{"id":3835,"date":"2020-02-13T14:34:42","date_gmt":"2020-02-13T13:34:42","guid":{"rendered":"https:\/\/update.phoenixcontact.com\/news\/the-data-body-guards\/"},"modified":"2020-10-30T10:43:54","modified_gmt":"2020-10-30T09:43:54","slug":"the-data-body-guards","status":"publish","type":"post","link":"https:\/\/update.phoenixcontact.com\/en\/the-data-body-guards\/","title":{"rendered":"The data body guards"},"content":{"rendered":"\n<p>When it comes to data security, it\u2019s time to make  a move. Phoenix Contact Cyber Security in Berlin  goes into hand-to-hand combat with every hacker. A visit with the data controllers in the capital city.<\/p>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"664\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec08.jpg\" alt=\"\" class=\"wp-image-3828\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec08.jpg 1000w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec08-300x199.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec08-768x510.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption>Kilian Golm, developer Sergej Kowando and Martin Dickopp<\/figcaption><\/figure>\n<p>T  hey were a startup. Young, bold, successful. And somehow they\u2019re still a startup, albeit as part of the Phoenix\u00a0Contact Group. Cyber Security Berlin has retained its independence. You notice that immediately when you knock on their door in Berlin-Adlershof. Or better yet, ring the bell. Modern facade, cool reception. And then it\u2019s over for good. Anyone who wants to continue from this point will have an escort.<\/p>\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"172\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec03-300x172.jpg\" alt=\"\" class=\"wp-image-3818\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec03-300x172.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec03-768x440.jpg 768w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec03.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n<p>Because things are not so casual in Richard-Willst\u00e4tter- Stra\u00dfe. When it comes to data security and cybercrime, there  is no need for it. \u201cOf course we follow the latest cyber attacks  closely,\u201d Kilian Golm tells us in conversation. The latest victim  is a company that is itself active in the field of data security.  \u201cBut there\u2019s no gloating,\u201d emphasizes the General Manager of  the Berlin-based Phoenix Contact subsidiary. \u201cThis incident  clearly shows us how much the threat of cybercrime has increased in the meantime.\u201d<\/p>\n\n<h4 class=\"wp-block-heading\">With m to the breakthrough<\/h4>\n\n<p>The Berlin-based company started out in 2001 as a typical  startup with four employees, located at the innovation  location in Adlershof from the very beginning.  It all started  with the idea of making business travelers\u2019 data more secure. But soon the newcomers got their bearings and devoted their attention to communication in industrial networks. \u201cWe developed industrial security at a time when no one else had it on their radar,\u201d says General Manager Kilian Golm. \u201cThis has granted us customer relationships, some of which still last to this day. Trust is an existential factor in the security business.\u201d<\/p>\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"300\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec04-200x300.jpg\" alt=\"\" class=\"wp-image-3820\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec04-200x300.jpg 200w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec04.jpg 667w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure><\/div>\n\n<p>Martin Dickopp is one of the people who has been with the  company almost from the beginning: \u201cOne of the foundations  of our success was the development of the mGuard products  and solutions,\u201d the security expert explains. \u201cThese hardware  and software components are practically a mobile firewall.  Hence the m for mobile. However, these do not intervene in  systems and play an active role, but rather act as an invisible  device in the background to monitor security; in other words, we always act in stealth mode.\u201d<\/p>\n\n<p>The idea became a success story, the technology  was registered for patents, and their former customer,  Phoenix\u00a0Contact, took over the startup in 2008. In 2016, the Berlin-based company was then renamed Phoenix Contact Cyber Security. Today, the Phoenix Contact subsidiary  has a good 40 employees. The Berlin location develops and  improves security software, and customer support staff work  on integrated solutions including training, while the mGuard hardware is assembled in Bad Pyrmont.<\/p>\n\n<h4 class=\"wp-block-heading\">Everyone is vulnerable<\/h4>\n\n<p>The \u201cmGuard\u201d network security devices have functionalities  that support router, firewall, VPN (Virtual Private Network),  QoS (Quality of Service), and intrusion detection. The scope  of services is complemented by a highly scalable device  management software. \u201cmGuard has more than 1,000  configuration options, and is therefore one of the most  complex products in the entire Phoenix Contact portfolio,\u201d explains Martin Dickopp with confidence.<\/p>\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"212\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec06-300x212.jpg\" alt=\"\" class=\"wp-image-3824\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec06-300x212.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec06-768x543.jpg 768w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec06.jpg 996w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n<p>\u201cAn absolute protection,\u201d says Dickopp, \u201cdoesn\u2019t exist  anyway. Everyone is vulnerable. But we try to make the level of intrusion so high that the effort for an attacker becomes too much to bother with.\u201d <\/p>\n\n<p>\u201cCybersecurity shouldn\u2019t come at the end of a development cycle \u2014 it should come at the beginning.\u201d <br\/><em>Kilian Golm<\/em>&#13;\n<\/p>\n\n<p>In principle, the cyber bodyguards distinguish between  two types of attack. Some are random, spreading out in every  direction and attacking any network they encounter. The others  are targeted cyber attacks. These are either staged by private  hackers who, with sporting ambition, pounce on firewalls and  security concepts to demonstrate their own finesse. Or it may be  organized groups with criminal intentions or even state actors.  \u201cIn our threat analyses, which we prepare for our customers,  we look at attackers with different resources,\u201d says Kilian  Golm, describing the service concept of  Cyber Security, which is integrated into the comprehensive security service portfolio of the corporate Group. <\/p>\n\n<h4 class=\"wp-block-heading\">Research in twilight<\/h4>\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"199\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec05-300x199.jpg\" alt=\"\" class=\"wp-image-3822\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec05-300x199.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec05-768x510.jpg 768w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec05.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption>Martin Dickopp<\/figcaption><\/figure><\/div>\n\n<p>If you want to fight properly, you have to know who you\u2019re  up against. So do gangsters and slouch hats come and go on  Richard-Willst\u00e4tter-Stra\u00dfe? Martin Dickopp has to smile:  \u201cNo, it\u2019s nothing that dramatic. But it\u2019s true, we also attend  hacker conferences, do research in more difficult-to-access  parts of the Internet, and exchange information in forums  and communities.\u201d Anyone who wants to can have the Berlin  experts carry out a mock attack on their supposedly-secure company network. \u201cFind the gap\u201d is the motto around here.<\/p>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"581\" src=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec02.jpg\" alt=\"\" class=\"wp-image-3816\" srcset=\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec02.jpg 1000w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec02-300x174.jpg 300w, https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec02-768x446.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption>Martin Dickopp and Kilian Golm <\/figcaption><\/figure>\n<p>Who needs the protection of professional data bodyguards?  \u201cAs a matter of fact, every business does. Our customers range  from small, family-owned machine builders to large industrial  companies worldwide. And of course, our own company. Cyber- crime knows no boundaries,\u201d Golm stresses. \u201cCybersecurity is a  constant process, not a one-time procedure. You have to think  of security as a system \u2013 security by design. Today\u2019s companies  and technologies should consider security in their products, as  well as in their production facilities, from the very start \u2014 not see it as the last safety check at the end of its development and graft it onto the system.\u201d<\/p>\n\n<p><a href=\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/\" target=\"_blank\" aria-label=\"Industrial Security bei Phoenix Contact (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">Industrial Security bei Phoenix Contact<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to data security, it\u2019s time to make a move. Phoenix Contact Cyber Security in Berlin goes into hand-to-hand combat with every hacker. A visit with the data controllers in the capital city. Kilian Golm, developer Sergej Kowando and Martin Dickopp T hey were a startup. Young, bold, successful. And somehow they\u2019re still &hellip;<\/p>\n","protected":false},"author":2,"featured_media":3813,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":4,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":""},"categories":[398],"tags":[301,409,49],"class_list":["post-3835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-security","tag-cyber-security-berlin","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The data body guards - UPDATE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The data body guards - UPDATE\" \/>\n<meta property=\"og:description\" content=\"When it comes to data security, it\u2019s time to make a move. Phoenix Contact Cyber Security in Berlin goes into hand-to-hand combat with every hacker. A visit with the data controllers in the capital city. Kilian Golm, developer Sergej Kowando and Martin Dickopp T hey were a startup. Young, bold, successful. And somehow they\u2019re still &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/\" \/>\n<meta property=\"og:site_name\" content=\"UPDATE\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-13T13:34:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-30T09:43:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/media\/2020\/02\/CyberSec-Beitragsbild.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"705\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lutz Odewald\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lutz Odewald\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/\",\"url\":\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/\",\"name\":\"The data body guards - UPDATE\",\"isPartOf\":{\"@id\":\"http:\/\/34.246.9.24\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec-Beitragsbild.jpg\",\"datePublished\":\"2020-02-13T13:34:42+00:00\",\"dateModified\":\"2020-10-30T09:43:54+00:00\",\"author\":{\"@id\":\"http:\/\/34.246.9.24\/#\/schema\/person\/f2073010bf520f310478ffd9434d0c9e\"},\"breadcrumb\":{\"@id\":\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#primaryimage\",\"url\":\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec-Beitragsbild.jpg\",\"contentUrl\":\"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec-Beitragsbild.jpg\",\"width\":1000,\"height\":705},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/update.phoenixcontact.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The data body guards\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/34.246.9.24\/#website\",\"url\":\"http:\/\/34.246.9.24\/\",\"name\":\"UPDATE\",\"description\":\"Das Innovationsmagazin\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/34.246.9.24\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/34.246.9.24\/#\/schema\/person\/f2073010bf520f310478ffd9434d0c9e\",\"name\":\"Lutz Odewald\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.246.9.24\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8950d3f7c04db4c89dfa89689a8d6c7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8950d3f7c04db4c89dfa89689a8d6c7e?s=96&d=mm&r=g\",\"caption\":\"Lutz Odewald\"},\"description\":\"Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The data body guards - UPDATE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/","og_locale":"en_US","og_type":"article","og_title":"The data body guards - UPDATE","og_description":"When it comes to data security, it\u2019s time to make a move. Phoenix Contact Cyber Security in Berlin goes into hand-to-hand combat with every hacker. A visit with the data controllers in the capital city. Kilian Golm, developer Sergej Kowando and Martin Dickopp T hey were a startup. Young, bold, successful. And somehow they\u2019re still &hellip;","og_url":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/","og_site_name":"UPDATE","article_published_time":"2020-02-13T13:34:42+00:00","article_modified_time":"2020-10-30T09:43:54+00:00","og_image":[{"width":1000,"height":705,"url":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/media\/2020\/02\/CyberSec-Beitragsbild.jpg","type":"image\/jpeg"}],"author":"Lutz Odewald","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lutz Odewald","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/","url":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/","name":"The data body guards - UPDATE","isPartOf":{"@id":"http:\/\/34.246.9.24\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#primaryimage"},"image":{"@id":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#primaryimage"},"thumbnailUrl":"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec-Beitragsbild.jpg","datePublished":"2020-02-13T13:34:42+00:00","dateModified":"2020-10-30T09:43:54+00:00","author":{"@id":"http:\/\/34.246.9.24\/#\/schema\/person\/f2073010bf520f310478ffd9434d0c9e"},"breadcrumb":{"@id":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#primaryimage","url":"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec-Beitragsbild.jpg","contentUrl":"https:\/\/update.phoenixcontact.com\/media\/2020\/02\/CyberSec-Beitragsbild.jpg","width":1000,"height":705},{"@type":"BreadcrumbList","@id":"https:\/\/ec2-34-255-34-35.eu-west-1.compute.amazonaws.com\/en\/the-data-body-guards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/update.phoenixcontact.com\/en\/"},{"@type":"ListItem","position":2,"name":"The data body guards"}]},{"@type":"WebSite","@id":"http:\/\/34.246.9.24\/#website","url":"http:\/\/34.246.9.24\/","name":"UPDATE","description":"Das Innovationsmagazin","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/34.246.9.24\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/34.246.9.24\/#\/schema\/person\/f2073010bf520f310478ffd9434d0c9e","name":"Lutz Odewald","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.246.9.24\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8950d3f7c04db4c89dfa89689a8d6c7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8950d3f7c04db4c89dfa89689a8d6c7e?s=96&d=mm&r=g","caption":"Lutz Odewald"},"description":"Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim."}]}},"_links":{"self":[{"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/posts\/3835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/comments?post=3835"}],"version-history":[{"count":4,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/posts\/3835\/revisions"}],"predecessor-version":[{"id":5530,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/posts\/3835\/revisions\/5530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/media\/3813"}],"wp:attachment":[{"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/media?parent=3835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/categories?post=3835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/update.phoenixcontact.com\/en\/wp-json\/wp\/v2\/tags?post=3835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}