{"id":3567,"date":"2023-08-31T10:25:31","date_gmt":"2023-08-31T10:25:31","guid":{"rendered":"https:\/\/cybercompare.com\/providers\/trovent-security-gmbh\/"},"modified":"2025-01-29T09:55:53","modified_gmt":"2025-01-29T09:55:53","slug":"trovent-security-gmbh","status":"publish","type":"providers","link":"https:\/\/cybercompare.com\/de\/providers\/trovent-security-gmbh\/","title":{"rendered":"Trovent Security GmbH"},"content":{"rendered":"","protected":false},"featured_media":3388,"parent":0,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"provider_linkedin_href":"","provider_youtube_href":"","provider_x_href":"","footnotes":""},"provider-top-industries":[103,111,115,120,125],"provider-top-capabilities":[130,131,147,127],"provider-supported-scopes":[58,60],"provider-supported-countries":[52,50,51,53],"provider-capabilities":[252,209,189,253,260,208,213,191,198,200,256,231,210,226,257,232,237,202,214,204],"provider-types":[268],"class_list":["post-3567","providers","type-providers","status-publish","has-post-thumbnail","hentry","provider-top-industries-automobil-zuliefererbranche","provider-top-industries-finanzen-bankenbranche","provider-top-industries-maschinenbau","provider-top-industries-telekommunikation-informationstechnologie","provider-top-industries-versorgungswerke-energie","provider-top-capabilities-incident-response-services-de","provider-top-capabilities-logging-und-monitoring","provider-top-capabilities-offensive-security-z-b-penetration-tests","provider-top-capabilities-security-operations-center-de","provider-supported-scopes-it-de","provider-supported-scopes-ot-de","provider-supported-countries-deutschland","provider-supported-countries-eu-de","provider-supported-countries-oesterreich","provider-supported-countries-schweiz","provider-capabilities-anomalie-erkennung","provider-capabilities-asset-management-de","provider-capabilities-detect-de","provider-capabilities-detect-respond-de","provider-capabilities-haertung","provider-capabilities-identify-de","provider-capabilities-incident-response-de","provider-capabilities-logging-de","provider-capabilities-mdr-de","provider-capabilities-ot-monitoring-de","provider-capabilities-penetration-testing-de","provider-capabilities-protect-de","provider-capabilities-respond-de","provider-capabilities-risk-scoring-de","provider-capabilities-schwachstellen-management","provider-capabilities-schwachstellen-scanner","provider-capabilities-security-testing-de","provider-capabilities-siem-de","provider-capabilities-soc-de","provider-capabilities-mdr-managed-detection-and-response-de","provider-types-service-anbieter"],"_links":{"self":[{"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/providers\/3567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/providers"}],"about":[{"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/types\/providers"}],"version-history":[{"count":1,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/providers\/3567\/revisions"}],"predecessor-version":[{"id":23033,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/providers\/3567\/revisions\/23033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/media\/3388"}],"wp:attachment":[{"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/media?parent=3567"}],"wp:term":[{"taxonomy":"provider-top-industries","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-top-industries?post=3567"},{"taxonomy":"provider-top-capabilities","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-top-capabilities?post=3567"},{"taxonomy":"provider-supported-scopes","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-supported-scopes?post=3567"},{"taxonomy":"provider-supported-countries","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-supported-countries?post=3567"},{"taxonomy":"provider-capabilities","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-capabilities?post=3567"},{"taxonomy":"provider-types","embeddable":true,"href":"https:\/\/cybercompare.com\/de\/wp-json\/wp\/v2\/provider-types?post=3567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}