{"id":174,"date":"2024-11-17T12:38:16","date_gmt":"2024-11-17T12:38:16","guid":{"rendered":"https:\/\/plccloud.com\/?page_id=174"},"modified":"2025-10-20T12:53:25","modified_gmt":"2025-10-20T12:53:25","slug":"intrusion-prevention","status":"publish","type":"page","link":"https:\/\/conquest-automation.nl\/en\/intrusion-prevention\/","title":{"rendered":"Intrusion Prevention"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"174\" class=\"elementor elementor-174\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f421209 e-con-full e-flex e-con e-parent\" data-id=\"2f421209\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b684ed9 elementor-widget elementor-widget-image\" data-id=\"7b684ed9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"403\" height=\"59\" src=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-1.png\" class=\"attachment-large size-large wp-image-11\" alt=\"\" srcset=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-1.png 403w, https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-1-300x44.png 300w\" sizes=\"(max-width: 403px) 100vw, 403px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10772f00 e-flex e-con-boxed e-con e-child\" data-id=\"10772f00\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-12abaea9 e-con-full e-flex e-con e-child\" data-id=\"12abaea9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a925fc1 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"a925fc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Intrusion prevention<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c265aa8 variant variant-simple elementor-widget elementor-widget-text-editor\" data-id=\"5c265aa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With a high degree of accessibility comes the major danger that most IT systems face on a daily basis: the lack of effective intrusion prevention against cyber attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f96c28a variant variant-tech elementor-widget elementor-widget-text-editor\" data-id=\"f96c28a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With a high degree of accessibility comes the major danger that most IT systems face on a daily basis: the lack of effective intrusion prevention against cyber attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-577e64e elementor-widget elementor-widget-image\" data-id=\"577e64e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"505\" height=\"166\" src=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-2.png\" class=\"attachment-large size-large wp-image-16\" alt=\"\" srcset=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-2.png 505w, https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-2-300x99.png 300w\" sizes=\"(max-width: 505px) 100vw, 505px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-161b883a e-flex e-con-boxed e-con e-parent\" data-id=\"161b883a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1ee72442 e-con-full e-flex e-con e-child\" data-id=\"1ee72442\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-625d3525 elementor-widget elementor-widget-image\" data-id=\"625d3525\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/thisisengineering-hoivM01c-vg-unsplash.jpg\" class=\"attachment-large size-large wp-image-486\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62ed0418 elementor-widget elementor-widget-heading\" data-id=\"62ed0418\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Intrusion prevention<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f263aa4 variant variant-simple elementor-widget elementor-widget-text-editor\" data-id=\"2f263aa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"114\" data-end=\"701\">Most Operational Technology (OT) systems, such as machine controls, were originally designed with an open architecture. This means that they are freely accessible and that various systems can be easily linked together. This openness offers many advantages: it enables efficient integration and ensures that production processes can be controlled centrally. However, this high degree of accessibility also entails a significant risk: vulnerability to cyber attacks, in which intrusion prevention plays a crucial role.<\/p><p data-start=\"703\" data-end=\"1084\">While IT systems often have extensive security layers, many OT systems lack such protection. This makes them an attractive target for hackers. These weaknesses pose a direct threat to both OT and connected IT infrastructures. Without effective intrusion prevention, these systems remain vulnerable to serious security breaches and cyberattacks.<\/p><p data-start=\"1086\" data-end=\"1450\">Despite the increasing threat of cybercrime, there is still insufficient awareness of the risks within OT environments. This is partly because IT and OT teams think differently: IT focuses on security protocols, while OT focuses on continuity and performance. As a result, cyber security in OT systems often does not get the priority it deserves.<\/p><p data-start=\"1452\" data-end=\"1707\">In addition, the economic side plays a role. Securing OT requires investments in technology, training and maintenance. Because the direct benefits are often difficult to quantify, such as with an ROI, these measures are sometimes seen as unnecessary.<\/p><p data-start=\"1709\" data-end=\"2102\">However, the costs of a cyber attack \u2013 think downtime, data loss, reputational damage and recovery \u2013 can be much higher than the investment in good security. It is therefore essential that companies focus on intrusion prevention within OT systems and bridge the gap between IT and OT. Only in this way can organizations effectively protect themselves against the growing cyber threat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31982b0 variant variant-tech elementor-widget elementor-widget-text-editor\" data-id=\"31982b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"226\" data-end=\"778\">De meeste operationele technologie systemen zijn oorspronkelijk ontwikkeld met een open architectuur die samenwerking tussen verschillende machines en platformen eenvoudig maakt. Deze openheid biedt veel voordelen, zoals flexibiliteit, integratie en centrale aansturing van processen. Tegelijk brengt dit een structureel risico met zich mee: een hogere kwetsbaarheid voor cyberdreigingen. Zonder gerichte beveiligingsmaatregelen kan dezelfde transparantie die procesoptimalisatie mogelijk maakt, ook worden misbruikt als toegangspoort voor aanvallen.<\/p><p data-start=\"780\" data-end=\"1299\">In tegenstelling tot IT omgevingen, waar gelaagde beveiliging en continue monitoring standaard zijn, beschikken veel operationele technologie systemen niet over vergelijkbare verdedigingsmechanismen. Oudere installaties draaien vaak op verouderde firmware zonder patchmanagement of netwerksegmentatie, wat ze aantrekkelijk maakt voor aanvallers. Een succesvolle inbraak in \u00e9\u00e9n enkel besturingsnetwerk kan zich snel uitbreiden naar gekoppelde IT structuren, met grote gevolgen voor productiecontinu\u00efteit en veiligheid.<\/p><p data-start=\"1301\" data-end=\"1723\">Het beperkte bewustzijn van deze risico\u2019s komt deels voort uit het verschil in denkwijze tussen IT en operationele technologie. IT specialisten richten zich vooral op databeveiliging en toegangscontrole, terwijl engineers binnen operationele technologie gericht zijn op uptime en proceseffici\u00ebntie. Hierdoor krijgt cyberbeveiliging binnen industri\u00eble netwerken vaak pas aandacht nadat een incident zich heeft voorgedaan.<\/p><p data-start=\"1725\" data-end=\"2036\">Ook de economische factor speelt een rol. Investeringen in intrusion prevention, netwerksegmentatie, anomaly detection en security awareness training lijken op korte termijn kostbaar, maar de schade door een aanval is veel groter. Denk aan productiestilstand, verlies van data, herstelwerk en reputatieschade.<\/p><p data-start=\"2038\" data-end=\"2628\">Een effectieve beveiligingsstrategie voor operationele technologie vraagt om nauwe samenwerking tussen IT en OT teams, met nadruk op risicogebaseerde segmentatie, monitoring en realtime detectie van afwijkend gedrag. Intrusion prevention vormt hierbij de kern. Het identificeert, isoleert en blokkeert bedreigingen voordat ze operationele processen kunnen be\u00efnvloeden. Door beveiliging integraal op te nemen in de automatiseringsarchitectuur kunnen organisaties hun productieomgeving beschermen tegen toenemende cyberdreigingen zonder concessies te doen aan beschikbaarheid of prestaties.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c17db11 elementor-widget elementor-widget-spacer\" data-id=\"c17db11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52cbfeb2 elementor-widget elementor-widget-heading\" data-id=\"52cbfeb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad88e76 elementor-widget elementor-widget-elementskit-accordion\" data-id=\"4ad88e76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69ecdbfc2a661\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-4ad88e76\">\n                        <a href=\"#collapse-b0448ea69ecdbfc2a661\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-b0448ea69ecdbfc2a661\" aria-expanded=\"true\" aria-controls=\"Collapse-b0448ea69ecdbfc2a661\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i class=\"icon icon-plus\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-minus\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">What is the difference between IT and OT systems?<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-b0448ea69ecdbfc2a661\" class=\"show collapse\" aria-labelledby=\"primaryHeading-0-4ad88e76\" data-parent=\"#accordion-69ecdbfc2a661\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>IT (Information Technology) focuses on data management, networking, and digital infrastructure, while OT (Operational Technology) focuses on physical processes and machine controls. For example, OT systems control manufacturing equipment, while IT systems handle data storage, analysis, and communication.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-4ad88e76\">\n                        <a href=\"#collapse-2e0233f69ecdbfc2a661\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-2e0233f69ecdbfc2a661\" aria-expanded=\"false\" aria-controls=\"Collapse-2e0233f69ecdbfc2a661\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i class=\"icon icon-plus\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-minus\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Why are OT systems vulnerable to cyber attacks?<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-2e0233f69ecdbfc2a661\" class=\"collapse\" aria-labelledby=\"primaryHeading-1-4ad88e76\" data-parent=\"#accordion-69ecdbfc2a661\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>OT systems are often designed with a focus on functionality and accessibility, not security. They often lack built-in cybersecurity layers, making them easy targets for malicious actors seeking access to the wider network.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-4ad88e76\">\n                        <a href=\"#collapse-e9a14f469ecdbfc2a661\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-e9a14f469ecdbfc2a661\" aria-expanded=\"false\" aria-controls=\"Collapse-e9a14f469ecdbfc2a661\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i class=\"icon icon-plus\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-minus\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">How can security breaches in OT systems impact IT systems?<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-e9a14f469ecdbfc2a661\" class=\"collapse\" aria-labelledby=\"primaryHeading-2-4ad88e76\" data-parent=\"#accordion-69ecdbfc2a661\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>OT and IT systems are often interconnected. If an OT system is compromised, it can provide an entry point into the IT network. This makes the entire system vulnerable to data breaches, ransomware attacks and other cyber threats.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-3-4ad88e76\">\n                        <a href=\"#collapse-3397b8c69ecdbfc2a661\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-3397b8c69ecdbfc2a661\" aria-expanded=\"false\" aria-controls=\"Collapse-3397b8c69ecdbfc2a661\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i class=\"icon icon-plus\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-minus\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">What steps can companies take to secure OT systems?<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-3397b8c69ecdbfc2a661\" class=\"collapse\" aria-labelledby=\"primaryHeading-3-4ad88e76\" data-parent=\"#accordion-69ecdbfc2a661\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Companies can start by risk assessing their OT environment, segmenting networks to separate OT and IT, and implementing modern security solutions such as firewalls and intrusion detection systems. Regular training of staff on cybersecurity is also essential.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-4-4ad88e76\">\n                        <a href=\"#collapse-0e65efa69ecdbfc2a661\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-0e65efa69ecdbfc2a661\" aria-expanded=\"false\" aria-controls=\"Collapse-0e65efa69ecdbfc2a661\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i class=\"icon icon-plus\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-minus\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">Why is the security of OT systems often seen as less urgent?<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-0e65efa69ecdbfc2a661\" class=\"collapse\" aria-labelledby=\"primaryHeading-4-4ad88e76\" data-parent=\"#accordion-69ecdbfc2a661\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>This is partly due to the different priorities of IT and OT specialists. OT focuses primarily on operational continuity and performance, while IT is more concerned with security. In addition, the ROI of cybersecurity is difficult to visualize, which is why it is often postponed or ignored.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-5-4ad88e76\">\n                        <a href=\"#collapse-ae754b269ecdbfc2a661\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-ae754b269ecdbfc2a661\" aria-expanded=\"false\" aria-controls=\"Collapse-ae754b269ecdbfc2a661\">\n                                                            <div class=\"ekit_accordion_icon_left_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i class=\"icon icon-plus\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-minus\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                            <span class=\"ekit-accordion-title\">What are the risks if OT systems are not secured?<\/span>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-ae754b269ecdbfc2a661\" class=\"collapse\" aria-labelledby=\"primaryHeading-5-4ad88e76\" data-parent=\"#accordion-69ecdbfc2a661\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Unsecured OT systems can lead to production downtime, equipment sabotage, data loss and reputational damage. In addition, cyberattacks can cause significant financial losses due to repair costs and lost production. The risk increases as cybercriminals become more sophisticated.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51dd64c9 e-con-full e-flex e-con e-child\" data-id=\"51dd64c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a96ee81 elementor-widget elementor-widget-heading\" data-id=\"1a96ee81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">What do we do?<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba04ecf elementor-widget elementor-widget-spacer\" data-id=\"ba04ecf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5fdf6d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f5fdf6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/conquest-automation.nl\/en\/?page_id=186\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lnr lnr-arrow-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detachering<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/conquest-automation.nl\/en\/?page_id=184\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lnr lnr-arrow-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Consultancy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/conquest-automation.nl\/en\/?page_id=182\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lnr lnr-arrow-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">End of life retrofit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/conquest-automation.nl\/en\/?page_id=180\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lnr lnr-arrow-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Machine control<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/conquest-automation.nl\/en\/?page_id=178\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lnr lnr-arrow-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Line improvement<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/conquest-automation.nl\/en\/?page_id=176\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lnr lnr-arrow-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Line Control and Machine Integration<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/conquest-automation.nl\/en\/?page_id=174\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lnr lnr-arrow-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Intrusion prevention<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa7d4fd e-flex e-con-boxed e-con e-parent\" data-id=\"fa7d4fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ba0a1b elementor-widget elementor-widget-heading\" data-id=\"0ba0a1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Our partners<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92ab02c elementor-widget elementor-widget-image-carousel\" data-id=\"92ab02c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;5&quot;,&quot;navigation&quot;:&quot;none&quot;,&quot;lazyload&quot;:&quot;yes&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:41,&quot;sizes&quot;:[]},&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper swiper-image-stretch\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 4\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/automationexperts.png\" alt=\"automationexperts\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 4\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/LogoTransAI_RGB_OnWhite.png\" alt=\"LogoTransAI_RGB_OnWhite\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 4\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/FactoryNebula-Logo.png\" alt=\"FactoryNebula-Logo\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 4\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2025\/02\/6620ccb5b99ee03c548e5dfe_xip-logo-black.svg\" alt=\"6620ccb5b99ee03c548e5dfe_xip-logo-black\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Intrusion prevention Met een hoge mate van toegankelijkheid ontstaat het grote gevaar waar de meeste IT-systemen dagelijks mee te maken hebben: het ontbreken van effectieve intrusion prevention tegen cyberaanvallen. Met een hoge mate van toegankelijkheid ontstaat het grote gevaar waar de meeste IT-systemen dagelijks mee te maken hebben: het ontbreken van effectieve intrusion prevention tegen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"class_list":["post-174","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intrusion Prevention | Conquest Automation<\/title>\n<meta name=\"description\" content=\"Bescherm uw industri\u00eble systemen met effectieve intrusion prevention. Voorkom inbraken en cyberaanvallen met Conquest Automation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conquest-automation.nl\/en\/intrusion-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intrusion Prevention | Conquest Automation\" \/>\n<meta property=\"og:description\" content=\"Bescherm uw industri\u00eble systemen met effectieve intrusion prevention. Voorkom inbraken en cyberaanvallen met Conquest Automation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conquest-automation.nl\/en\/intrusion-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Conquest-automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-20T12:53:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"403\" \/>\n\t<meta property=\"og:image:height\" content=\"59\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/intrusion-prevention\\\/\",\"url\":\"https:\\\/\\\/conquest-automation.nl\\\/intrusion-prevention\\\/\",\"name\":\"Intrusion Prevention | Conquest Automation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/intrusion-prevention\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/intrusion-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/conquest-automation.nl\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/shape-1.png\",\"datePublished\":\"2024-11-17T12:38:16+00:00\",\"dateModified\":\"2025-10-20T12:53:25+00:00\",\"description\":\"Bescherm uw industri\u00eble systemen met effectieve intrusion prevention. Voorkom inbraken en cyberaanvallen met Conquest Automation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/intrusion-prevention\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/conquest-automation.nl\\\/intrusion-prevention\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/intrusion-prevention\\\/#primaryimage\",\"url\":\"https:\\\/\\\/conquest-automation.nl\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/shape-1.png\",\"contentUrl\":\"https:\\\/\\\/conquest-automation.nl\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/shape-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/intrusion-prevention\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/conquest-automation.nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intrusion Prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/#website\",\"url\":\"https:\\\/\\\/conquest-automation.nl\\\/\",\"name\":\"Conquest-automation\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/conquest-automation.nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/#organization\",\"name\":\"Conquest-automation\",\"url\":\"https:\\\/\\\/conquest-automation.nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/conquest-automation.nl\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cropped-conquest-logo-klein-site-6.png\",\"contentUrl\":\"https:\\\/\\\/conquest-automation.nl\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cropped-conquest-logo-klein-site-6.png\",\"width\":512,\"height\":512,\"caption\":\"Conquest-automation\"},\"image\":{\"@id\":\"https:\\\/\\\/conquest-automation.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/conquest-automation\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intrusion Prevention | Conquest Automation","description":"Bescherm uw industri\u00eble systemen met effectieve intrusion prevention. Voorkom inbraken en cyberaanvallen met Conquest Automation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conquest-automation.nl\/en\/intrusion-prevention\/","og_locale":"en_GB","og_type":"article","og_title":"Intrusion Prevention | Conquest Automation","og_description":"Bescherm uw industri\u00eble systemen met effectieve intrusion prevention. Voorkom inbraken en cyberaanvallen met Conquest Automation.","og_url":"https:\/\/conquest-automation.nl\/en\/intrusion-prevention\/","og_site_name":"Conquest-automation","article_modified_time":"2025-10-20T12:53:25+00:00","og_image":[{"width":403,"height":59,"url":"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conquest-automation.nl\/intrusion-prevention\/","url":"https:\/\/conquest-automation.nl\/intrusion-prevention\/","name":"Intrusion Prevention | Conquest Automation","isPartOf":{"@id":"https:\/\/conquest-automation.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conquest-automation.nl\/intrusion-prevention\/#primaryimage"},"image":{"@id":"https:\/\/conquest-automation.nl\/intrusion-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-1.png","datePublished":"2024-11-17T12:38:16+00:00","dateModified":"2025-10-20T12:53:25+00:00","description":"Bescherm uw industri\u00eble systemen met effectieve intrusion prevention. Voorkom inbraken en cyberaanvallen met Conquest Automation.","breadcrumb":{"@id":"https:\/\/conquest-automation.nl\/intrusion-prevention\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conquest-automation.nl\/intrusion-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conquest-automation.nl\/intrusion-prevention\/#primaryimage","url":"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-1.png","contentUrl":"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2024\/11\/shape-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/conquest-automation.nl\/intrusion-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conquest-automation.nl\/"},{"@type":"ListItem","position":2,"name":"Intrusion Prevention"}]},{"@type":"WebSite","@id":"https:\/\/conquest-automation.nl\/#website","url":"https:\/\/conquest-automation.nl\/","name":"Conquest-automation","description":"","publisher":{"@id":"https:\/\/conquest-automation.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conquest-automation.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/conquest-automation.nl\/#organization","name":"Conquest-automation","url":"https:\/\/conquest-automation.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conquest-automation.nl\/#\/schema\/logo\/image\/","url":"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2025\/05\/cropped-conquest-logo-klein-site-6.png","contentUrl":"https:\/\/conquest-automation.nl\/wp-content\/uploads\/2025\/05\/cropped-conquest-logo-klein-site-6.png","width":512,"height":512,"caption":"Conquest-automation"},"image":{"@id":"https:\/\/conquest-automation.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conquest-automation\/"]}]}},"_links":{"self":[{"href":"https:\/\/conquest-automation.nl\/en\/wp-json\/wp\/v2\/pages\/174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conquest-automation.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conquest-automation.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conquest-automation.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/conquest-automation.nl\/en\/wp-json\/wp\/v2\/comments?post=174"}],"version-history":[{"count":43,"href":"https:\/\/conquest-automation.nl\/en\/wp-json\/wp\/v2\/pages\/174\/revisions"}],"predecessor-version":[{"id":1869,"href":"https:\/\/conquest-automation.nl\/en\/wp-json\/wp\/v2\/pages\/174\/revisions\/1869"}],"wp:attachment":[{"href":"https:\/\/conquest-automation.nl\/en\/wp-json\/wp\/v2\/media?parent=174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}