{"id":12952,"date":"2022-06-06T09:50:34","date_gmt":"2022-06-06T09:50:34","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-kh\/?page_id=12952"},"modified":"2023-01-11T09:14:52","modified_gmt":"2023-01-11T09:14:52","slug":"vulnerability-and-compliance-management-vcm","status":"publish","type":"page","link":"https:\/\/ivaluegroup.com\/en-kh\/solutions\/digital-asset-protection\/vulnerability-and-compliance-management-vcm\/","title":{"rendered":"Vulnerability and Compliance Management (VCM)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12952\" class=\"elementor elementor-12952\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-709b7c1e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"709b7c1e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f91ffcf\" data-id=\"4f91ffcf\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b99ac3a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b99ac3a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-234154f1\" data-id=\"234154f1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b4a13b9 elementor-widget elementor-widget-shortcode\" data-id=\"b4a13b9\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t\t<!-- Flexy Breadcrumb -->\r\n\t\t\t<div class=\"fbc fbc-page\">\r\n\r\n\t\t\t\t<!-- Breadcrumb wrapper -->\r\n\t\t\t\t<div class=\"fbc-wrap\">\r\n\r\n\t\t\t\t\t<!-- Ordered list-->\r\n\t\t\t\t\t<ol class=\"fbc-items\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\">\r\n\t\t\t\t\t\t            <li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\r\n                <span itemprop=\"name\">\r\n                    <!-- Home Link -->\r\n                    <a itemprop=\"item\" href=\"https:\/\/ivaluegroup.com\/en-kh\">\r\n                    \r\n                                                    <i class=\"fa fa-home\" aria-hidden=\"true\"><\/i>Home                    <\/a>\r\n                <\/span>\r\n                <meta itemprop=\"position\" content=\"1\" \/><!-- Meta Position-->\r\n             <\/li><li><span class=\"fbc-separator\">\/<\/span><\/li><li class=\"active\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\" title=\"Vulnerability and Compliance Management (VCM)\">Vulnerability and Compliance Management...<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li>\t\t\t\t\t<\/ol>\r\n\t\t\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-516ea119 elementor-widget elementor-widget-heading\" data-id=\"516ea119\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">DIGITAL ASSET PROTECTION <\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a3fde46 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a3fde46\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-696c9789\" data-id=\"696c9789\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2561795c elementor-widget elementor-widget-heading\" data-id=\"2561795c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability and Compliance Management (VCM)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2747a664 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"2747a664\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-lightbulb\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65134bd6 elementor-widget elementor-widget-image\" data-id=\"65134bd6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"709\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2023\/01\/Vulnerability-and-Compliance-Management.webp\" class=\"attachment-full size-full wp-image-14365\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2023\/01\/Vulnerability-and-Compliance-Management.webp 1000w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2023\/01\/Vulnerability-and-Compliance-Management-300x213.webp 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2023\/01\/Vulnerability-and-Compliance-Management-768x545.webp 768w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2023\/01\/Vulnerability-and-Compliance-Management-24x17.webp 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2023\/01\/Vulnerability-and-Compliance-Management-36x26.webp 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2023\/01\/Vulnerability-and-Compliance-Management-48x34.webp 48w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707ce9db elementor-widget elementor-widget-text-editor\" data-id=\"707ce9db\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">It is accepted that various weaknesses exist in every software that is developed \u2013 that\u2019s the need for Vulnerability and Compliance Management. It has been shown that the most common defects are the ones that are frequently used to attack users.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Vulnerability and compliance management is an ongoing effort of detecting, analyzing, and resolving issues that are potential sources of venerabilities. There are four types of vulnerability in cyber security: network vulnerability, operating system vulnerability, human vulnerability, and process vulnerability.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Vulnerability and Compliance Management can be broken down into four steps. The first step in VCM is to identify the vulnerability. Some different tools and solutions can provide insight into the applications&#8217; potential security risks. After placing the vulnerability, the next step is to evaluate the exposure and eradicate the chance of false negatives and positives in the report. After evaluation, the threat needs to be resolved and fixed. In this step, well-trained recruits are required to be able to read the report and locate the issue. <\/span><\/p><p><span style=\"font-weight: 400;\">The statement about the Identified and evaluated vulnerability should be sent to the development team to ensure the threat is fixed and will not be of any security risk in the future. These steps need regular scanning that focuses on especially identifying the vulnerabilities. These reports can then generate a generic dashboard and define risk exposure. It is crucial to keep operating systems, applications, and other third-party software updated in a digital environment to ensure that new vulnerability issues are identified and fixed in every version.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">While Vulnerability Assessments have a definite start and end date, <span style=\"color: #333300;\"><a style=\"color: #333300;\" href=\"https:\/\/en.wikipedia.org\/wiki\/Vulnerability_management\" target=\"_blank\" rel=\"noopener\">Vulnerability Management<\/a><\/span> (VM) is a continuous ongoing process that helps organizations like yours better manage their risks and vulnerabilities in the long run.<\/span><\/p><p><span style=\"font-weight: 400;\">VM can get challenging when regulatory compliance requirements are involved. To achieve compliance, a Vulnerability and Compliance Management plan needs to be established where vulnerabilities are collected and ranked based on business and compliance realities. Regular scanning is performed for validation to avoid false positives and reduce duplicate efforts. Once a threat is accepted, mitigation efforts are put into place.<\/span><\/p><p style=\"text-align: justify;\"><strong><span style=\"font-size: 1.3em;\">WHAT TO EXPECT FROM VCM SOLUTIONS<\/span><\/strong><\/p><p><span style=\"font-weight: 400;\">VCM solutions work by taking continuously taking vulnerability assessments of your entire IT infrastructure, including hardware, software, environments, and devices. These assessments help determine what has changed in the background, thus reducing time usually wasted in reanalyzing items that have already been reviewed.<\/span><\/p><p><span style=\"font-weight: 400;\">Additionally, these assessments help your IT team and third-party tools like patch management, etc., rank vulnerabilities and set up a clear plan of action, which can often lead to remediation. However, there can be instances where the associated risks of these vulnerabilities are accepted. It depends on the business and compliance policies you have set up in your enterprise.<\/span><\/p><p><span style=\"font-weight: 400;\">Another process, penetration testing, can further identify threats in your IT ecosystem. Full-scale penetration testing can determine if a vulnerability should be addressed and whether that action would cause damage, data loss, or other environmental issues.<\/span><\/p><p><span style=\"font-weight: 400;\">Automating IT compliance and vulnerability management is a powerful solution to counter the daily threats and breaches your enterprise faces. These solutions significantly improve decision-making by presenting the information in an easy-to-digest way and providing visibility into compliance and patch status across the entire infrastructure stack.<\/span><\/p><h4><strong>HOW IVALUE CAN HELP<\/strong><\/h4><p><span style=\"font-weight: 400;\"><span style=\"color: #333300;\"><a style=\"color: #333300;\" href=\"https:\/\/ivaluegroup.com\/\">iValue<\/a><\/span> offers vulnerability and compliance management (VCM) solutions by first identifying the right VCM approach for your enterprise. Equipped with a suitable suite of tools and software, we can reduce your exposure to threats and breaches and boost your baseline protection across your entire IT infrastructure.<\/span><\/p><p><span style=\"font-weight: 400;\">We align the right vulnerability and compliance management program with your business goals. This helps you quickly create and analyze success metrics, thus enabling you to communicate your success to the key stakeholders.<\/span><\/p><p><span style=\"font-weight: 400;\">Tap into the broad range of tools and support we offer in our VULNERABILITY AND COMPLIANCE MANAGEMENT program. By deploying the right VCM solution, you can continuously monitor and make timely decisions to handle threats. You can centrally manage the scanners and identify vulnerability severity levels in dashboard displays and reports.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2af40ffa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2af40ffa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2298563e\" data-id=\"2298563e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e663722 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1e663722\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivaluegroup.com\/en-in\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 18.71875 6.78125 L 17.28125 8.21875 L 24.0625 15 L 4 15 L 4 17 L 24.0625 17 L 17.28125 23.78125 L 18.71875 25.21875 L 27.21875 16.71875 L 27.90625 16 L 27.21875 15.28125 Z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us Today<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DIGITAL ASSET PROTECTION Vulnerability and Compliance Management (VCM) It is accepted that various weaknesses exist in every software that is developed \u2013 that\u2019s the need for Vulnerability and Compliance Management. It has been shown that the most common defects are the ones that are frequently used to attack users.\u00a0 Vulnerability and compliance management is an &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-kh\/solutions\/digital-asset-protection\/vulnerability-and-compliance-management-vcm\/\"> <span class=\"screen-reader-text\">Vulnerability and Compliance Management (VCM)<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2307,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/12952"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/comments?post=12952"}],"version-history":[{"count":8,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/12952\/revisions"}],"predecessor-version":[{"id":14527,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/12952\/revisions\/14527"}],"up":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/2307"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media?parent=12952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/categories?post=12952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/tags?post=12952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}