{"id":159,"date":"2024-03-02T11:11:32","date_gmt":"2024-03-02T11:11:32","guid":{"rendered":"http:\/\/localhost\/wp_kaltech\/?page_id=159"},"modified":"2024-05-07T06:31:37","modified_gmt":"2024-05-07T06:31:37","slug":"cyber-security-solutions","status":"publish","type":"page","link":"https:\/\/kaltech.web.id\/index.php\/cyber-security-solutions\/","title":{"rendered":"Cyber Security Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"159\" class=\"elementor elementor-159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9130d6b elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"9130d6b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-705d1d0b\" data-id=\"705d1d0b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4523d85b elementor-widget elementor-widget-heading\" data-id=\"4523d85b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 18-04-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security <br>Solutions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5cd3f72e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5cd3f72e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3bdcf9e2\" data-id=\"3bdcf9e2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f8fc439 elementor-widget elementor-widget-heading\" data-id=\"3f8fc439\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect Your Digital Assets with Robust Cyber Security Solutions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45dd0a2c elementor-widget elementor-widget-text-editor\" data-id=\"45dd0a2c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 18-04-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>At KALTECH, we understand the <strong>importance<\/strong> of safeguarding your <strong>digital assets<\/strong> against <strong>cyber threats.<\/strong> Our <strong>comprehensive cyber security solutions<\/strong> are designed to protect your organization from <strong>cyber attacks, data breaches,<\/strong> and other <strong>security risks.<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-619edede elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"619edede\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7bcf2381 elementor-invisible\" data-id=\"7bcf2381\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b20967c elementor-widget elementor-widget-heading\" data-id=\"3b20967c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Features<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bb31c73 wpr-feature-list-left wpr-feature-list-square elementor-widget elementor-widget-wpr-feature-list\" data-id=\"7bb31c73\" data-element_type=\"widget\" data-widget_type=\"wpr-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"wpr-feature-list-wrap\"><ul class=\"wpr-feature-list\"><li class=\"wpr-feature-list-item elementor-repeater-item-c7e72ad\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-double\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M505 174.8l-39.6-39.6c-9.4-9.4-24.6-9.4-33.9 0L192 374.7 80.6 263.2c-9.4-9.4-24.6-9.4-33.9 0L7 302.9c-9.4 9.4-9.4 24.6 0 34L175 505c9.4 9.4 24.6 9.4 33.9 0l296-296.2c9.4-9.5 9.4-24.7.1-34zm-324.3 106c6.2 6.3 16.4 6.3 22.6 0l208-208.2c6.2-6.3 6.2-16.4 0-22.6L366.1 4.7c-6.2-6.3-16.4-6.3-22.6 0L192 156.2l-55.4-55.5c-6.2-6.3-16.4-6.3-22.6 0L68.7 146c-6.2 6.3-6.2 16.4 0 22.6l112 112.2z\"><\/path><\/svg><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h2 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" target=\"_blank\" rel=\"nofollow\">Vulnerability Assessment<\/a><\/h2><p class=\"wpr-feature-list-description\">Conduct <b>thorough assessments<\/b> to identify potential <b>vulnerabilities<\/b> in your <b>IT infrastructure<\/b> and <b>applications.<\/b><\/p><\/div><\/li><li class=\"wpr-feature-list-item elementor-repeater-item-1d535be\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-wrench\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M507.73 109.1c-2.24-9.03-13.54-12.09-20.12-5.51l-74.36 74.36-67.88-11.31-11.31-67.88 74.36-74.36c6.62-6.62 3.43-17.9-5.66-20.16-47.38-11.74-99.55.91-136.58 37.93-39.64 39.64-50.55 97.1-34.05 147.2L18.74 402.76c-24.99 24.99-24.99 65.51 0 90.5 24.99 24.99 65.51 24.99 90.5 0l213.21-213.21c50.12 16.71 107.47 5.68 147.37-34.22 37.07-37.07 49.7-89.32 37.91-136.73zM64 472c-13.25 0-24-10.75-24-24 0-13.26 10.75-24 24-24s24 10.74 24 24c0 13.25-10.75 24-24 24z\"><\/path><\/svg><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h2 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" target=\"_blank\" rel=\"nofollow\">Security Architecture Design<\/a><\/h2><p class=\"wpr-feature-list-description\">Design and implement <b>robust security architectures<\/b> tailored to your organization's <b>specific needs<\/b> and <b>requirements.<\/b><\/p><\/div><\/li><li class=\"wpr-feature-list-item elementor-repeater-item-f664ce5\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"800px\" height=\"800px\" viewBox=\"0 0 48 48\"><title>computer-setting<\/title><g id=\"Layer_2\" data-name=\"Layer 2\"><g id=\"invisible_box\" data-name=\"invisible box\"><rect width=\"48\" height=\"48\" fill=\"none\"><\/rect><\/g><g id=\"icons_Q2\" data-name=\"icons Q2\"><g><path d=\"M7,34H19a2,2,0,0,0,0-4H9V10H39V30H29a2,2,0,0,0,0,4H41a2,2,0,0,0,2-2V8a2,2,0,0,0-2-2H7A2,2,0,0,0,5,8V32A2,2,0,0,0,7,34Z\"><\/path><path d=\"M44,38H4a2,2,0,0,0,0,4H44a2,2,0,0,0,0-4Z\"><\/path><path d=\"M31.9,21.3A5.7,5.7,0,0,0,32,20a5.7,5.7,0,0,0-.1-1.3l-2.2-.5a4.2,4.2,0,0,0-.4-1l1.2-1.9a7.7,7.7,0,0,0-1.8-1.8l-1.9,1.2-1-.4-.5-2.2H22.7l-.5,2.2-1,.4-1.9-1.2a7.7,7.7,0,0,0-1.8,1.8l1.2,1.9a4.2,4.2,0,0,0-.4,1l-2.2.5A5.7,5.7,0,0,0,16,20a5.7,5.7,0,0,0,.1,1.3l2.2.5a4.2,4.2,0,0,0,.4,1l-1.2,1.9a7.7,7.7,0,0,0,1.8,1.8l1.9-1.2,1,.4.5,2.2h2.6l.5-2.2,1-.4,1.9,1.2a7.7,7.7,0,0,0,1.8-1.8l-1.2-1.9a4.2,4.2,0,0,0,.4-1ZM24,22a2,2,0,1,1,2-2A2,2,0,0,1,24,22Z\"><\/path><\/g><\/g><\/g><\/svg><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h2 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" target=\"_blank\" rel=\"nofollow\">Intrusion Detection and Prevention<\/a><\/h2><p class=\"wpr-feature-list-description\">Deploy <b>advanced intrusion detection and prevention systems<\/b> to detect and mitigate <b>cyber threats<\/b> in <b>real-time.<\/b><\/p><\/div><\/li><li class=\"wpr-feature-list-item elementor-repeater-item-56d4e91\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h2 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" target=\"_blank\" rel=\"nofollow\">Incident Response Planning<\/a><\/h2><p class=\"wpr-feature-list-description\">Develop <b>comprehensive incident response plans<\/b> to effectively respond to <b>security incidents<\/b> and minimize their impact on your organization.<\/p><\/div><\/li><\/ul><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3fd30519 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3fd30519\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-388c73bd\" data-id=\"388c73bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39ddc050 elementor-widget elementor-widget-heading\" data-id=\"39ddc050\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Choose KALTECH for Cyber Security Solutions?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3cba663 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3cba663\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6d704ff\" data-id=\"6d704ff\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e013d9 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"8e013d9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/kaltech.web.id\/wp-content\/uploads\/2024\/03\/placeholder-181.png);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-brain\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>Expertise<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Our <strong>seasoned team<\/strong> brings <strong>unparalleled knowledge<\/strong> and <strong>experience<\/strong> to safeguard your organization's <strong>digital infrastructure.<\/strong><\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6b6ca02\" data-id=\"6b6ca02\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85a6a76 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"85a6a76\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/kaltech.web.id\/wp-content\/uploads\/2024\/03\/placeholder-181.png);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-puzzle-piece\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>Customized Solutions<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Tailored <strong>security solutions<\/strong> precisely match your organization's <strong>unique needs<\/strong> and <strong>risk profile<\/strong> for <strong>maximum protection.<\/strong><\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-53325b7\" data-id=\"53325b7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c893c9a elementor-hidden-tablet elementor-hidden-mobile wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"c893c9a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/kaltech.web.id\/wp-content\/uploads\/2024\/03\/placeholder-181.png);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-search\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>Proactive Approach<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>We employ <strong>advanced monitoring<\/strong> and <strong>preemptive measures<\/strong> to detect and mitigate <strong>threats<\/strong> before they escalate.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4546f95 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4546f95\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-fe1197a\" data-id=\"fe1197a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-532935d wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"532935d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/kaltech.web.id\/wp-content\/uploads\/2024\/03\/placeholder-181.png);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-folder\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>Compliance and Regulation<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Stay compliant with evolving <strong>cyber security regulations<\/strong>, ensuring your organization's adherence to <strong>industry standards.<\/strong><\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ce6a0cc\" data-id=\"ce6a0cc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5cfae98 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"5cfae98\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/kaltech.web.id\/wp-content\/uploads\/2024\/03\/placeholder-181.png);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-clock\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>24\/7 Monitoring and Support<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Our <strong>dedicated team<\/strong> provides<strong> round-the-clock surveillance<\/strong> and <strong>assistance<\/strong> to bolster your <strong>cyber defenses<\/strong> at all times.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4b7891b\" data-id=\"4b7891b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a44c14 elementor-hidden-desktop wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"4a44c14\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"wpr-promo-box-image\">\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-image wpr-bg-anim-zoom-in wpr-anim-timing-ease-default\" style=\"background-image:url(https:\/\/kaltech.web.id\/wp-content\/uploads\/2024\/03\/placeholder-181.png);\"><\/div>\n\t\t\t\t\t<div class=\"wpr-promo-box-bg-overlay wpr-border-anim-oscar\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-search\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>Proactive Approach<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>We employ <strong>advanced monitoring<\/strong> and <strong>preemptive measures<\/strong> to detect and mitigate <strong>threats<\/strong> before they escalate.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3698742f elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3698742f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e894e90 elementor-invisible\" data-id=\"e894e90\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40d466d elementor-widget elementor-widget-heading\" data-id=\"40d466d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Products<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b308b2c elementor-widget elementor-widget-text-editor\" data-id=\"5b308b2c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We provide a top notch solutions and support to our partners, and hire&nbsp;<span style=\"font-style: inherit; font-weight: inherit;\">exceptionally qualied security personnel and focus on our partners concerns about their critical interests. Our committed&nbsp;<\/span><span style=\"font-style: inherit; font-weight: inherit;\">experts is devoted to excellence; serves our customers with compassion, respect and dignity. We strive to exceed our customer\u2019s&nbsp;<\/span><span style=\"font-style: inherit; font-weight: inherit;\">satisfaction everyday!<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-322c0a2a\" data-id=\"322c0a2a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d324846 elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"1d324846\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-1d324846\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"1d324846\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n    <div class=\"eael-accordion-list\">\n                <div id=\"liapp-by-lockin\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-4891\"><span class=\"eael-accordion-tab-title\">LIAPP by Lockin<\/span><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/div><div id=\"elementor-tab-content-4891\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"liapp-by-lockin\"><p>LIAPP by Lockin is a powerful RASP solution designed to shield your applications from real-time threats and vulnerabilities, both known and unknown. It operates within your applications, providing deep visibility and proactive protection against sophisticated attacks targeting data and functionality.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"noname-api-security\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-4892\"><span class=\"eael-accordion-tab-title\">Noname API Security<\/span><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/div><div id=\"elementor-tab-content-4892\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"noname-api-security\"><p>Noname API Security Platform provides comprehensive protection for your APIs throughout their entire lifecycle, from development to production. It\u2019s not just another security tool; it\u2019s a proactive solution that addresses the limitations of traditional application security controls in today\u2019s API-driven world.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"thrivedx\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-4893\"><span class=\"eael-accordion-tab-title\">THRIVEDX<\/span><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/div><div id=\"elementor-tab-content-4893\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"thrivedx\"><p>ThriveDX enables organizations to take on the role of an attacker (phishing simulation) and identify gaps in both the technical infrastructure and security awareness and resolve them through a comprehensive e-learning program.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"socradar-xti\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-4894\"><span class=\"eael-accordion-tab-title\">SOCRadar XTI<\/span><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><\/div><div id=\"elementor-tab-content-4894\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"socradar-xti\"><p>SOCRadar XTI is a comprehensive cyber security platform that combines Extended Threat Intelligence (XTI) with Digital Risk Protection (DRP) and External Attack Surface Management (EASM). This powerfull combination gives you a holistic view of your digital risks and empowers you to proactively defend againts cyber threats.<\/p><\/div>\n                <\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-9947905 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"9947905\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7dad0b content-align-cta-default elementor-widget elementor-widget-eael-cta-box\" data-id=\"f7dad0b\" data-element_type=\"widget\" data-widget_type=\"eael-cta-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"eael-call-to-action cta-basic bg-lite cta-preset-1\">\n        <h2 class=\"title\">Ready to enhance your organization's cyber security posture?<\/h2><p>Contact us today to learn more about our cyber security solutions and how we can help protect your digital assets.<\/p><a href=\"https:\/\/kaltech.web.id\/index.php\/contact\/\" class=\"cta-button  \">Click Here<\/a>\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Solutions Protect Your Digital Assets with Robust Cyber Security Solutions At KALTECH, we understand the importance of safeguarding [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-159","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kaltech.web.id\/index.php\/wp-json\/wp\/v2\/pages\/159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kaltech.web.id\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kaltech.web.id\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kaltech.web.id\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kaltech.web.id\/index.php\/wp-json\/wp\/v2\/comments?post=159"}],"version-history":[{"count":58,"href":"https:\/\/kaltech.web.id\/index.php\/wp-json\/wp\/v2\/pages\/159\/revisions"}],"predecessor-version":[{"id":2003,"href":"https:\/\/kaltech.web.id\/index.php\/wp-json\/wp\/v2\/pages\/159\/revisions\/2003"}],"wp:attachment":[{"href":"https:\/\/kaltech.web.id\/index.php\/wp-json\/wp\/v2\/media?parent=159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}