{"id":2419,"date":"2026-04-14T10:55:49","date_gmt":"2026-04-14T15:55:49","guid":{"rendered":"https:\/\/solusoft.digitalchif.com\/?page_id=2419"},"modified":"2026-04-14T10:55:49","modified_gmt":"2026-04-14T15:55:49","slug":"the-two-keys-that-lock-down-your-database","status":"publish","type":"page","link":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/","title":{"rendered":"The Two Keys That Lock Down Your Database"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2419\" class=\"elementor elementor-2419\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce81235 e-flex e-con-boxed e-con e-parent\" data-id=\"ce81235\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6cc8bca e-con-full e-flex e-con e-child\" data-id=\"6cc8bca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a68862 elementor-widget elementor-widget-heading\" data-id=\"6a68862\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Two Keys That Lock Down Your Database<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c07114c elementor-widget elementor-widget-heading\" data-id=\"c07114c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Encryption and data masking \u2014 your first and second line of defense against unauthorized access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c02de5b e-con-full e-flex e-con e-child\" data-id=\"c02de5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ae6c3a3 e-con-full e-flex e-con e-child\" data-id=\"ae6c3a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5906136 elementor-widget elementor-widget-text-editor\" data-id=\"5906136\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>The Gap<\/strong><\/p><p>Most companies believe their database is secure because it&#8217;s behind a firewall. But if an attacker gets past the perimeter \u2014 through a stolen credential, an insider threat, or a misconfigured endpoint \u2014 the data itself has no protection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eea0a80 e-con-full e-flex e-con e-child\" data-id=\"eea0a80\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef58436 elementor-widget elementor-widget-text-editor\" data-id=\"ef58436\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>The Solution<\/strong><\/p><p>Encryption and data masking ensure that even if your database is accessed without authorization, the data inside it remains completely useless to the attacker.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b807c97 e-con-full e-flex e-con e-child\" data-id=\"b807c97\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f1c87f1 e-con-full e-flex e-con e-child\" data-id=\"f1c87f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b26df19 elementor-widget elementor-widget-heading\" data-id=\"b26df19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Success <span>Stories<\/span>\n <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-885aac1 e-con-full e-flex e-con e-child\" data-id=\"885aac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-81359df e-con-full e-flex e-con e-child\" data-id=\"81359df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04e01fe elementor-widget elementor-widget-text-editor\" data-id=\"04e01fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Solusoft audits your current data exposure \u2014 identifying which records are unencrypted, which environments expose real data unnecessarily, and where masking policies need to be implemented.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2c698c e-con-full e-flex e-con e-child\" data-id=\"e2c698c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8bfc9d elementor-widget elementor-widget-text-editor\" data-id=\"c8bfc9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Full encryption covers data in transit and at rest. Even if an attacker intercepts your traffic or exfiltrates a backup file, the information is indecipherable without the correct encryption key.<\/p><p>Data masking adds a second layer for technical environments \u2014 development and test teams work with real data structures and volumes without ever seeing the actual sensitive values, eliminating a common but often overlooked exposure vector.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c80fee1 e-con-full e-flex e-con e-child\" data-id=\"c80fee1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fce5d69 e-con-full e-flex e-con e-child\" data-id=\"fce5d69\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dbf4ed elementor-widget elementor-widget-heading\" data-id=\"3dbf4ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Takeaways<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39b8b7f elementor-widget elementor-widget-text-editor\" data-id=\"39b8b7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul role=\"list\"><li><strong>Encryption at Rest and in Transit \u2014 <\/strong>Data is protected in every state \u2014 stored, moving, or backed up. No unencrypted surface for attackers to exploit.<\/li><li><strong>Zero-Value Data Theft \u2014 <\/strong>Without the encryption key, stolen data is useless \u2014 even to a sophisticated attacker who has successfully breached the database.<\/li><li><strong>Safe Development Environments \u2014 <\/strong>Teams build and test with realistic data structures while masked values ensure no real customer or financial data is ever exposed.<\/li><li><strong>Reduced Insider Risk \u2014 <\/strong>Masking limits what any individual can see based on their role \u2014 minimizing exposure even from internal threats.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20345a4 e-con-full e-flex e-con e-child\" data-id=\"20345a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2f6621 elementor-widget elementor-widget-image\" data-id=\"e2f6621\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"590\" height=\"532\" src=\"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/04\/Group-1000001531.png\" class=\"attachment-large size-large wp-image-2324\" alt=\"\" srcset=\"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/04\/Group-1000001531.png 590w, https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/04\/Group-1000001531-300x271.png 300w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-83d83d4 e-con-full e-flex e-con e-child\" data-id=\"83d83d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ef66c2 elementor-widget elementor-widget-text-editor\" data-id=\"4ef66c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><em>&#8220;Encryption is the last line of defense. Without the key, the data has no value.&#8221;<\/em><\/p><p><strong>\u2014 Lucas Garcia, Data Security Consultant, Solusoft<\/strong><\/p><p><em>A breach doesn&#8217;t have to mean a disaster. With encryption and masking in place, the data your attackers find is data they can never use.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e4feff e-con-full e-flex e-con e-child\" data-id=\"1e4feff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5c4f6d elementor-widget elementor-widget-heading\" data-id=\"b5c4f6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is Your Database Protected at the Data Level?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe420c0 elementor-widget elementor-widget-text-editor\" data-id=\"fe420c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Find out where your encryption gaps are before an attacker does.<\/p><p><strong>\u00a0 Book a Call\u00a0 <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc malesuada feugiat nulla non viverra. Quisque auctor elementum augue et varius. In hac habitasse platea dictumst. Etiam ornare mi lacus, vel bibendum mi lobortis eu. Maecenas feugiat, tortor nec pretium tempor, odio ligula vehicula metus, non convallis leo ex at lacus.<\/p>\n","protected":false},"author":2,"featured_media":2235,"parent":2211,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2419","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Two Keys That Lock Down Your Database - Solusoft<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Two Keys That Lock Down Your Database - Solusoft\" \/>\n<meta property=\"og:description\" content=\"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc malesuada feugiat nulla non viverra. Quisque auctor elementum augue et varius. In hac habitasse platea dictumst. Etiam ornare mi lacus, vel bibendum mi lobortis eu. Maecenas feugiat, tortor nec pretium tempor, odio ligula vehicula metus, non convallis leo ex at lacus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/\" \/>\n<meta property=\"og:site_name\" content=\"Solusoft\" \/>\n<meta property=\"og:image\" content=\"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"592\" \/>\n\t<meta property=\"og:image:height\" content=\"462\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-two-keys-that-lock-down-your-database\\\/\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-two-keys-that-lock-down-your-database\\\/\",\"name\":\"The Two Keys That Lock Down Your Database - Solusoft\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-two-keys-that-lock-down-your-database\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-two-keys-that-lock-down-your-database\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/why_solusoft_img2.png\",\"datePublished\":\"2026-04-14T15:55:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-two-keys-that-lock-down-your-database\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-two-keys-that-lock-down-your-database\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-two-keys-that-lock-down-your-database\\\/#primaryimage\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/why_solusoft_img2.png\",\"contentUrl\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/why_solusoft_img2.png\",\"width\":592,\"height\":462},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-two-keys-that-lock-down-your-database\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Success Stories\u200b\",\"item\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Two Keys That Lock Down Your Database\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#website\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/\",\"name\":\"Solusoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#organization\",\"name\":\"Solusoft\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/logo-solusoft.png\",\"contentUrl\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/logo-solusoft.png\",\"width\":350,\"height\":38,\"caption\":\"Solusoft\"},\"image\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/instagram.com\\\/solusoftlatam\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/solusoft\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Two Keys That Lock Down Your Database - Solusoft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/","og_locale":"en_US","og_type":"article","og_title":"The Two Keys That Lock Down Your Database - Solusoft","og_description":"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc malesuada feugiat nulla non viverra. Quisque auctor elementum augue et varius. In hac habitasse platea dictumst. Etiam ornare mi lacus, vel bibendum mi lobortis eu. Maecenas feugiat, tortor nec pretium tempor, odio ligula vehicula metus, non convallis leo ex at lacus.","og_url":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/","og_site_name":"Solusoft","og_image":[{"width":592,"height":462,"url":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/","url":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/","name":"The Two Keys That Lock Down Your Database - Solusoft","isPartOf":{"@id":"https:\/\/solusoft.digitalchif.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/#primaryimage"},"image":{"@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/#primaryimage"},"thumbnailUrl":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png","datePublished":"2026-04-14T15:55:49+00:00","breadcrumb":{"@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/#primaryimage","url":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png","contentUrl":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png","width":592,"height":462},{"@type":"BreadcrumbList","@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-two-keys-that-lock-down-your-database\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/solusoft.digitalchif.com\/"},{"@type":"ListItem","position":2,"name":"Success Stories\u200b","item":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/"},{"@type":"ListItem","position":3,"name":"The Two Keys That Lock Down Your Database"}]},{"@type":"WebSite","@id":"https:\/\/solusoft.digitalchif.com\/#website","url":"https:\/\/solusoft.digitalchif.com\/","name":"Solusoft","description":"","publisher":{"@id":"https:\/\/solusoft.digitalchif.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/solusoft.digitalchif.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/solusoft.digitalchif.com\/#organization","name":"Solusoft","url":"https:\/\/solusoft.digitalchif.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/solusoft.digitalchif.com\/#\/schema\/logo\/image\/","url":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/logo-solusoft.png","contentUrl":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/logo-solusoft.png","width":350,"height":38,"caption":"Solusoft"},"image":{"@id":"https:\/\/solusoft.digitalchif.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/instagram.com\/solusoftlatam","https:\/\/www.linkedin.com\/company\/solusoft"]}]}},"_links":{"self":[{"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages\/2419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/comments?post=2419"}],"version-history":[{"count":4,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages\/2419\/revisions"}],"predecessor-version":[{"id":2481,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages\/2419\/revisions\/2481"}],"up":[{"embeddable":true,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages\/2211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/media\/2235"}],"wp:attachment":[{"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/media?parent=2419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}