{"id":7565,"date":"2024-09-04T11:05:43","date_gmt":"2024-09-04T10:05:43","guid":{"rendered":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/"},"modified":"2024-09-11T14:12:32","modified_gmt":"2024-09-11T13:12:32","slug":"integrated-endpoint-and-vulnerability-management-with-syxsense","status":"publish","type":"page","link":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/","title":{"rendered":"Integrated endpoint and vulnerability management with SyxSense"},"content":{"rendered":"            <div  id=\"banner-block_4a1e0fa04e0fef1ffb64ab11ad75eaa2\" class=\"block block--banner \" style=\"background-color:var(u002du002dbs-gray-900);--banner-min-height:400px;--background-image-alignment:center;--background-image-fit:cover;\" data-wmx-wpb=\"banner\" >\r\n                                        <div class=\"banner-wrapper\">\r\n                <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"600\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1.jpg\" class=\"banner-background d-none d-lg-block\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1.jpg 1920w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-300x94.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-1024x320.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-768x240.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-1536x480.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"320\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-1024x320.jpg\" class=\"banner-background d-none d-md-block d-lg-none\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-1024x320.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-300x94.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-768x240.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-1536x480.jpg 1536w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"240\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-768x240.jpg\" class=\"banner-background d-md-none\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-768x240.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-300x94.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-1024x320.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1-1536x480.jpg 1536w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-header-1.jpg 1920w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>        <div class=\"banner-content--wrapper container py-lg-5 py-4\">\r\n            <div class=\"row\">\r\n                <div class=\"col\">\r\n                    <div class=\"banner-content me-auto\"  style=\"--lg-max-width:60%;\">\r\n                        \n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"220\" height=\"39.6847635727\" src=\"https:\/\/www.climbcs.com\/uk\/wp-content\/uploads\/sites\/4\/svg\/syxsense-white.svg\" alt=\"\" class=\"wp-image-2261\" style=\"width:220px\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-bs-white-color has-text-color has-link-color has-h-1-font-size wp-elements-9b427326820d5bc204c407f770f33d5c\"><strong>Strengthen your customers\u2019 security posture with integrated endpoint and vulnerability management&nbsp;<\/strong><\/h1>\n\n\n\n<p class=\"has-bs-white-color has-text-color has-link-color has-h-3-font-size wp-elements-40b962e8ff3ea8264c9115a15cc3c669\">The latest Syxsense insights on enterprise security&nbsp;<\/p>\n\n\n\r\n        <div class=\"wp-block-buttons   \">\r\n            \n<div class=\"wp-block-button\"><a class=\"btn btn-primary \" href=\"#wmx-modal-sjebpm0\">Download the guide<\/a><\/div>\n\n<div class=\"wp-block-button\"><a class=\"btn btn-primary \" href=\"https:\/\/www.climbcs.com\/ie\/vendors\/syxsense\/#contact\">Get in touch<\/a><\/div>\n\r\n        <\/div>\r\n\r\n\r\n        <\/div>\n<\/div>\n\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n                <\/div>\r\n        \n\n            <section id=\"wmx-section-wrapper-xue74bx\" class=\"block block--section-wrapper pt-lg-6 pt-4 pb-lg-6 pb-4 \" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column is-vertically-aligned-center\" style=\"flex-basis:50%\">\n<h2 class=\"wp-block-heading has-text-align-left\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">Keeping your customers\u2019 endpoints secure has never been more critical than today.&nbsp;<\/h2>\n\n\n\n<p>Employees interact with more devices daily as remote and hybrid workplaces continue to grow. The expansion of the attack surface has made it imperative for organisations to implement robust endpoint management and security practices.&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column rounded has-bs-gray-200-background-color has-u-002-du-002-dbs-gray-200-background-color has-background\">\n<p><strong>Key challenges:&nbsp;<\/strong><\/p>\n\n\n\n<div data-justification=\"center\" class=\"justify-content-center wp-block-columns\">\n<div class=\"wp-block-column is-vertically-aligned-center\" style=\"flex-basis:20%\">\n<svg width=\"80px\"  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 640 512\"><!--!Font Awesome Free 6.6.0 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license\/free Copyright 2024 Fonticons, Inc.--><path d=\"M128 32C92.7 32 64 60.7 64 96l0 256 64 0 0-256 384 0 0 256 64 0 0-256c0-35.3-28.7-64-64-64L128 32zM19.2 384C8.6 384 0 392.6 0 403.2C0 445.6 34.4 480 76.8 480l486.4 0c42.4 0 76.8-34.4 76.8-76.8c0-10.6-8.6-19.2-19.2-19.2L19.2 384z\"\/><\/svg>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center\" style=\"flex-basis:66.66%\">\n<p><strong>Increased device interactions<\/strong><br>Employees use multiple devices, increasing attacker entry points.&nbsp;<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div data-justification=\"center\" class=\"justify-content-center wp-block-columns\">\n<div class=\"wp-block-column is-vertically-aligned-center\" style=\"flex-basis:20%\">\n<svg width=\"80px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 640 512\"><!--!Font Awesome Free 6.6.0 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license\/free Copyright 2024 Fonticons, Inc.--><path d=\"M480 416l96 0c35.3 0 64-28.7 64-64l0-192c0-35.3-28.7-64-64-64l-96 0 0 320zM448 96L192 96l0 320 256 0 0-320zM64 96C28.7 96 0 124.7 0 160L0 352c0 35.3 28.7 64 64 64l96 0 0-320L64 96zM248 208a24 24 0 1 1 48 0 24 24 0 1 1 -48 0zm120-24a24 24 0 1 1 0 48 24 24 0 1 1 0-48zM248 304a24 24 0 1 1 48 0 24 24 0 1 1 -48 0zm120-24a24 24 0 1 1 0 48 24 24 0 1 1 0-48z\"\/><\/svg>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center\" style=\"flex-basis:66.66%\">\n<p><strong>Delayed patching<\/strong><br>Organisations often fail to patch vulnerabilities promptly, leaving their defences exposed.&nbsp;&nbsp;<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div data-justification=\"center\" class=\"justify-content-center wp-block-columns\">\n<div class=\"wp-block-column is-vertically-aligned-center\" style=\"flex-basis:20%\">\n<svg width=\"80px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><!--!Font Awesome Free 6.6.0 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license\/free Copyright 2024 Fonticons, Inc.--><path d=\"M288 32c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 11.5c0 49.9-60.3 74.9-95.6 39.6L120.2 75C107.7 62.5 87.5 62.5 75 75s-12.5 32.8 0 45.3l8.2 8.2C118.4 163.7 93.4 224 43.5 224L32 224c-17.7 0-32 14.3-32 32s14.3 32 32 32l11.5 0c49.9 0 74.9 60.3 39.6 95.6L75 391.8c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0l8.2-8.2c35.3-35.3 95.6-10.3 95.6 39.6l0 11.5c0 17.7 14.3 32 32 32s32-14.3 32-32l0-11.5c0-49.9 60.3-74.9 95.6-39.6l8.2 8.2c12.5 12.5 32.8 12.5 45.3 0s12.5-32.8 0-45.3l-8.2-8.2c-35.3-35.3-10.3-95.6 39.6-95.6l11.5 0c17.7 0 32-14.3 32-32s-14.3-32-32-32l-11.5 0c-49.9 0-74.9-60.3-39.6-95.6l8.2-8.2c12.5-12.5 12.5-32.8 0-45.3s-32.8-12.5-45.3 0l-8.2 8.2C348.3 118.4 288 93.4 288 43.5L288 32zM176 224a48 48 0 1 1 96 0 48 48 0 1 1 -96 0zm128 56a24 24 0 1 1 0 48 24 24 0 1 1 0-48z\"\/><\/svg>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center\" style=\"flex-basis:66.66%\">\n<p><strong>Rising vulnerabilities<\/strong><br>More comprehensive and integrated management solutions are required to combat rising security vulnerabilities.&nbsp;<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n            <section id=\"wmx-section-wrapper-jkupimc\" class=\"block block--section-wrapper pt-lg-6 pt-4 pb-lg-6 pb-4 \" style=\"background-color:var(--bs-gray-400);\" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<h2 class=\"wp-block-heading has-text-align-center\">The need for integrated endpoint management&nbsp;<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Taking traditional security measures into account in a modern, digitally-driven workplace is certainly not enough. Separating endpoint management and security teams can create blind spots and inefficiencies. Consolidating these functions can lead to a more cohesive and proactive approach to security.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Integrating provides the following benefits:&nbsp;<\/strong><\/p>\n\n\n            <div  id=\"wmx-cards-rq21w3i\" class=\"block block--cards \" style=\"--card-count:3;\" data-wmx-wpb=\"cards\" data-mobile=\"stacked\" data-layout=\"grid\" >\r\n                                \n    \n            <div class=\"cards justify-content-center\">\n            \n                \n            <div  id=\"wmx-cards-card-lherw1g\" class=\"block block--cards-card \" data-wmx-wpb=\"cards-card\" data-bs-theme=\"light\" >\r\n                                \r\n\r\n    <div class=\"card p-3 border layout-default\" data-wmx-stretch-link=\"true\" >\r\n        \n\n<h4 class=\"wp-block-heading has-text-align-center\"><strong>Improved application delivery<\/strong><\/h4>\n\n\n\n<p class=\"has-text-align-center\">Merging teams can speed up the rollout of new applications.<\/p>\n\n\r\n        \r\n            <\/div>\r\n\r\n\r\n                <\/div>\r\n        \n\n            <div  id=\"wmx-cards-card-lherw1g\" class=\"block block--cards-card \" data-wmx-wpb=\"cards-card\" data-bs-theme=\"light\" >\r\n                                \r\n\r\n    <div class=\"card p-3 border layout-default\" data-wmx-stretch-link=\"true\" >\r\n        \n\n<h4 class=\"wp-block-heading has-text-align-center\"><strong>Enhanced collaboration<\/strong><\/h4>\n\n\n\n<p class=\"has-text-align-center\">Streamlined processes between IT and security teams improve overall efficiency and compliance.<\/p>\n\n\r\n        \r\n            <\/div>\r\n\r\n\r\n                <\/div>\r\n        \n\n            <div  id=\"wmx-cards-card-lherw1g\" class=\"block block--cards-card \" data-wmx-wpb=\"cards-card\" data-bs-theme=\"light\" >\r\n                                \r\n\r\n    <div class=\"card p-3 border layout-default\" data-wmx-stretch-link=\"true\" >\r\n        \n\n<h4 class=\"wp-block-heading has-text-align-center\"><strong>Comprehensive protection<\/strong><\/h4>\n\n\n\n<p class=\"has-text-align-center\">Integrated tools ensure no endpoint is left unprotected, reducing cyber-attack risk.<\/p>\n\n\r\n        \r\n            <\/div>\r\n\r\n\r\n                <\/div>\r\n        \n\n                    <\/div>\n\n                    <\/div>\r\n        <\/div>\n<\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n            <section id=\"wmx-section-wrapper-rfzbeob\" class=\"block block--section-wrapper pt-lg-6 pt-4 pb-lg-6 pb-4 \" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<h2 class=\"wp-block-heading\">Moving Towards Proactive Security&nbsp;<\/h2>\n\n\n\n<p>Reactive endpoint security no longer works. Automation, artificial intelligence, and machine learning are key to predicting and mitigating threats.<\/p>\n\n\n\n<p><strong>Emerging capabilities:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automated remediation:<\/strong> Reduce vulnerability exposure time by speeding up patching.<\/li>\n\n\n\n<li><strong>AI and Machine Learning:<\/strong> Predict potential threats and automate routine tasks using advanced technologies.<\/li>\n\n\n\n<li><strong>Detailed analytics:<\/strong> Gain deeper insights into your security posture with comprehensive reporting and analytics.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n            <div  id=\"banner-block_f01fe10a884410c3257356a9829c21d7\" class=\"block block--banner \" style=\"background-color:var(u002du002dbs-gray-900);--banner-min-height:400px;--background-image-alignment:center;--background-image-fit:cover;\" data-wmx-wpb=\"banner\" >\r\n                                        <div class=\"banner-wrapper\">\r\n                <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"600\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg.jpg\" class=\"banner-background d-none d-lg-block\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg.jpg 1920w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-300x94.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-1024x320.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-768x240.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-1536x480.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"320\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-1024x320.jpg\" class=\"banner-background d-none d-md-block d-lg-none\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-1024x320.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-300x94.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-768x240.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-1536x480.jpg 1536w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"240\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-768x240.jpg\" class=\"banner-background d-md-none\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-768x240.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-300x94.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-1024x320.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg-1536x480.jpg 1536w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/vulnerability-management-faded-bg.jpg 1920w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>        <div class=\"banner-content--wrapper container py-lg-5 py-4\">\r\n            <div class=\"row\">\r\n                <div class=\"col\">\r\n                    <div class=\"banner-content me-auto\"  style=\"--lg-max-width:100%;\">\r\n                        \n            <section id=\"wmx-section-wrapper-7zyr45m\" class=\"block block--section-wrapper \" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column is-vertically-aligned-center\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-bs-white-color has-text-color has-link-color wp-elements-f6efc052235f12f1cd433c247095b2fd\">Learn more about key findings in the guide.&nbsp;<\/h2>\n\n\n\n<p class=\"has-bs-white-color has-text-color has-link-color wp-elements-b4d3ce7cff8bb4eb3f7c1d2799b3be7a\">To secure your customers\u2019 environments effectively, it&#8217;s crucial to integrate robust endpoint and vulnerability management practices. Download the guide today and gain the insights needed to strengthen your customers\u2019 security posture.&nbsp;<\/p>\n\n\n\r\n        <div class=\"wp-block-buttons   \">\r\n            \n<div class=\"wp-block-button\"><a class=\"btn btn-primary \" href=\"#wmx-modal-sjebpm0\">Download the guide<\/a><\/div>\n\r\n        <\/div>\r\n\r\n\r\n        \n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<figure class=\"wp-block-image size-full\"><a href=\"#wmx-modal-sjebpm0\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/uk\/wp-content\/uploads\/sites\/4\/2024\/08\/Syxsense-Enterprise-Security-Guide.png\" alt=\"\" class=\"wp-image-8722\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n                <\/div>\r\n        \n\n\r\n    <div class=\"block--modal modal fade\" id=\"wmx-modal-sjebpm0\" tabindex=\"-1\" role=\"dialog\" aria-labelledby=\"wmx-modal-sjebpm0Label\" aria-hidden=\"true\">\r\n        <div class=\"modal-dialog modal-lg modal-dialog-centered\" role=\"document\">\r\n            <div class=\"modal-content\">\r\n                <div class=\"modal-header\">\r\n                    <button type=\"button\" class=\"btn-close\" data-bs-dismiss=\"modal\" aria-label=\"Close\"><\/button>\r\n                <\/div>\r\n                <div class=\"modal-body\">\r\n                    \n            <section id=\"wmx-section-wrapper-2676j20\" class=\"block block--section-wrapper \" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<h3 class=\"wp-block-heading\"><strong>Download <em>Fortifying the Enterprise Security Ecosystem: Ways to Integrate Endpoint and Vulnerability Management<\/em><\/strong><\/h3>\n\n\n<span data-gator-form=\"3405\"><\/span>\n\n\n\n<p>By submitting this form you are agreeing to our\u00a0<a href=\"https:\/\/www.climbcs.com\/ie\/legal\/privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Policy<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.climbcs.com\/ie\/legal\/website-terms-of-use\/\" target=\"_blank\" rel=\"noreferrer noopener\">Website Terms of Use<\/a>.<\/p>\n<\/div>\n<\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n\r\n    \n\n            <div  id=\"banner-block_c90988c0187f1b870006f7dae1c9b12d\" class=\"block block--banner \" style=\"--banner-min-height:500px;--background-image-alignment:center;--background-image-fit:cover;\" data-wmx-wpb=\"banner\" >\r\n                                        <div class=\"banner-wrapper\">\r\n                <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492.jpg\" class=\"banner-background d-none d-lg-block\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492.jpg 1920w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-300x169.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-1024x576.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-768x432.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-1536x864.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-1024x576.jpg\" class=\"banner-background d-none d-md-block d-lg-none\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-1024x576.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-300x169.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-768x432.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-1536x864.jpg 1536w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-768x432.jpg\" class=\"banner-background d-md-none\" alt=\"\" style=\"width: 100%;height:100%;\" srcset=\"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-768x432.jpg 768w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-300x169.jpg 300w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-1024x576.jpg 1024w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492-1536x864.jpg 1536w, https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/2024\/09\/syxsense-bg-e1725023677492.jpg 1920w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>        <div class=\"banner-content--wrapper container py-lg-5 py-4\">\r\n            <div class=\"row\">\r\n                <div class=\"col\">\r\n                    <div class=\"banner-content me-auto\"  style=\"--lg-max-width:100%;\">\r\n                        \n            <section id=\"wmx-section-wrapper-prmofn4\" class=\"block block--section-wrapper \" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:66%\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Syxsense can help&nbsp;<\/h2>\n\n\n\n<p>Syxsense provides a powerful, multi-tenant solution for MSPs and MSSPs to take endpoint and vulnerability management to the next level, while ensuring that recurring revenue isn\u2019t cannibalised by extra software purchases. MSPs\/MSSPs can enjoy the peace of mind that comes with the knowledge that patches are deployed and endpoint vulnerabilities are remediated, without the need for extra resources, thanks to our automated and customisable Syxsense Cortex\u2122 workflows.&nbsp;<\/p>\n\n\n\n<p><strong>Key features:&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-time alerts:<\/strong> Get instant notifications about potential threats.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Risk-based prioritisation:<\/strong> Prioritise vulnerabilities based on their severity.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pre-built remediations<\/strong>: Quickly address common vulnerabilities with our pre-configured solutions.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Intuitive automation:<\/strong> Free up valuable resources by simplifying and automating complex security tasks.&nbsp;<\/li>\n<\/ul>\n\n\n\r\n        <div class=\"wp-block-buttons   \">\r\n            \n<div class=\"wp-block-button\"><a class=\"btn btn-primary \" href=\"https:\/\/www.climbcs.com\/ie\/vendors\/syxsense\/\">Syxsense Vendor Page<\/a><\/div>\n\n<div class=\"wp-block-button\"><a class=\"btn btn-primary \" href=\"https:\/\/www.climbcs.com\/ie\/vendors\/syxsense\/#contact\">Get in touch<\/a><\/div>\n\r\n        <\/div>\r\n\r\n\r\n        \n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center\">            <div  id=\"wmx-gallery-n65tqxn\" class=\"block block--gallery \" style=\"--card-count:1;\" data-wmx-wpb=\"gallery\" data-mobile=\"slider\" >\r\n                                    <div class=\"gallery\">\r\n                <div class=\"gallery-inner --grid d-none d-md-flex\">\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.climbcs.com\/uk\/wp-content\/uploads\/sites\/4\/svg\/syxsense-logo.svg\" alt=\"\" class=\"wp-image-2786\"\/><\/figure>\n\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.climbcs.com\/uk\/vendors\/syxsense\/\" class=\"--card-link\" target=\"_self\" ><span class=\"\"><\/span><\/a>\r\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n<\/div>            <div class=\"gallery-inner --slider d-md-none\">\r\n                <div class=\"swiper\">\r\n                    <div class=\"swiper-wrapper\"\r\n                         data-swiper-slides-per-view=\"1\"\r\n                         data-swiper-autoplay=\"false\"\r\n                         data-swiper-delay=\"\"\r\n                         data-swiper-speed=\"\"\r\n                         data-swiper-pagination=\"false\"\r\n                         data-swiper-navigation=\"false\"\r\n                         data-swiper-loop=\"false\"\r\n                    ><\/div>\r\n                <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                <\/div>\r\n        <\/div>\n<\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n                <\/div>\r\n        ","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7565","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Integrated endpoint and vulnerability management with SyxSense - Climb Channel Solutions IE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Integrated endpoint and vulnerability management with SyxSense - Climb Channel Solutions IE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/\" \/>\n<meta property=\"og:site_name\" content=\"Climb Channel Solutions IE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-11T13:12:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@climbcs_ie\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/integrated-endpoint-and-vulnerability-management-with-syxsense\\\/\",\"url\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/integrated-endpoint-and-vulnerability-management-with-syxsense\\\/\",\"name\":\"Integrated endpoint and vulnerability management with SyxSense - Climb Channel Solutions IE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/integrated-endpoint-and-vulnerability-management-with-syxsense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/integrated-endpoint-and-vulnerability-management-with-syxsense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.climbcs.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/svg\\\/syxsense-white.svg\",\"datePublished\":\"2024-09-04T10:05:43+00:00\",\"dateModified\":\"2024-09-11T13:12:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/integrated-endpoint-and-vulnerability-management-with-syxsense\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/integrated-endpoint-and-vulnerability-management-with-syxsense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/integrated-endpoint-and-vulnerability-management-with-syxsense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.climbcs.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/svg\\\/syxsense-white.svg\",\"contentUrl\":\"https:\\\/\\\/www.climbcs.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/svg\\\/syxsense-white.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/integrated-endpoint-and-vulnerability-management-with-syxsense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Integrated endpoint and vulnerability management with SyxSense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/#website\",\"url\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/\",\"name\":\"Climb Channel Solutions Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/#organization\",\"name\":\"Climb Channel Solutions Ireland\",\"url\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/wp-content\\\/uploads\\\/sites\\\/12\\\/svg\\\/Climb-CS-colour-for-light-background.svg\",\"contentUrl\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/wp-content\\\/uploads\\\/sites\\\/12\\\/svg\\\/Climb-CS-colour-for-light-background.svg\",\"width\":1024,\"height\":325,\"caption\":\"Climb Channel Solutions Ireland\"},\"image\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ie\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/climbcs_ie\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Integrated endpoint and vulnerability management with SyxSense - Climb Channel Solutions IE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/","og_locale":"en_US","og_type":"article","og_title":"Integrated endpoint and vulnerability management with SyxSense - Climb Channel Solutions IE","og_url":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/","og_site_name":"Climb Channel Solutions IE","article_modified_time":"2024-09-11T13:12:32+00:00","twitter_card":"summary_large_image","twitter_site":"@climbcs_ie","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/","url":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/","name":"Integrated endpoint and vulnerability management with SyxSense - Climb Channel Solutions IE","isPartOf":{"@id":"https:\/\/www.climbcs.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/#primaryimage"},"image":{"@id":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.climbcs.com\/uk\/wp-content\/uploads\/sites\/4\/svg\/syxsense-white.svg","datePublished":"2024-09-04T10:05:43+00:00","dateModified":"2024-09-11T13:12:32+00:00","breadcrumb":{"@id":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/#primaryimage","url":"https:\/\/www.climbcs.com\/uk\/wp-content\/uploads\/sites\/4\/svg\/syxsense-white.svg","contentUrl":"https:\/\/www.climbcs.com\/uk\/wp-content\/uploads\/sites\/4\/svg\/syxsense-white.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.climbcs.com\/ie\/integrated-endpoint-and-vulnerability-management-with-syxsense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.climbcs.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Integrated endpoint and vulnerability management with SyxSense"}]},{"@type":"WebSite","@id":"https:\/\/www.climbcs.com\/ie\/#website","url":"https:\/\/www.climbcs.com\/ie\/","name":"Climb Channel Solutions Ireland","description":"","publisher":{"@id":"https:\/\/www.climbcs.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.climbcs.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.climbcs.com\/ie\/#organization","name":"Climb Channel Solutions Ireland","url":"https:\/\/www.climbcs.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.climbcs.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/svg\/Climb-CS-colour-for-light-background.svg","contentUrl":"https:\/\/www.climbcs.com\/ie\/wp-content\/uploads\/sites\/12\/svg\/Climb-CS-colour-for-light-background.svg","width":1024,"height":325,"caption":"Climb Channel Solutions Ireland"},"image":{"@id":"https:\/\/www.climbcs.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/climbcs_ie"]}]}},"_links":{"self":[{"href":"https:\/\/www.climbcs.com\/ie\/wp-json\/wp\/v2\/pages\/7565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.climbcs.com\/ie\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.climbcs.com\/ie\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.climbcs.com\/ie\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.climbcs.com\/ie\/wp-json\/wp\/v2\/comments?post=7565"}],"version-history":[{"count":0,"href":"https:\/\/www.climbcs.com\/ie\/wp-json\/wp\/v2\/pages\/7565\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.climbcs.com\/ie\/wp-json\/wp\/v2\/media?parent=7565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}