{"id":3491,"date":"2023-08-29T12:43:53","date_gmt":"2023-08-29T12:43:53","guid":{"rendered":"https:\/\/cybercompare.com\/providers\/auxilium-cyber-security\/"},"modified":"2024-08-29T13:42:41","modified_gmt":"2024-08-29T13:42:41","slug":"auxilium-cyber-security","status":"publish","type":"providers","link":"https:\/\/cybercompare.com\/de\/providers\/auxilium-cyber-security\/","title":{"rendered":"Auxilium Cyber Security"},"content":{"rendered":"","protected":false},"featured_media":3129,"parent":0,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"provider_linkedin_href":"","provider_youtube_href":"","provider_x_href":"","footnotes":""},"provider-top-industries":[103,110,115,108,120],"provider-top-capabilities":[118,73,126,129,147],"provider-supported-scopes":[58,60],"provider-supported-countries":[52,50,51,53,54],"provider-capabilities":[258,233,189,251,260,208,256,250,231,257,232,243,228,237,259,230,211],"provider-types":[268],"class_list":["post-3491","providers","type-providers","status-publish","has-post-thumbnail","hentry","provider-top-industries-automobil-zuliefererbranche","provider-top-industries-elektrische-komponenten-geraete","provider-top-industries-maschinenbau","provider-top-industries-ruestung-raumfahrt","provider-top-industries-telekommunikation-informationstechnologie","provider-top-capabilities-audits-zertifizierungsservices","provider-top-capabilities-awareness-training-phishing-tests-de","provider-top-capabilities-endgeratesicherheit","provider-top-capabilities-isms-grc-systeme-losungen","provider-top-capabilities-offensive-security-z-b-penetration-tests","provider-supported-scopes-it-de","provider-supported-scopes-ot-de","provider-supported-countries-deutschland","provider-supported-countries-eu-de","provider-supported-countries-oesterreich","provider-supported-countries-schweiz","provider-supported-countries-vereinigtes-koenigreich","provider-capabilities-andere","provider-capabilities-application-security-de","provider-capabilities-detect-de","provider-capabilities-endgeratesicherheit","provider-capabilities-haertung","provider-capabilities-identify-de","provider-capabilities-penetration-testing-de","provider-capabilities-phishing-tests-de","provider-capabilities-protect-de","provider-capabilities-schwachstellen-management","provider-capabilities-schwachstellen-scanner","provider-capabilities-secure-code-de","provider-capabilities-security-consulting-de","provider-capabilities-security-testing-de","provider-capabilities-software-implementierung","provider-capabilities-strategy-advisory-de","provider-capabilities-zertifizierung-iso-27001-iec-62443","provider-types-service-anbieter"],"_links":{"self":[{"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/providers\/3491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/providers"}],"about":[{"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/types\/providers"}],"version-history":[{"count":1,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/providers\/3491\/revisions"}],"predecessor-version":[{"id":18147,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/providers\/3491\/revisions\/18147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/media\/3129"}],"wp:attachment":[{"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/media?parent=3491"}],"wp:term":[{"taxonomy":"provider-top-industries","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-top-industries?post=3491"},{"taxonomy":"provider-top-capabilities","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-top-capabilities?post=3491"},{"taxonomy":"provider-supported-scopes","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-supported-scopes?post=3491"},{"taxonomy":"provider-supported-countries","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-supported-countries?post=3491"},{"taxonomy":"provider-capabilities","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-capabilities?post=3491"},{"taxonomy":"provider-types","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-types?post=3491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}