{"id":91141378,"date":"2019-06-27T10:45:18","date_gmt":"2019-06-27T08:45:18","guid":{"rendered":"https:\/\/www.aktantis.com\/ecosystem\/key-technologies\/security-digital-identities\/"},"modified":"2024-12-16T17:18:43","modified_gmt":"2024-12-16T16:18:43","slug":"digital-security","status":"publish","type":"page","link":"https:\/\/www.aktantis.com\/en\/competitiveness-cluster\/key-technologies\/digital-security\/","title":{"rendered":"Digital Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1734365921536{padding-bottom: 1.1em !important;}&#8221; el_class=&#8221;centered&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Cyber \/ Digital Security<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1519995869463{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_single_image image=&#8221;91173731&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1731341684759{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;img-full-width&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1731678467801{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-color: #F3F3F9 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1731341711251{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-color: #F3F3F9 !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243; el_class=&#8221;custom_vc_col-sm-12&#8243;][vc_column_text css=&#8221;.vc_custom_1561661290212{padding-top: 16% !important;padding-right: 16% !important;padding-bottom: 16% !important;padding-left: 16% !important;}&#8221; el_class=&#8221;block-text&#8221;]<\/p>\n<h3>The Security is at the heart of the challenges of the digital economy<\/h3>\n<p>&nbsp;<\/p>\n<p>Digital security is necessary to build trust in the economic world and for the citizen, especially for; identity management; access management; biometrics; transactions; digital communications; IoT objects; connected vehicles; industrial processes and logistics; transports; and networks for smart cities, etc. Indeed, digitalization of the economy leads to more vulnerability due to more sophisticated and large scale attacks.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1731341880464{border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-image: url(https:\/\/www.aktantis.com\/wp-content\/uploads\/2024\/11\/aktantis-technologies-cyber.jpg?id=91173731) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column][\/vc_row][vc_section full_width=&#8221;stretch_row_content&#8221; css=&#8221;.vc_custom_1731678475357{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-color: #F3F3F9 !important;}&#8221;][vc_row][vc_column css=&#8221;.vc_custom_1519995869463{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_single_image image=&#8221;91133509&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1519997422367{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;img-full-width&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1516893420469{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1561661376026{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-image: url(https:\/\/www.aktantis.com\/wp-content\/uploads\/2018\/01\/scs-technologies-securite-2.jpg?id=1178) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1731341721761{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-color: #F3F3F9 !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243; el_class=&#8221;custom_vc_col-sm-12&#8243;][vc_column_text css=&#8221;.vc_custom_1561661312103{padding-top: 16% !important;padding-right: 16% !important;padding-bottom: 16% !important;padding-left: 16% !important;}&#8221; el_class=&#8221;block-text&#8221;]All these technologies guarantee a trustful Internet of Things.[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_row css=&#8221;.vc_custom_1518448397178{margin-top: 70px !important;margin-bottom: 110px !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1518055837645{margin-top: 0px !important;margin-bottom: 0px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1518055828724{margin-top: 0px !important;margin-bottom: 0px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1518879926520{margin-top: 80px !important;margin-bottom: 70px !important;}&#8221;]<\/p>\n<h3 style=\"text-align: center;\">Technological major challenges<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-check&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xs&#8221; custom_background_color=&#8221;#002f41&#8243; el_class=&#8221;float-left&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #4caac1;\">Light cryptography algorithm implementation, countermeasures and low energy impact protection<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-check&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xs&#8221; custom_background_color=&#8221;#002f41&#8243; el_class=&#8221;float-left&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #4caac1;\">Post-quantum cryptography<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-check&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xs&#8221; custom_background_color=&#8221;#002f41&#8243; el_class=&#8221;float-left&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #4caac1;\">Customizable and adaptable security architecture development and concepts\u00a0<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-check&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xs&#8221; custom_background_color=&#8221;#002f41&#8243; el_class=&#8221;float-left&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #4caac1;\">IoT objects customization, key distribution, connected object lifecycle, secured update<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-check&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xs&#8221; custom_background_color=&#8221;#002f41&#8243; el_class=&#8221;float-left&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #4caac1;\">Security and trust for embedded AI based systems<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-check&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xs&#8221; custom_background_color=&#8221;#002f41&#8243; el_class=&#8221;float-left&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #4caac1;\">Integrity demonstration programs for HW, FW and SW end product components<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; css=&#8221;.vc_custom_1731678526591{margin-bottom: 70px !important;padding-top: 30px !important;padding-bottom: 30px !important;background-color: #F3F3F9 !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_row_inner][vc_column_inner][vc_single_image image=&#8221;91173943&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>A WORKING GROUP DEDICATED TO DIGITAL SECURITY<\/strong><\/h3>\n<p>AKTANTIS has set up a dedicated working group to encourage innovations and R&amp;D projects around Digital Security.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1518449060153{margin-bottom: 110px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1731678618378{padding-top: 4em !important;padding-right: 4em !important;padding-bottom: 4em !important;padding-left: 4em !important;background-color: #7BAFDF !important;}&#8221;]<span style=\"color: #ffffff; font-size: 28px;\"><strong>KEY FIGURES<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff; font-size: 18px;\">A network of 50 partners <\/span><\/p>\n<hr style=\"background-color: white;\" \/>\n<p><span style=\"color: #ffffff; font-size: 18px;\">60% of startups and SMEs<\/span><\/p>\n<hr style=\"background-color: white;\" \/>\n<p><span style=\"color: #ffffff; font-size: 18px;\">316 million \u20ac R&amp;D invested in 60 R&amp;D projects funded up to 108 million \u20ac<\/span><\/p>\n<hr style=\"background-color: white;\" \/>\n<p><span style=\"color: #ffffff; font-size: 18px;\">19% turnover annual average growth over the 5 past years<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\n<h3><strong>Technologies for high-growth markets<\/strong><\/h3>\n<p>[\/vc_column_text][vc_column_text]To access markets and customers, AKTANTIS has since 2013 launched &#8220;<strong>Market Meetings<\/strong>&#8221; with technology providers and major contractors for networking, for project launch or Proof Of Concepts.<\/p>\n<p><strong>These target markets are: <\/strong><\/p>\n<ul>\n<li><strong>Health<\/strong><\/li>\n<li><strong>Smart Cities<\/strong><\/li>\n<li><strong>Industry 4.0<\/strong><\/li>\n<li><strong>Transport and Mobility<\/strong><\/li>\n<li><strong>Smart Vehicle<\/strong><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<a class=\"btn-return\" href=\"https:\/\/www.aktantis.com\/en\/competitiveness-cluster\/key-technologies\/\">&lt; Back<\/a>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1734365921536{padding-bottom: 1.1em !important;}&#8221; el_class=&#8221;centered&#8221;]<br \/>\nCyber \/ Digital Security<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1519995869463{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":91132222,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-91141378","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security | AKTANTIS Cluster Leader in Digital Security<\/title>\n<meta name=\"description\" content=\"AKTANTIS is the leading cluster in Europe for Cybersecurity and Digital Security: digital ID, Security of IoT - and Big Data Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security | AKTANTIS Cluster Leader in Digital Security\" \/>\n<meta property=\"og:description\" content=\"AKTANTIS is the leading cluster in Europe for Cybersecurity and Digital Security: digital ID, Security of IoT - and Big Data Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"AKTANTIS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PoleSCS\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-16T16:18:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Pole_SCS\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/\",\"url\":\"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/\",\"name\":\"Cyber Security | AKTANTIS Cluster Leader in Digital Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.aktantis.com\/#website\"},\"datePublished\":\"2019-06-27T08:45:18+00:00\",\"dateModified\":\"2024-12-16T16:18:43+00:00\",\"description\":\"AKTANTIS is the leading cluster in Europe for Cybersecurity and Digital Security: digital ID, Security of IoT - and Big Data Security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.aktantis.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AKTANTIS\",\"item\":\"https:\/\/www.aktantis.com\/en\/competitiveness-cluster\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Key Technologies\",\"item\":\"https:\/\/www.aktantis.com\/en\/competitiveness-cluster\/key-technologies\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Digital Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aktantis.com\/#website\",\"url\":\"https:\/\/www.aktantis.com\/\",\"name\":\"AKTANTIS\",\"description\":\"1er \u00e9cosyst\u00e8me europ\u00e9en\",\"publisher\":{\"@id\":\"https:\/\/www.aktantis.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aktantis.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aktantis.com\/#organization\",\"name\":\"Aktantis\",\"url\":\"https:\/\/www.aktantis.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aktantis.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aktantis.com\/wp-content\/uploads\/2018\/03\/cropped-logo_scs.png\",\"contentUrl\":\"https:\/\/www.aktantis.com\/wp-content\/uploads\/2018\/03\/cropped-logo_scs.png\",\"width\":720,\"height\":250,\"caption\":\"Aktantis\"},\"image\":{\"@id\":\"https:\/\/www.aktantis.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PoleSCS\/\",\"https:\/\/x.com\/Pole_SCS\",\"https:\/\/www.linkedin.com\/company\/pole-scs\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security | AKTANTIS Cluster Leader in Digital Security","description":"AKTANTIS is the leading cluster in Europe for Cybersecurity and Digital Security: digital ID, Security of IoT - and Big Data Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security | AKTANTIS Cluster Leader in Digital Security","og_description":"AKTANTIS is the leading cluster in Europe for Cybersecurity and Digital Security: digital ID, Security of IoT - and Big Data Security.","og_url":"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/","og_site_name":"AKTANTIS","article_publisher":"https:\/\/www.facebook.com\/PoleSCS\/","article_modified_time":"2024-12-16T16:18:43+00:00","twitter_card":"summary_large_image","twitter_site":"@Pole_SCS","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/","url":"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/","name":"Cyber Security | AKTANTIS Cluster Leader in Digital Security","isPartOf":{"@id":"https:\/\/www.aktantis.com\/#website"},"datePublished":"2019-06-27T08:45:18+00:00","dateModified":"2024-12-16T16:18:43+00:00","description":"AKTANTIS is the leading cluster in Europe for Cybersecurity and Digital Security: digital ID, Security of IoT - and Big Data Security.","breadcrumb":{"@id":"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aktantis.com\/pole-de-competitivite\/technologies-cles\/securite-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.aktantis.com\/en\/"},{"@type":"ListItem","position":2,"name":"AKTANTIS","item":"https:\/\/www.aktantis.com\/en\/competitiveness-cluster\/"},{"@type":"ListItem","position":3,"name":"Key Technologies","item":"https:\/\/www.aktantis.com\/en\/competitiveness-cluster\/key-technologies\/"},{"@type":"ListItem","position":4,"name":"Digital Security"}]},{"@type":"WebSite","@id":"https:\/\/www.aktantis.com\/#website","url":"https:\/\/www.aktantis.com\/","name":"AKTANTIS","description":"1er \u00e9cosyst\u00e8me europ\u00e9en","publisher":{"@id":"https:\/\/www.aktantis.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aktantis.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aktantis.com\/#organization","name":"Aktantis","url":"https:\/\/www.aktantis.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aktantis.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.aktantis.com\/wp-content\/uploads\/2018\/03\/cropped-logo_scs.png","contentUrl":"https:\/\/www.aktantis.com\/wp-content\/uploads\/2018\/03\/cropped-logo_scs.png","width":720,"height":250,"caption":"Aktantis"},"image":{"@id":"https:\/\/www.aktantis.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PoleSCS\/","https:\/\/x.com\/Pole_SCS","https:\/\/www.linkedin.com\/company\/pole-scs\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/pages\/91141378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/comments?post=91141378"}],"version-history":[{"count":10,"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/pages\/91141378\/revisions"}],"predecessor-version":[{"id":91175665,"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/pages\/91141378\/revisions\/91175665"}],"up":[{"embeddable":true,"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/pages\/91132222"}],"wp:attachment":[{"href":"https:\/\/www.aktantis.com\/en\/wp-json\/wp\/v2\/media?parent=91141378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}