{"id":12660,"date":"2020-02-15T10:35:51","date_gmt":"2020-02-15T15:35:51","guid":{"rendered":"https:\/\/telium.io\/sicherheit-fuer-asterisk\/technologie\/"},"modified":"2024-04-24T11:58:46","modified_gmt":"2024-04-24T16:58:46","slug":"technologie","status":"publish","type":"page","link":"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/","title":{"rendered":"Technologie"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:left top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-honeycomb-circuits.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"503\" height=\"250\" title=\"Zahnr\u00e4der-Asterisk\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1.png\" alt class=\"lazyload img-responsive wp-image-8709\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27503%27%20height%3D%27250%27%20viewBox%3D%270%200%20503%20250%27%3E%3Crect%20width%3D%27503%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1-200x99.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1-400x199.png 400w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1.png 503w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">Sicherheit f\u00fcr Asterisk<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\">Sicherheit speziell f\u00fcr telefonie<\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-honeycomb-circuits.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECAST<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf; font-size: 150%;\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">TECHNOLOGIE<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/vorteile\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-3 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/funktionen\/\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-4 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/testimonials\/\"><i class=\"fa-bullhorn fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Testimonials<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/screenshots\/\"><i class=\"fa-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Screenshots<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/videos\/\"><i class=\"fa-video-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Videos<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/editionen\/\"><i class=\"fa-check-circle fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Editions<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-9 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/haeufig-gestellte-fragen\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-10 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/vergleich\/\"><i class=\"fa-balance-scale fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Comparison<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-11 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/laden\/\"><i class=\"fa-download fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-12 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/preise-kaufen-2\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-13 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/foren\/\"><i class=\"fa-comment fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Forums<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-14 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/lizenz\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">technology<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.5;\">Entwickelt f\u00fcr Telefoniesicherheit<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><ul style=\"--awb-size:18px;--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#ff6600;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Erkennt Angriffe, die nur f\u00fcr VoIP-Telefonie von VoIP-Telefonie von VoIP-Telefonie sind<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Integriert sich intensiv mit Asterisk um die Benutzeraktivit\u00e4t in Echtzeit zu \u00fcberwachen<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Nutzt massive Datenbank von VoIP-spezifischen Hacker-IP-Adressen und betrugsbezogenen Telefonnummern<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Bietet die M\u00f6glichkeit, Antworten zu erstellen, die f\u00fcr jeden Angriff mit dem Event Handler-System von SecAsteindeutig sind<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Erstellt in C++ f\u00fcr geringen Ressourcenverbrauch, schnelle Angriffserkennung und schnelle Reaktion<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-bottom:20px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:rgba(239,239,239,0.5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-bottom:20px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-6 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.5;\">Wichtige Module<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:rgba(0,0,0,0.1);--awb-border-color:#000000;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12660-1\"><div class=\"fusion-panel panel-default panel-cc407010c311a8030 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_cc407010c311a8030\"><a aria-expanded=\"false\" aria-controls=\"cc407010c311a8030\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12660-1\" data-target=\"#cc407010c311a8030\" href=\"#cc407010c311a8030\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Intrusion Analysis Engine<\/span><\/a><\/h4><\/div><div id=\"cc407010c311a8030\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_cc407010c311a8030\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Die Intrusion Analysis Engine ist das Herzst\u00fcck von SecAst, \u00dcberwachungseing\u00e4ngen von Asterisk, dem Betriebssystem, Verhaltensverlauf und propriet\u00e4ren Sicherheitsdatenbanken. Benutzer- und Ger\u00e4teaktivit\u00e4ten werden st\u00e4ndig profiliert, um nach verd\u00e4chtigem Verhalten zu suchen, und SecAst verwaltet Risikobewertungen f\u00fcr jede vorhandene Verbindung und versuchte Verbindung. Basierend auf vom Administrator definierten Schwellenwerten blockiert oder beschr\u00e4nkt SecAst Aktivit\u00e4ten von Benutzern oder Ger\u00e4ten, um sicherzustellen, dass Betrug gemildert und Hackerangriffe verhindert werden.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-b59e1ef9e07de9995 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b59e1ef9e07de9995\"><a aria-expanded=\"false\" aria-controls=\"b59e1ef9e07de9995\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12660-1\" data-target=\"#b59e1ef9e07de9995\" href=\"#b59e1ef9e07de9995\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Betriebssystemsensoren<\/span><\/a><\/h4><\/div><div id=\"b59e1ef9e07de9995\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b59e1ef9e07de9995\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>SecAst \u00fcberwacht Netzwerkverbindungen, versuchte Netzwerkverbindungen, Netzwerkverkehr, Ger\u00e4teprofile und mehr. Diese Eing\u00e4nge werden von den propriet\u00e4ren Netzwerksensoren von SecAstabgeleitet, die kontinuierlich Daten an SecAstweiterleiten. Die Intrusion Analysis Engine verwendet diese Eingaben, um eine Verbindung zu verhindern, eine Verbindung zur weiteren \u00dcberwachung zu kennzeichnen oder sogar ungew\u00f6hnliche Datenverkehrsmuster zu erkennen.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ccea2da30a05cb0ff fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ccea2da30a05cb0ff\"><a aria-expanded=\"false\" aria-controls=\"ccea2da30a05cb0ff\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12660-1\" data-target=\"#ccea2da30a05cb0ff\" href=\"#ccea2da30a05cb0ff\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Asterisk Sensoren<\/span><\/a><\/h4><\/div><div id=\"ccea2da30a05cb0ff\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ccea2da30a05cb0ff\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>SecAst l\u00e4sst sich tief in Asterisk integrieren, um die W\u00e4hlplanvorg\u00e4nge und insbesondere das Verhalten einzelner Verbindungen zu \u00fcberwachen. Daten wie Anruf-Setup-Frequenz, W\u00e4hlraten usw. dienen als Eing\u00e4nge f\u00fcr die Intrusion Analysis Engine.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-91d84ebae12edae79 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_91d84ebae12edae79\"><a aria-expanded=\"false\" aria-controls=\"91d84ebae12edae79\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12660-1\" data-target=\"#91d84ebae12edae79\" href=\"#91d84ebae12edae79\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Externer Firewall-Controller<\/span><\/a><\/h4><\/div><div id=\"91d84ebae12edae79\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_91d84ebae12edae79\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Eine bew\u00e4hrte Methode f\u00fcr die H\u00e4rtung von Computerumgebungen besteht darin, Angreifer vom internen Netzwerk fernzuhalten. SecAst bietet eine API, um mit praktisch jeder externen Firewall zu kommunizieren, um unerw\u00fcnschte IP-Adressen am Netzwerkrand zu blockieren, zu entsperren und zu \u00fcberwachen. SecAst enth\u00e4lt Beispielhandler f\u00fcr Firewalls von Cisco, Mikrotik, pfSense und mehr.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-image-element fusion-image-align-right in-legacy-container\" style=\"text-align:right;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"margin-left:25px;float:right;\"><img decoding=\"async\" width=\"900\" height=\"931\" title=\"Technologie-\u00dcbersicht2\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology-overview2.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology-overview2.png\" alt class=\"lazyload img-responsive wp-image-10225\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27900%27%20height%3D%27931%27%20viewBox%3D%270%200%20900%20931%27%3E%3Crect%20width%3D%27900%27%20height%3D%27931%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology-overview2-200x207.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology-overview2-400x414.png 400w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology-overview2-600x621.png 600w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology-overview2-800x828.png 800w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology-overview2.png 900w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 900px\" \/><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-bottom:20px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":12321,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-12660","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Technologie - Sicherheit f\u00fcr Asterisk - Telium<\/title>\n<meta name=\"description\" content=\"Die Technologie, die SECast zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technologie - Sicherheit f\u00fcr Asterisk - Telium\" \/>\n<meta property=\"og:description\" content=\"Die Technologie, die SECast zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T16:58:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/\",\"url\":\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/\",\"name\":\"Technologie - Sicherheit f\u00fcr Asterisk - Telium\",\"isPartOf\":{\"@id\":\"https:\/\/telium.io\/de\/#website\"},\"datePublished\":\"2020-02-15T15:35:51+00:00\",\"dateModified\":\"2024-04-24T16:58:46+00:00\",\"description\":\"Die Technologie, die SECast zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.\",\"breadcrumb\":{\"@id\":\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/telium.io\/de\/startseite\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheit f\u00fcr Asterisk\",\"item\":\"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Technologie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/telium.io\/de\/#website\",\"url\":\"https:\/\/telium.io\/de\/\",\"name\":\"Telium\",\"description\":\"Telefonie und Telematik\",\"publisher\":{\"@id\":\"https:\/\/telium.io\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/telium.io\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/telium.io\/de\/#organization\",\"name\":\"Telium\",\"url\":\"https:\/\/telium.io\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png\",\"contentUrl\":\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\",\"https:\/\/x.com\/telium_io\",\"https:\/\/ca.linkedin.com\/company\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technologie - Sicherheit f\u00fcr Asterisk - Telium","description":"Die Technologie, die SECast zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/","og_locale":"de_DE","og_type":"article","og_title":"Technologie - Sicherheit f\u00fcr Asterisk - Telium","og_description":"Die Technologie, die SECast zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.","og_url":"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2024-04-24T16:58:46+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/","url":"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/","name":"Technologie - Sicherheit f\u00fcr Asterisk - Telium","isPartOf":{"@id":"https:\/\/telium.io\/de\/#website"},"datePublished":"2020-02-15T15:35:51+00:00","dateModified":"2024-04-24T16:58:46+00:00","description":"Die Technologie, die SECast zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.","breadcrumb":{"@id":"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/technologie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/de\/startseite\/"},{"@type":"ListItem","position":2,"name":"Sicherheit f\u00fcr Asterisk","item":"https:\/\/telium.io\/de\/sicherheit-fuer-asterisk\/"},{"@type":"ListItem","position":3,"name":"Technologie"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/de\/#website","url":"https:\/\/telium.io\/de\/","name":"Telium","description":"Telefonie und Telematik","publisher":{"@id":"https:\/\/telium.io\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/telium.io\/de\/#organization","name":"Telium","url":"https:\/\/telium.io\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/12660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/comments?post=12660"}],"version-history":[{"count":15,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/12660\/revisions"}],"predecessor-version":[{"id":18163,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/12660\/revisions\/18163"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/12321"}],"wp:attachment":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/media?parent=12660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}