{"id":8484,"date":"2024-08-13T09:34:02","date_gmt":"2024-08-13T09:34:02","guid":{"rendered":"https:\/\/sanvima.in\/projects\/copenblue\/?page_id=8484"},"modified":"2025-01-10T04:34:56","modified_gmt":"2025-01-10T04:34:56","slug":"blog-2","status":"publish","type":"page","link":"https:\/\/sanvima.in\/projects\/copenblue\/blog-2\/","title":{"rendered":"identity and access management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8484\" class=\"elementor elementor-8484\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2c17c3 e-flex e-con-boxed e-con e-parent\" data-id=\"d2c17c3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ede1a9 elementor-widget elementor-widget-heading\" data-id=\"7ede1a9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h5 class=\"elementor-heading-title elementor-size-default\">OUR SERVICES\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ce5b9e elementor-widget elementor-widget-heading\" data-id=\"5ce5b9e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identity and Access Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2f45fa elementor-widget elementor-widget-text-editor\" data-id=\"f2f45fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>In an era where digital identities are central to accessing systems, data, and applications, securing these identities is critical for any organization\u2019s security posture. We specialize in providing advanced Identity Access Management (IAM) solutions that are designed to protect your digital identities, streamline your operations, and ensure seamless access control across diverse organizational environments.<\/p><p>Our approach to IAM is holistic, addressing both the security needs and operational demands of modern enterprises. We understand that managing digital identities effectively is not just about preventing unauthorized access but also about enabling authorized users to access the right resources efficiently, without compromising on security.<\/p><ul><li><p><strong>Comprehensive Identity Protection:<\/strong> Our IAM solutions provide robust protection for digital identities across your organization, safeguarding them from unauthorized access, identity theft, and other cyber threats. We implement multi-factor authentication (MFA), biometrics, and other advanced verification methods to ensure that only authorized individuals can access your critical systems and data. By securing digital identities at every level, we help you prevent breaches and maintain the integrity of your operations.<\/p><\/li><li><p><strong>Seamless Access Control:<\/strong> Managing who has access to what resources is a complex challenge, especially in large or rapidly changing organizations. Our IAM solutions offer seamless access control mechanisms that allow you to define, enforce, and monitor access policies with precision. Whether you\u2019re dealing with employees, contractors, partners, or customers, we ensure that access is granted based on roles, responsibilities, and the principle of least privilege. This minimizes the risk of unauthorized access while making it easier for legitimate users to perform their tasks.<\/p><\/li><li><p><strong>Streamlined User Lifecycle Management:<\/strong> From onboarding to offboarding, our IAM solutions streamline the entire user lifecycle management process. We automate user provisioning and de-provisioning, ensuring that users gain access to the resources they need from day one and that access is promptly revoked when no longer required. This reduces administrative overhead, prevents access creep, and ensures compliance with organizational policies and regulatory requirements.<\/p><\/li><li><p><strong>Unified Identity Governance:<\/strong> As organizations grow, managing identities and access rights across multiple systems and platforms can become increasingly complex. We offer unified identity governance solutions that provide centralized visibility and control over all digital identities within your organization. This includes automated identity audits, access certification, and policy enforcement, helping you maintain compliance and reduce the risk of insider threats.<\/p><\/li><li><p><strong>Scalable IAM Solutions for Diverse Environments:<\/strong> Whether your organization operates on-premises, in the cloud, or in a hybrid environment, our IAM solutions are designed to scale with your needs. We provide flexible, scalable solutions that can be tailored to meet the specific requirements of different departments, regions, or business units. This ensures that your IAM framework remains effective and efficient, no matter how complex or distributed your organizational landscape becomes.<\/p><\/li><li><p><strong>Enhanced User Experience:<\/strong> While security is paramount, user experience is also a key consideration in IAM. Our solutions are designed to provide a frictionless experience for users, balancing security with ease of access. Features such as single sign-on (SSO) and adaptive authentication not only enhance security but also improve user satisfaction by simplifying the login process and reducing the need for multiple passwords.<\/p><\/li><li><p><strong>Regulatory Compliance and Risk Management:<\/strong> Compliance with regulations such as GDPR, HIPAA, and others is a critical concern for many organizations. Our IAM solutions are built with compliance in mind, offering the tools and features needed to meet regulatory requirements and reduce the risk of non-compliance. We provide detailed audit trails, reporting capabilities, and policy enforcement mechanisms that ensure your IAM practices align with industry standards and best practices.<\/p><\/li><li><p><strong>Continuous Monitoring and Improvement:<\/strong> Identity management is not a one-time task but an ongoing process that requires continuous monitoring and improvement. Our IAM solutions include real-time monitoring and analytics, enabling you to detect and respond to suspicious activities as they occur. We also provide regular assessments and updates to keep your IAM framework aligned with the latest security threats and technological advancements.<\/p><\/li><\/ul><p>By partnering with us, you gain access to advanced IAM solutions that not only secure your digital identities but also enhance the efficiency and agility of your operations. Our goal is to empower your organization with the tools and strategies needed to navigate the complexities of identity management in today\u2019s digital world, ensuring that your business remains protected, compliant, and ready to grow.<\/p><p>We understand that managing APIs effectively is crucial for businesses that rely on integrated systems, real-time data exchange, and a smooth user experience. Our approach to API management goes beyond basic oversight; we provide a comprehensive suite of services designed to optimize your API ecosystem, ensuring it supports your business objectives and enhances your digital operations.<\/p><ul><li><p><strong>Robust Security:<\/strong> Security is paramount in API management, especially as APIs often serve as gateways to sensitive data and critical business functions. We implement stringent security measures, including encryption, authentication protocols, and threat detection, to protect your APIs from unauthorized access, data breaches, and other cyber threats. This ensures that your digital assets remain secure, and your business maintains compliance with industry standards and regulations.<\/p><\/li><li><p><strong>Seamless Content Gate Integration:<\/strong> Content gates are essential for controlling access to your digital content and services, whether for monetization, user segmentation, or compliance purposes. We specialize in integrating these content gates within your API framework, allowing you to efficiently manage who can access what content, when, and how. This not only enhances user experience but also provides you with greater control over your content distribution and usage.<\/p><\/li><li><p><strong>Efficient Data Access Control:<\/strong> Managing data access through APIs is a critical aspect of maintaining operational efficiency and data integrity. Our API management solutions include sophisticated access control mechanisms that ensure the right people have access to the right data at the right time. This minimizes the risk of data leaks or misuse and supports your organization\u2019s data governance policies.<\/p><\/li><li><p><strong>Enhanced Digital Ecosystem Management:<\/strong> A well-managed API ecosystem is key to creating a cohesive digital environment where various systems and services can interact seamlessly. We provide ongoing monitoring, optimization, and support for your APIs, ensuring they perform at their best and adapt to changing business needs. This holistic approach enables your business to innovate rapidly, integrate new technologies smoothly, and maintain a competitive edge in a fast-paced digital landscape.<\/p><\/li><\/ul><p>By choosing our specialized API management services, you empower your business with the tools and expertise needed to navigate the complexities of modern digital ecosystems. We are committed to helping you achieve greater efficiency, security, and control, enabling your organization to thrive in an increasingly interconnected world.<\/p><p><strong>ForgeRock<\/strong><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">ForgeRock provides a unified platform for managing identities and securing access across all digital interactions. It enables organizations to deliver personalized and secure user experiences, whether through web, mobile, or IoT devices. By leveraging ForgeRock\u2019s advanced authentication methods, including biometrics and adaptive risk-based policies, businesses can ensure robust security while maintaining user convenience. Its flexible deployment options\u2014cloud, on-premises, or hybrid\u2014allow organizations to scale according to their needs, making ForgeRock a versatile solution for both enterprises and service providers.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><p><strong>SailPoint\u00a0<\/strong><\/p><p><span data-contrast=\"auto\">SailPoint excels in identity governance, offering a comprehensive approach to managing user access and ensuring compliance with regulatory requirements. The platform automates the process of granting, monitoring, and revoking access to critical systems and data, reducing the risk of unauthorized access. SailPoint\u2019s AI-powered insights help organizations detect potential security threats and optimize identity processes. With its strong focus on compliance and risk management, SailPoint is a trusted solution for organizations looking to strengthen their identity governance framework.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><p><strong>Okta\u00a0 \u00a0<\/strong><\/p><p><span data-contrast=\"auto\">Okta is a powerful cloud-based identity management platform that helps organizations streamline access to their applications while enhancing security. By centralizing identity management, Okta enables users to access multiple applications with a single set of credentials, simplifying the login process and improving productivity. The platform supports a wide range of authentication methods, including multi-factor authentication (MFA), ensuring that access is secure yet user-friendly. Okta\u2019s extensive integration capabilities make it a flexible choice for businesses of all sizes, allowing seamless connectivity across cloud and on-premises environments.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><p><strong>PingFederate<\/strong><\/p><p><span data-contrast=\"auto\">PingFederate is an enterprise-class identity federation solution that enables secure and seamless access to applications, regardless of where they are hosted. It supports a variety of modern authentication protocols, such as SAML, OAuth, and OpenID Connect, making it easy to integrate with both legacy systems and new cloud applications. PingFederate\u2019s robust security features, including multi-factor authentication and fine-grained access control, ensure that only authorized users gain access to sensitive data and applications. By providing a seamless user experience across different platforms, PingFederate helps organizations maintain a strong security posture while enhancing productivity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c44430 elementor-widget elementor-widget-image\" data-id=\"2c44430\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"649\" height=\"616\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/security-testing2.png\" class=\"attachment-full size-full wp-image-8669\" alt=\"\" srcset=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/security-testing2.png 649w, https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/security-testing2-300x285.png 300w, https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/security-testing2-600x569.png 600w\" sizes=\"(max-width: 649px) 100vw, 649px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9c71e08 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c71e08\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3b2d0be\" data-id=\"3b2d0be\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ddeff3 elementor-widget elementor-widget-tragasectiontitle\" data-id=\"3ddeff3\" data-element_type=\"widget\" data-widget_type=\"tragasectiontitle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"title-area-wrap\"><div class=\"title-area mb-35\" ><span class=\"sub-title subtitle-selector\">Services\n<\/span><h2 class=\"sec-title title-selector\"><span style=\"color:black\">Explore our Range of Services\n<\/span><\/h2><\/div><p class=\"desc-selector mt-n2 mb-4\">Expert-led identity and access management services, driven by seasoned professionals with extensive experience in delivering complex IAM programs, ensure robust security and seamless execution of your organization\u2019s most demanding projects .\n\n<\/p><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b75d52c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b75d52c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0ff8475\" data-id=\"0ff8475\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aacbf42 elementor-widget elementor-widget-tragaservice\" data-id=\"aacbf42\" data-element_type=\"widget\" data-widget_type=\"tragaservice.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t<div class=\"service-style2\">\r\n\t\t\t\t<div class=\"row gy-4\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">01<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/3-3.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/identity-governance\/\">Identity Governance<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Identity Governance ensures compliance &amp; security by managing &amp; auditing user access rights and preventing unauthorized access.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/identity-governance\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">02<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/identity.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/identity-gate\/\">Identity Gateway<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">An Identity Gateway simplifies secure access management by acting as a centralized hub for enhancing network and ux across digital environments.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/identity-gate\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">03<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/directory.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/directory-services\/\">Directory Services<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Directory Services streamline network management by organizing and providing centralized access to user and device information and security.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/directory-services\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">04<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/identityaccess.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/blog-2\/\">Identity and Access Management<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Identity and Access Management ensures secure access control, user authentication and authorization, protecting organizational data from unauthorized access.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/blog-2\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">05<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/3-3.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/privileged-access-management\/\">Privileged Access Management\n<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Privileged Access Management (PAM) safeguards, controls, and oversees high-level access, preventing the misuse of critical systems by privileged users.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/privileged-access-management\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">06<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/learn-1.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/multifactor-authentication\/\">Multifactor Authentication<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Multifactor Authentication (MFA) boosts security by demanding several verification methods, confirming user identity through knowledge, or inherent traits.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/multifactor-authentication\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">07<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/contact.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"#\">JAVA<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Java is a versatile, platform-independent programming language used for diverse applications.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">08<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/aboutUS2.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"#\">DevOps<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">DevOps combines development and operations to automate and accelerate software delivery.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">09<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/iALearn.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"#\">Snowflake<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Snowflake is a cloud data warehousing platform for scalable data storage and analysis.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">10<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/identityaccess-1.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/full-stack-development\/\">Full Stack Development<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Full stack development covers both front-end and back-end aspects of web applications.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/full-stack-development\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">11<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/learn-2.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/data-analytics\/\">Data Analytics<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Data analytics involves examining data to uncover insights that drive better business decisions.\n<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/data-analytics\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-xl-4\">\r\n\t\t\t\t\t\t\t<div class=\"service-card elementor-box\">\r\n\t\t\t\t\t\t\t\t<div class=\"service-card_number\">12<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"shape-icon\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/3-3.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t\t<span class=\"dots\"><\/span>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"box-title\"><a href=\"https:\/\/sanvima.in\/projects\/copenblue\/cloud-technologies\/\">Cloud Technologies<\/a><\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"service-card_text\">Cloud technologies provide scalable computing resources and services over the internet.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sanvima.in\/projects\/copenblue\/cloud-technologies\/\" class=\"th-btn\">Read More<i class=\"fa-regular fa-arrow-right ms-2\"><\/i><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bg-shape\">\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/themeholy.com\/wordpress\/fresh\/wp-content\/uploads\/2024\/01\/service_card_bg.png\" alt=\"copenblue\"  \/>\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\r\n        \r\n    \t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-536bead elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"536bead\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41d1709\" data-id=\"41d1709\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ddac4f elementor-widget__width-inherit elementor-widget-tablet__width-inherit elementor-widget elementor-widget-image\" data-id=\"6ddac4f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"710\" src=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/IA2.png\" class=\"attachment-full size-full wp-image-8903\" alt=\"\" srcset=\"https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/IA2.png 768w, https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/IA2-300x277.png 300w, https:\/\/sanvima.in\/projects\/copenblue\/wp-content\/uploads\/2024\/08\/IA2-600x555.png 600w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a1fc771 ps-xxl-5 ps-xl-4\" data-id=\"a1fc771\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-defd2e2 elementor-widget elementor-widget-heading\" data-id=\"defd2e2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Why us?\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baf14f8 elementor-widget elementor-widget-heading\" data-id=\"baf14f8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Established on Trust and Building Relationships.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb09493 elementor-widget elementor-widget-text-editor\" data-id=\"fb09493\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b888ca stonex-size-default STONEX-addons-sticky-no elementor-widget elementor-widget-text-editor\" data-id=\"1b888ca\" data-element_type=\"widget\" data-settings=\"{&quot;stonex_sticky&quot;:&quot;no&quot;}\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Experience enhanced security with our advanced identity access management solutions. We ensure seamless integration, compliance, and protection of your critical assets, backed by industry expertise and proactive support for peace of mind.<\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>OUR SERVICES Identity and Access Management In an era where digital identities are central to accessing systems, data, and applications, securing these identities is critical for any organization\u2019s security posture. We specialize in providing advanced Identity Access Management (IAM) solutions that are designed to protect your digital identities, streamline your operations, and ensure seamless access&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8484","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sanvima.in\/projects\/copenblue\/wp-json\/wp\/v2\/pages\/8484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sanvima.in\/projects\/copenblue\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sanvima.in\/projects\/copenblue\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sanvima.in\/projects\/copenblue\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sanvima.in\/projects\/copenblue\/wp-json\/wp\/v2\/comments?post=8484"}],"version-history":[{"count":26,"href":"https:\/\/sanvima.in\/projects\/copenblue\/wp-json\/wp\/v2\/pages\/8484\/revisions"}],"predecessor-version":[{"id":9298,"href":"https:\/\/sanvima.in\/projects\/copenblue\/wp-json\/wp\/v2\/pages\/8484\/revisions\/9298"}],"wp:attachment":[{"href":"https:\/\/sanvima.in\/projects\/copenblue\/wp-json\/wp\/v2\/media?parent=8484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}