{"id":8290,"date":"2022-03-22T05:59:34","date_gmt":"2022-03-22T05:59:34","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-kh\/?page_id=8290"},"modified":"2022-09-06T11:29:40","modified_gmt":"2022-09-06T11:29:40","slug":"cyberark","status":"publish","type":"page","link":"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/cyberark\/","title":{"rendered":"Cyberark"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8290\" class=\"elementor elementor-8290\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b8baf0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b8baf0\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-428dacf\" data-id=\"428dacf\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b8f0b1c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8f0b1c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e01c223\" data-id=\"e01c223\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d63d491 elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-shortcode\" data-id=\"d63d491\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t\t<!-- Flexy Breadcrumb -->\r\n\t\t\t<div class=\"fbc fbc-page\">\r\n\r\n\t\t\t\t<!-- Breadcrumb wrapper -->\r\n\t\t\t\t<div class=\"fbc-wrap\">\r\n\r\n\t\t\t\t\t<!-- Ordered list-->\r\n\t\t\t\t\t<ol class=\"fbc-items\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\">\r\n\t\t\t\t\t\t            <li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\r\n                <span itemprop=\"name\">\r\n                    <!-- Home Link -->\r\n                    <a itemprop=\"item\" href=\"https:\/\/ivaluegroup.com\/en-kh\">\r\n                    \r\n                                                    <i class=\"fa fa-home\" aria-hidden=\"true\"><\/i>Home                    <\/a>\r\n                <\/span>\r\n                <meta itemprop=\"position\" content=\"1\" \/><!-- Meta Position-->\r\n             <\/li><li><span class=\"fbc-separator\">\/<\/span><\/li><li class=\"active\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\" title=\"Cyberark\">Cyberark<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li>\t\t\t\t\t<\/ol>\r\n\t\t\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7334ae8 elementor-widget elementor-widget-heading\" data-id=\"7334ae8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Whitepapers<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-62cbb9e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"62cbb9e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8c5e338\" data-id=\"8c5e338\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06737e4 elementor-widget elementor-widget-heading\" data-id=\"06737e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Displaying White Papers for Cyberark<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a3a513 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a3a513\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f4fd05c\" data-id=\"f4fd05c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c49af9e elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"c49af9e\" data-element_type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-posts.min.css\">\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5413 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-cyberark\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/the-problem-with-password-managers\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/the-problem-with-password-managers\/\" >\n\t\t\t\tTHE PROBLEM WITH PASSWORD MANAGERS\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>THE PROBLEM WITH PASSWORD MANAGERS Many businesses use password management services, aka password managers, to contain password sprawl, improve user experiences, and reduce security vulnerabilities. Password managers eliminate password fatigue by automatically generating, storing, and managing complex passwords transparently to the user. Rather than having to remember a distinct password for each application, users simply<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/the-problem-with-password-managers\/\" aria-label=\"Read more about THE PROBLEM WITH PASSWORD MANAGERS\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-3172 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-cyberark\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/efficiently-protect-monitor-and-control-privileged-access-across-on-premises-cloud-and-hybrid-infrastructure-whitepaper\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/efficiently-protect-monitor-and-control-privileged-access-across-on-premises-cloud-and-hybrid-infrastructure-whitepaper\/\" >\n\t\t\t\tEFFICIENTLY PROTECT, MONITOR AND CONTROL PRIVILEGED ACCESS ACROSS ON-PREMISES, CLOUD AND HYBRID INFRASTRUCTURE &#8211; WHITEPAPER\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>EFFICIENTLY PROTECT, MONITOR AND CONTROL PRIVILEGED ACCESS ACROSS ON-PREMISES, CLOUD AND HYBRID INFRASTRUCTURE Privileged accounts are exploited in nearly every cyber attack. Bad actors can use privileged accounts to disable systems, take control of critical IT infrastructure and gain access to confidential business data and personal information.<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/efficiently-protect-monitor-and-control-privileged-access-across-on-premises-cloud-and-hybrid-infrastructure-whitepaper\/\" aria-label=\"Read more about EFFICIENTLY PROTECT, MONITOR AND CONTROL PRIVILEGED ACCESS ACROSS ON-PREMISES, CLOUD AND HYBRID INFRASTRUCTURE &#8211; WHITEPAPER\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-3171 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-cyberark\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/cyberark-privilege-cloud-is-built-to-protect-control-and-monitor-privileged-access-across-both-cloud-and-hybrid-infrastructures-whitepaper\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/cyberark-privilege-cloud-is-built-to-protect-control-and-monitor-privileged-access-across-both-cloud-and-hybrid-infrastructures-whitepaper\/\" >\n\t\t\t\tCYBERARK PRIVILEGE CLOUD IS BUILT TO PROTECT, CONTROL, AND MONITOR PRIVILEGED ACCESS ACROSS BOTH CLOUD AND HYBRID INFRASTRUCTURES. &#8211; WHITEPAPER\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>CYBERARK PRIVILEGE CLOUD IS BUILT TO PROTECT, CONTROL, AND MONITOR PRIVILEGED ACCESS ACROSS BOTH CLOUD AND HYBRID INFRASTRUCTURES. Designed from the ground up for security, Privilege Cloud helps organizations efficiently manage privileged account credentials and access rights, proactively monitor and control privileged account activity, and quickly respond to threats. Customers can feel confident in the<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/cyberark-privilege-cloud-is-built-to-protect-control-and-monitor-privileged-access-across-both-cloud-and-hybrid-infrastructures-whitepaper\/\" aria-label=\"Read more about CYBERARK PRIVILEGE CLOUD IS BUILT TO PROTECT, CONTROL, AND MONITOR PRIVILEGED ACCESS ACROSS BOTH CLOUD AND HYBRID INFRASTRUCTURES. &#8211; WHITEPAPER\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-659d1b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"659d1b5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a6ba66d\" data-id=\"a6ba66d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae9882d elementor-align-center elementor-widget elementor-widget-global elementor-global-6829 elementor-widget-button\" data-id=\"ae9882d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivaluegroup.com\/en-kh\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 18.71875 6.78125 L 17.28125 8.21875 L 24.0625 15 L 4 15 L 4 17 L 24.0625 17 L 17.28125 23.78125 L 18.71875 25.21875 L 27.21875 16.71875 L 27.90625 16 L 27.21875 15.28125 Z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us Today<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Whitepapers Displaying White Papers for Cyberark Contact Us Today<\/p>\n","protected":false},"author":1,"featured_media":13584,"parent":2374,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[14,11],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/8290"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/comments?post=8290"}],"version-history":[{"count":33,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/8290\/revisions"}],"predecessor-version":[{"id":13910,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/8290\/revisions\/13910"}],"up":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/2374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media\/13584"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media?parent=8290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/categories?post=8290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/tags?post=8290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}