{"id":6140,"date":"2025-07-01T17:04:22","date_gmt":"2025-07-01T17:04:22","guid":{"rendered":"https:\/\/edge2systems.com\/newwebsite\/?page_id=6140"},"modified":"2026-02-09T07:42:25","modified_gmt":"2026-02-09T07:42:25","slug":"information-security","status":"publish","type":"page","link":"http:\/\/progressof.work\/edge2systemnew\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1751893133460{margin-top: 100px !important;margin-bottom: 100px !important;}&#8221;][vc_column]<div class=\"qodef-section-title-holder  qodef-st-standard qodef-st-title-left qodef-st-normal-space \" style=\"text-align: center\">\n\t<div class=\"qodef-st-inner\">\n        \t\t\t\t\t<h3 class=\"qodef-st-title\" >\n\t\t\t\tAdvanced Information Security Standards For Next-Gen Infrastructure\t\t\t<\/h3>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text css=&#8221;.vc_custom_1752833688763{padding-top: 10px !important;padding-right: 10% !important;padding-left: 10% !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">In today&#8217;s interconnected world, protecting sensitive information requires more than conventional cybersecurity measures. Our information security solutions are built with a security-first approach, implementing hardware-enforced boundaries and multi-layered protection mechanisms that safeguard critical systems against even the most sophisticated attacks. Edge 2 Systems specializes in creating secure environments for organizations where data integrity and confidentiality are paramount. Our solutions enable secure information exchange between networks with different security classifications while maintaining strict isolation to prevent unauthorized data movement. Our comprehensive approach encompasses hardware-based security measures, advanced encryption, secure data transfer mechanisms, and protection for air-gapped networks, providing defense-in-depth for your most valuable information assets.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1751391671675{padding-top: 100px !important;padding-bottom: 100px !important;background-color: #000000 !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-5 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item     \"  data-item-class=\"qodef-eh-custom-2640\" data-1367-1600=\"0 0 0 22%\" data-1025-1366=\"0 0 0 22%\" data-769-1024=\"60px 14% 0 13%\" data-681-768=\"60px 12% 0 11%\" data-680=\"60px 10% 0 10%\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-2640\" style=\"padding: 50px 0 0 45%\">\n\t\t\t<div class=\"qodef-section-title-holder  qodef-st-standard qodef-st-title-left qodef-st-normal-space \" >\n\t<div class=\"qodef-st-inner\">\n        \t\t\t\t\t<h2 class=\"qodef-st-title\" style=\"color: #BF202F\">\n\t\t\t\tCARBON\t\t\t<\/h2>\n\t\t\t\t\t\t\t<p class=\"qodef-st-text\" style=\"color: #FFFFFF;font-size: 28px;line-height: 32px;font-weight: 500\">\n\t\t\t\tCompact Analog Re-encoding Bridge for Internet\t\t\t<\/p>\n\t\t\t<\/div>\n<\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item     \"  data-item-class=\"qodef-eh-custom-7758\" data-1367-1600=\"0 0 0 12%\" data-1025-1366=\"0 0 0 12%\" data-769-1024=\"0 9%\" data-681-768=\"0 7%\" data-680=\"0 6%\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-7758\" style=\"padding: 50px 10% 0 10%\">\n\t\t\t[vc_column_text css=&#8221;&#8221;]<span style=\"color: #ffffff;\">CARBON is a pathbreaking information security device that simplifies secure access to multiple networks, enabling users to seamlessly bridge the air gap without compromising the integrity of sensitive systems. This versatile solution empowers organizations to maintain the highest levels of data protection while improving operational efficiency.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">CARBON employs a patent-pending analog bridging mechanism that provides limited and secure communication between two isolated devices. This ground-breaking approach enables security-conscious organizations to improve user efficiency without compromising information security.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">The system functions as an ultra-secure dual-device configuration.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; min_height=&#8221;500px&#8221; css=&#8221;.vc_custom_1751452795435{padding-top: 0px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1751452814871{padding-top: 0px !important;}&#8221;]<div class=\"qodef-banner-holder  qodef-visible-on-default qodef-banner-info-default\">\n    <div class=\"qodef-banner-image\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"750\" src=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Carbon.2.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Carbon.2.jpg 1920w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Carbon.2-300x117.jpg 300w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Carbon.2-1024x400.jpg 1024w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Carbon.2-768x300.jpg 768w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Carbon.2-1536x600.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/>    <\/div>\n    <div class=\"qodef-banner-text-holder\" style=\"background-color: #00000000\">\n\t    <div class=\"qodef-banner-text-outer\">\n\t\t    <div class=\"qodef-banner-text-inner\">\n\t\t        \t\t        \t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<\/div>[\/vc_column][\/vc_row][vc_row row_content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1751452969191{padding-top: 112px !important;padding-bottom: 10px !important;}&#8221; simple_background_color=&#8221;#000000&#8243;][vc_column offset=&#8221;vc_col-lg-4 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item     \"  data-item-class=\"qodef-eh-custom-8461\" data-769-1024=\"0 18% 0 0\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-8461\" >\n\t\t\t<div class=\"qodef-iwt clearfix  qodef-iwt-icon-left qodef-iwt-icon-large qodef-iwt-boxed qodef-iwt-transparent-hover\">\n\t\t<div class=\"qodef-iwt-icon\">\n\t\t\t\t\t<a itemprop=\"url\" href=\"#\" target=\"_self\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"550\" src=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/01.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/01.png 550w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/01-300x300.png 300w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/01-150x150.png 150w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t<div class=\"qodef-iwt-content\" >\n\t\t\t\t\t<h5 class=\"qodef-iwt-title\" style=\"color: #FFFFFF\" >\n\t\t\t\t\t\t\t\t\t<a itemprop=\"url\" href=\"#\" target=\"_self\">\n\t\t\t\t\t\t\t\t<span class=\"qodef-iwt-title-text\">A secure computer fully compliant with organizational security policies<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t        \t<\/div>\n<\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-lg-4 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item     \"  data-item-class=\"qodef-eh-custom-1048\" data-769-1024=\"0 18% 0 0\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-1048\" >\n\t\t\t<div class=\"qodef-iwt clearfix  qodef-iwt-icon-left qodef-iwt-icon-large qodef-iwt-boxed qodef-iwt-transparent-hover\">\n\t\t<div class=\"qodef-iwt-icon\">\n\t\t\t\t\t<a itemprop=\"url\" href=\"#\" target=\"_self\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"550\" src=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/02.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/02.png 550w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/02-300x300.png 300w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/02-150x150.png 150w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t<div class=\"qodef-iwt-content\" >\n\t\t\t\t\t<h5 class=\"qodef-iwt-title\" style=\"color: #FFFFFF\" >\n\t\t\t\t\t\t\t\t\t<a itemprop=\"url\" href=\"#\" target=\"_self\">\n\t\t\t\t\t\t\t\t<span class=\"qodef-iwt-title-text\">A separate FPGA-driven Internet access device with strict isolation properties<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t        \t<\/div>\n<\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-lg-4 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item     \"  data-item-class=\"qodef-eh-custom-3004\" data-769-1024=\"0 18% 0 0\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-3004\" >\n\t\t\t<div class=\"qodef-iwt clearfix  qodef-iwt-icon-left qodef-iwt-icon-large qodef-iwt-boxed qodef-iwt-transparent-hover\">\n\t\t<div class=\"qodef-iwt-icon\">\n\t\t\t\t\t<a itemprop=\"url\" href=\"#\" target=\"_self\">\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"550\" src=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/03.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/03.png 550w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/03-300x300.png 300w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2026\/02\/03-150x150.png 150w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t<div class=\"qodef-iwt-content\" >\n\t\t\t\t\t<h5 class=\"qodef-iwt-title\" style=\"color: #FFFFFF\" >\n\t\t\t\t\t\t\t\t\t<a itemprop=\"url\" href=\"#\" target=\"_self\">\n\t\t\t\t\t\t\t\t<span class=\"qodef-iwt-title-text\">Patent-pending Analog Bridging mechanism provides limited and secure communication<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t        \t<\/div>\n<\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1754909200280{padding-top: 100px !important;padding-bottom: 50px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item     \"  data-item-class=\"qodef-eh-custom-8132\" data-1367-1600=\"0 0 0 12%\" data-1025-1366=\"0 0 0 12%\" data-769-1024=\"0 9%\" data-681-768=\"0 7%\" data-680=\"0 7%\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-8132\" style=\"padding: 50px 0 0 30%\">\n\t\t\t<div class=\"qodef-single-image-holder   \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"988\" height=\"800\" src=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Data-Diodes.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Data-Diodes.jpg 988w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Data-Diodes-300x243.jpg 300w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Data-Diodes-768x622.jpg 768w\" sizes=\"auto, (max-width: 988px) 100vw, 988px\" \/>                        <\/div>\n<\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item     \"  data-item-class=\"qodef-eh-custom-6148\" data-1367-1600=\"0 22% 0 0\" data-1025-1366=\"0 22% 0 0\" data-769-1024=\"60px 14% 0 13%\" data-681-768=\"60px 12% 0 11%\" data-680=\"60px 10% 0 10%\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-6148\" style=\"padding: 50px 30% 0 5%\">\n\t\t\t<div class=\"qodef-section-title-holder  qodef-st-standard qodef-st-title-left qodef-st-normal-space \" >\n\t<div class=\"qodef-st-inner\">\n        \t\t\t\t\t<h3 class=\"qodef-st-title\" >\n\t\t\t\tDATA DIODES\t\t\t<\/h3>\n\t\t\t\t\t\t\t<p class=\"qodef-st-text\" >\n\t\t\t\tData Diodes provide hardware-enforced, unidirectional data transfer with multilayered security features, creating an impenetrable, tamper-proof barrier that protects sensitive networks while enabling secure data exchange. Their specialized hardware design physically blocks reverse data flow, ensuring absolute protection against external infiltration. This reliable and resilient approach makes Data Diodes essential for safeguarding critical information flows in defense, industrial, and infrastructure environments where network integrity is paramount.\t\t\t<\/p>\n\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;36px&#8221;]<a itemprop=\"url\" href=\"http:\/\/progressof.work\/edge2systemnew\/contact-us\/\" target=\"_self\" style=\"color: #BF202F;background-color: #FFFFFF;border-color: #BF202F\" class=\"qodef-btn qodef-btn-medium qodef-btn-solid qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-color=\"#FFFFFF\" data-hover-bg-color=\"#BF202F\" data-hover-border-color=\"#BF202F\" >\n    <span class=\"qodef-btn-text\">Learn More<\/span>\n    <\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row gap=&#8221;15&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1754909207761{padding-top: 50px !important;padding-bottom: 100px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item     \"  data-item-class=\"qodef-eh-custom-8514\" data-1367-1600=\"0 0 0 12%\" data-1025-1366=\"0 0 0 12%\" data-769-1024=\"0 9%\" data-681-768=\"0 7%\" data-680=\"0 7%\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-8514\" style=\"padding: 50px 0 0 30%\">\n\t\t\t<div class=\"qodef-section-title-holder  qodef-st-standard qodef-st-title-left qodef-st-normal-space \" >\n\t<div class=\"qodef-st-inner\">\n        \t\t\t\t\t<h3 class=\"qodef-st-title\" >\n\t\t\t\tSUSTAIN\t\t\t<\/h3>\n\t\t\t\t\t\t\t<p class=\"qodef-st-text\" >\n\t\t\t\tSUSTAIN is an ultra-secure sanitization tool engineered to safely import relevant information into highly sensitive, air-gapped networks while defending against sophisticated cyber threats. Specifically designed to neutralize self-replicating worms, trojans, and other malware capable of crossing air gaps, SUSTAIN ensures only verified, sanitized data enters isolated systems. By preserving data integrity and operational security, SUSTAIN is critical for organizations that require uncompromising protection of their most sensitive assets and workflows.\t\t\t<\/p>\n\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;36px&#8221;]<a itemprop=\"url\" href=\"http:\/\/progressof.work\/edge2systemnew\/contact-us\/\" target=\"_self\" style=\"color: #BF202F;background-color: #FFFFFF;border-color: #BF202F\" class=\"qodef-btn qodef-btn-medium qodef-btn-solid qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-color=\"#FFFFFF\" data-hover-bg-color=\"#BF202F\" data-hover-border-color=\"#BF202F\" >\n    <span class=\"qodef-btn-text\">Learn More<\/span>\n    <\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column offset=&#8221;vc_col-lg-6 vc_col-md-12&#8243;]<div class=\"qodef-elements-holder   qodef-one-column   qodef-responsive-mode-768  \" ><div class=\"qodef-eh-item   qodef-horizontal-alignment-right  \"  data-item-class=\"qodef-eh-custom-3214\" data-1367-1600=\"0 22% 0 0\" data-1025-1366=\"0 22% 0 0\" data-769-1024=\"60px 14% 0 13%\" data-681-768=\"60px 12% 0 11%\" data-680=\"60px 10% 0 10%\">\n\t<div class=\"qodef-eh-item-inner\">\n        \t\t<div class=\"qodef-eh-item-content qodef-eh-custom-3214\" style=\"padding: 50px 30% 0 0\">\n\t\t\t<div class=\"qodef-single-image-holder   \">\n    <div class=\"qodef-si-inner\" >\n                                    <img loading=\"lazy\" decoding=\"async\" width=\"1976\" height=\"1600\" src=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Sustain.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Sustain.jpg 1976w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Sustain-300x243.jpg 300w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Sustain-1024x829.jpg 1024w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Sustain-768x622.jpg 768w, http:\/\/progressof.work\/edge2systemnew\/wp-content\/uploads\/2025\/07\/Sustain-1536x1244.jpg 1536w\" sizes=\"auto, (max-width: 1976px) 100vw, 1976px\" \/>                        <\/div>\n<\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1751893133460{margin-top: 100px !important;margin-bottom: 100px !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1752833688763{padding-top: 10px !important;padding-right: 10% !important;padding-left: 10% !important;}&#8221;] In today&#8217;s interconnected world, protecting sensitive information requires more than conventional cybersecurity measures. Our information security solutions are built with a security-first approach, implementing hardware-enforced boundaries and multi-layered protection mechanisms that safeguard critical systems against even the most sophisticated attacks. Edge 2 Systems specializes in creating [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"footnotes":""},"class_list":["post-6140","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/progressof.work\/edge2systemnew\/wp-json\/wp\/v2\/pages\/6140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/progressof.work\/edge2systemnew\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/progressof.work\/edge2systemnew\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/progressof.work\/edge2systemnew\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/progressof.work\/edge2systemnew\/wp-json\/wp\/v2\/comments?post=6140"}],"version-history":[{"count":65,"href":"http:\/\/progressof.work\/edge2systemnew\/wp-json\/wp\/v2\/pages\/6140\/revisions"}],"predecessor-version":[{"id":7449,"href":"http:\/\/progressof.work\/edge2systemnew\/wp-json\/wp\/v2\/pages\/6140\/revisions\/7449"}],"wp:attachment":[{"href":"http:\/\/progressof.work\/edge2systemnew\/wp-json\/wp\/v2\/media?parent=6140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}