{"id":6032,"date":"2023-11-10T04:10:18","date_gmt":"2023-11-10T12:10:18","guid":{"rendered":"https:\/\/apiiro.com\/?page_id=6032"},"modified":"2024-04-24T20:10:45","modified_gmt":"2024-04-25T03:10:45","slug":"software-composition-analysis","status":"publish","type":"page","link":"https:\/\/apiiro.com\/product\/software-composition-analysis\/","title":{"rendered":"Contextual Open Source Security (SCA) | Apiiro"},"content":{"rendered":"\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading is-style-green\" id=\"h-sca\"><strong><strong><strong>SCA<\/strong><\/strong><\/strong><\/h6>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"h-contextual-open-source-security-and-compliance\">Contextual open source security and compliance<\/h1>\n\n\n\n<p>Take a risk-based approach to open source security and compliance with Apiiro\u2019s native software composition analysis (SCA) solution that leverages deep code analysis and runtime context to determine the likelihood and impact of vulnerabilities.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-btn-green-gradient\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/apiiro.com\/schedule-a-demo\">Get a demo<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"781\" src=\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-1024x781.png\" alt=\"\" class=\"wp-image-5849\" srcset=\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-1024x781.png 1024w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-300x229.png 300w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-768x586.png 768w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-1080x824.png 1080w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927.png 1469w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-gray is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading has-text-align-center is-style-green\" id=\"h-why-apiiro\"><strong>WHY APIIRO<\/strong><\/h6>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"h-risk-based-oss-security-for-modern-apps\" id=\"risk-based-oss-security-for-modern-apps\">Risk-based OSS security for modern apps<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Existing SCA solutions can\u2019t keep up with modern, interconnected applications, creating noisy alerts and leaving blind spots. Apiiro\u2019s risk-based approach to open source security and compliance minimizes distractions and provides the context developers need \u2014 when they need it.<\/p>\n\n\n<div class=\"grid grid-cols-1 md:grid-cols-2  gap-[30px] mt-[30px]  lg:grid-cols-3\">\n                        <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-wand.svg' alt='' \/>\n                                                                <h4 class='mb-3'>SCA without the noisy, contextless alerts<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Current SCA tools create a cacophony of alerts and backlogs that waste security teams\u2019 and developers\u2019 time. Apiiro contextualizes open source vulnerabilities to determine whether they\u2019re internet exposed, used in code, and exploitable to cut through the noise.<\/p>\n                    <\/div>\n                                                            <\/div>\n                                    <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-dataexposure.svg' alt='' \/>\n                                                                <h4 class='mb-3'>Extend beyond vulnerabilities<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>Apiiro\u2019s multidimensional approach to open source security goes beyond CVSS score, bringing in multiple risk factors to prevent developers from integrating open source packages that are free of CVEs but still pose potential application risks.<\/p>\n                    <\/div>\n                                                            <\/div>\n                                    <div class=\"relative z-10 card-link overflow-hidden p-[15px] md:p-[30px] rounded-[5px] relative  bg-gray_light_new \">\n                                    <img class=\"h-[30px] w-[30px] mb-[15px]\" src='https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/icon-puzzle.svg' alt='' \/>\n                                                                <h4 class='mb-3'>Integrated depth and breadth of coverage<\/h4>\n                                    <div class='text-sm mb-0 card-content \n                    '><p>With siloed tools that lack context across application layers and the development lifecycle, blind spots are inevitable. Apiiro provides dependency scanning to the leaf node and connects the dots between application and pipeline components to provide unparalleled coverage.<\/p>\n                    <\/div>\n                                                            <\/div>\n                <\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-fc169830 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading has-text-align-center is-style-green\" id=\"h-how-it-works\">HOW IT WORKS<br><\/h6>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"h-bring-context-to-your-sca\" id=\"bring-context-to-your-sca\">Bring context to your SCA<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Put open source security and compliance in the context of your application attack surface to fill previously vulnerable blind spots without slowing down development.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center section-spacer reverse-column is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1468\" height=\"1121\" src=\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11928.png\" alt=\"\" class=\"wp-image-5848\" srcset=\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11928.png 1468w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11928-300x229.png 300w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11928-1024x782.png 1024w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11928-768x586.png 768w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11928-1080x825.png 1080w\" sizes=\"auto, (max-width: 1468px) 100vw, 1468px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-integrate-apiiro-to-your-scm-to-connect-the-dots-across-your-application\" id=\"integrate-apiiro-to-your-scm-to-connect-the-dots-across-your-application\">Integrate Apiiro to your SCM to connect the dots across your application<\/h3>\n\n\n\n<p>Get visibility across all open source vulnerabilities and license compliance issues in direct dependencies, sub-dependencies, and custom-built internal dependencies instantly and with every code change.<\/p>\n\n\n\n<p>By leveraging Apiiro\u2019s Risk Graph, our SCA results are hyper-accurate and prioritized based on real risk.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-implement-version-bump-fixes-without-introducing-breaking-changes\" id=\"implement-version-bump-fixes-without-introducing-breaking-changes\">Implement version bump fixes without introducing breaking changes<\/h3>\n\n\n\n<p>Apiiro ties open source security and compliance risks to their code owners to make it easy to collaborate with developers to address them.<\/p>\n\n\n\n<p>With Apiiro\u2019s Risk Control Plane, you can leverage built-in automated workflows or build your own to determine where and how to enforce open source security and compliance best practices at scale.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1477\" height=\"1121\" src=\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11929.png\" alt=\"\" class=\"wp-image-5847\" srcset=\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11929.png 1477w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11929-300x228.png 300w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11929-1024x777.png 1024w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11929-768x583.png 768w, https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11929-1080x820.png 1080w\" sizes=\"auto, (max-width: 1477px) 100vw, 1477px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-dark-gradient is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center\" id=\"h-take-a-risk-based-approach-to-sca\" id=\"take-a-risk-based-approach-to-sca\">Take a risk-based approach to SCA<\/h3>\n\n\n\n<p>Experience the depth and breadth of Apiiro\u2019s SCA for yourself or learn more about our ASPM platform.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-btn-secondary-dark\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/apiiro.com\/schedule-a-demo\">Get a demo<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-btn-black-outline is-style-btn-tertiary-dark\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/apiiro.com\/product\/aspm\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>SCA Contextual open source security and compliance Take a risk-based approach to open source security and compliance with Apiiro\u2019s native software composition analysis (SCA) solution that leverages deep code analysis and runtime context to determine the likelihood and impact of vulnerabilities. WHY APIIRO Risk-based OSS security for modern apps Existing SCA solutions can\u2019t keep up [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":6050,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"coauthors":[80],"class_list":["post-6032","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Contextual Software Composition Analysis (SCA) | Apiiro<\/title>\n<meta name=\"description\" content=\"Take a contextual approach to open source security and compliance with graph-based application inventorying and risk-based automated guardrails.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/apiiro.com\/product\/software-composition-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Contextual Open Source Security (SCA) | Apiiro\" \/>\n<meta property=\"og:description\" content=\"Take a contextual approach to open source security and compliance with graph-based application inventorying and risk-based automated guardrails.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/apiiro.com\/product\/software-composition-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Apiiro | Deep Application Security Posture Management (ASPM)\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-25T03:10:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-1024x781.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@apiirosecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/apiiro.com\/product\/software-composition-analysis\/\",\"url\":\"https:\/\/apiiro.com\/product\/software-composition-analysis\/\",\"name\":\"Contextual Software Composition Analysis (SCA) | Apiiro\",\"isPartOf\":{\"@id\":\"https:\/\/apiiro.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/apiiro.com\/product\/software-composition-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/apiiro.com\/product\/software-composition-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-1024x781.png\",\"datePublished\":\"2023-11-10T12:10:18+00:00\",\"dateModified\":\"2024-04-25T03:10:45+00:00\",\"description\":\"Take a contextual approach to open source security and compliance with graph-based application inventorying and risk-based automated guardrails.\",\"breadcrumb\":{\"@id\":\"https:\/\/apiiro.com\/product\/software-composition-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/apiiro.com\/product\/software-composition-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/apiiro.com\/product\/software-composition-analysis\/#primaryimage\",\"url\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927.png\",\"contentUrl\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927.png\",\"width\":1469,\"height\":1121},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/apiiro.com\/product\/software-composition-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/apiiro.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Product\",\"item\":\"https:\/\/apiiro.com\/product\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Contextual Open Source Security (SCA) | Apiiro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/apiiro.com\/#website\",\"url\":\"https:\/\/apiiro.com\/\",\"name\":\"Apiiro | Secure your development and delivery to the cloud\",\"description\":\"Secure your development and delivery to the cloud.\",\"publisher\":{\"@id\":\"https:\/\/apiiro.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/apiiro.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/apiiro.com\/#organization\",\"name\":\"Apiiro\",\"url\":\"https:\/\/apiiro.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/apiiro.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/Apiiro-Logo-dark.png\",\"contentUrl\":\"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/Apiiro-Logo-dark.png\",\"width\":276,\"height\":80,\"caption\":\"Apiiro\"},\"image\":{\"@id\":\"https:\/\/apiiro.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/apiirosecurity\",\"https:\/\/www.linkedin.com\/company\/apiiro\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Contextual Software Composition Analysis (SCA) | Apiiro","description":"Take a contextual approach to open source security and compliance with graph-based application inventorying and risk-based automated guardrails.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/apiiro.com\/product\/software-composition-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Contextual Open Source Security (SCA) | Apiiro","og_description":"Take a contextual approach to open source security and compliance with graph-based application inventorying and risk-based automated guardrails.","og_url":"https:\/\/apiiro.com\/product\/software-composition-analysis\/","og_site_name":"Apiiro | Deep Application Security Posture Management (ASPM)","article_modified_time":"2024-04-25T03:10:45+00:00","og_image":[{"url":"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-1024x781.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@apiirosecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/apiiro.com\/product\/software-composition-analysis\/","url":"https:\/\/apiiro.com\/product\/software-composition-analysis\/","name":"Contextual Software Composition Analysis (SCA) | Apiiro","isPartOf":{"@id":"https:\/\/apiiro.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/apiiro.com\/product\/software-composition-analysis\/#primaryimage"},"image":{"@id":"https:\/\/apiiro.com\/product\/software-composition-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927-1024x781.png","datePublished":"2023-11-10T12:10:18+00:00","dateModified":"2024-04-25T03:10:45+00:00","description":"Take a contextual approach to open source security and compliance with graph-based application inventorying and risk-based automated guardrails.","breadcrumb":{"@id":"https:\/\/apiiro.com\/product\/software-composition-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/apiiro.com\/product\/software-composition-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apiiro.com\/product\/software-composition-analysis\/#primaryimage","url":"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927.png","contentUrl":"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/10\/Group-11927.png","width":1469,"height":1121},{"@type":"BreadcrumbList","@id":"https:\/\/apiiro.com\/product\/software-composition-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/apiiro.com\/"},{"@type":"ListItem","position":2,"name":"Product","item":"https:\/\/apiiro.com\/product\/"},{"@type":"ListItem","position":3,"name":"Contextual Open Source Security (SCA) | Apiiro"}]},{"@type":"WebSite","@id":"https:\/\/apiiro.com\/#website","url":"https:\/\/apiiro.com\/","name":"Apiiro | Secure your development and delivery to the cloud","description":"Secure your development and delivery to the cloud.","publisher":{"@id":"https:\/\/apiiro.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/apiiro.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/apiiro.com\/#organization","name":"Apiiro","url":"https:\/\/apiiro.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apiiro.com\/#\/schema\/logo\/image\/","url":"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/Apiiro-Logo-dark.png","contentUrl":"https:\/\/apiiro.com\/wp-content\/uploads\/2023\/05\/Apiiro-Logo-dark.png","width":276,"height":80,"caption":"Apiiro"},"image":{"@id":"https:\/\/apiiro.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/apiirosecurity","https:\/\/www.linkedin.com\/company\/apiiro"]}]}},"_links":{"self":[{"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages\/6032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/comments?post=6032"}],"version-history":[{"count":9,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages\/6032\/revisions"}],"predecessor-version":[{"id":8457,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages\/6032\/revisions\/8457"}],"up":[{"embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/pages\/6050"}],"wp:attachment":[{"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/media?parent=6032"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/apiiro.com\/wp-json\/wp\/v2\/coauthors?post=6032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}