024-08-29T09:17:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/\"},\"wordCount\":348,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/3824033_Mesa-de-trabajo-1.webp\",\"articleSection\":[\"Manufacturing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/\",\"url\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/\",\"name\":\"Simplifying Cybersecurity with Sequretek's PCTEM Platform.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/3824033_Mesa-de-trabajo-1.webp\",\"datePublished\":\"2024-07-10T09:17:04+00:00\",\"dateModified\":\"2024-08-29T09:17:25+00:00\",\"description\":\"Sequretek Empowers Businesses to grow without fear by being their Trusted Cybersecurity Partner, Simplifying Security, and Consolidating their Technology Landscape.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/#primaryimage\",\"url\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/3824033_Mesa-de-trabajo-1.webp\",\"contentUrl\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/3824033_Mesa-de-trabajo-1.webp\",\"width\":1458,\"height\":833,\"caption\":\"Sequretek\u2019s PCTEM Platform.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/simplifying-cybersecurity-with-sequreteks-pctem-platform\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Simplifying Cybersecurity with Sequretek&#8217;s PCTEM Platform.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#website\",\"url\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/\",\"name\":\"Manufacturing IT Summit blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#organization\",\"name\":\"Manufacturing IT Summit blog\",\"url\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/favicon-8.png\",\"contentUrl\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/favicon-8.png\",\"width\":32,\"height\":32,\"caption\":\"Manufacturing IT Summit blog\"},\"image\":{\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\",\"name\":\"Exito\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"caption\":\"Exito\"},\"sameAs\":[\"https:\\\/\\\/www.cybersecuritysummitindia.com\\\/blogs\"],\"url\":\"https:\\\/\\\/manufacturingitsummit.com\\\/blogs\\\/author\\\/cyber-security-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Simplifying Cybersecurity with Sequretek's PCTEM Platform.","description":"Sequretek Empowers Businesses to grow without fear by being their Trusted Cybersecurity Partner, Simplifying Security, and Consolidating their Technology Landscape.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/","og_locale":"en_US","og_type":"article","og_title":"Simplifying Cybersecurity with Sequretek's PCTEM Platform.","og_description":"Sequretek Empowers Businesses to grow without fear by being their Trusted Cybersecurity Partner, Simplifying Security, and Consolidating their Technology Landscape.","og_url":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/","og_site_name":"Manufacturing IT Summit | Blogs","article_published_time":"2024-07-10T09:17:04+00:00","article_modified_time":"2024-08-29T09:17:25+00:00","og_image":[{"width":1458,"height":833,"url":"https:\/\/manufacturingitsummit.com\/blogs\/wp-content\/uploads\/2024\/07\/3824033_Mesa-de-trabajo-1.webp","type":"image\/webp"}],"author":"Exito","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Exito","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/#article","isPartOf":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/"},"author":{"name":"Exito","@id":"https:\/\/manufacturingitsummit.com\/blogs\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"headline":"Simplifying Cybersecurity with Sequretek&#8217;s PCTEM Platform.","datePublished":"2024-07-10T09:17:04+00:00","dateModified":"2024-08-29T09:17:25+00:00","mainEntityOfPage":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/"},"wordCount":348,"commentCount":0,"publisher":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/#organization"},"image":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/manufacturingitsummit.com\/blogs\/wp-content\/uploads\/2024\/07\/3824033_Mesa-de-trabajo-1.webp","articleSection":["Manufacturing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/","url":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/","name":"Simplifying Cybersecurity with Sequretek's PCTEM Platform.","isPartOf":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/#primaryimage"},"image":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/manufacturingitsummit.com\/blogs\/wp-content\/uploads\/2024\/07\/3824033_Mesa-de-trabajo-1.webp","datePublished":"2024-07-10T09:17:04+00:00","dateModified":"2024-08-29T09:17:25+00:00","description":"Sequretek Empowers Businesses to grow without fear by being their Trusted Cybersecurity Partner, Simplifying Security, and Consolidating their Technology Landscape.","breadcrumb":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/#primaryimage","url":"https:\/\/manufacturingitsummit.com\/blogs\/wp-content\/uploads\/2024\/07\/3824033_Mesa-de-trabajo-1.webp","contentUrl":"https:\/\/manufacturingitsummit.com\/blogs\/wp-content\/uploads\/2024\/07\/3824033_Mesa-de-trabajo-1.webp","width":1458,"height":833,"caption":"Sequretek\u2019s PCTEM Platform."},{"@type":"BreadcrumbList","@id":"https:\/\/manufacturingitsummit.com\/blogs\/simplifying-cybersecurity-with-sequreteks-pctem-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/manufacturingitsummit.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Simplifying Cybersecurity with Sequretek&#8217;s PCTEM Platform."}]},{"@type":"WebSite","@id":"https:\/\/manufacturingitsummit.com\/blogs\/#website","url":"https:\/\/manufacturingitsummit.com\/blogs\/","name":"Manufacturing IT Summit blog","description":"","publisher":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/manufacturingitsummit.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/manufacturingitsummit.com\/blogs\/#organization","name":"Manufacturing IT Summit blog","url":"https:\/\/manufacturingitsummit.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/manufacturingitsummit.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/manufacturingitsummit.com\/blogs\/wp-content\/uploads\/2024\/01\/favicon-8.png","contentUrl":"https:\/\/manufacturingitsummit.com\/blogs\/wp-content\/uploads\/2024\/01\/favicon-8.png","width":32,"height":32,"caption":"Manufacturing IT Summit blog"},"image":{"@id":"https:\/\/manufacturingitsummit.com\/blogs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/manufacturingitsummit.com\/blogs\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015","name":"Exito","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","caption":"Exito"},"sameAs":["https:\/\/www.cybersecuritysummitindia.com\/blogs"],"url":"https:\/\/manufacturingitsummit.com\/blogs\/author\/cyber-security-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/posts\/252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/comments?post=252"}],"version-history":[{"count":0,"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/posts\/252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/media\/253"}],"wp:attachment":[{"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/media?parent=252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/categories?post=252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/manufacturingitsummit.com\/blogs\/wp-json\/wp\/v2\/tags?post=252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}