{"id":2422,"date":"2026-04-14T10:55:49","date_gmt":"2026-04-14T15:55:49","guid":{"rendered":"https:\/\/solusoft.digitalchif.com\/?page_id=2422"},"modified":"2026-04-14T10:55:49","modified_gmt":"2026-04-14T15:55:49","slug":"the-attacks-hiding-inside-your-operations","status":"publish","type":"page","link":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/","title":{"rendered":"The Attacks Hiding Inside Your Operations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2422\" class=\"elementor elementor-2422\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce81235 e-flex e-con-boxed e-con e-parent\" data-id=\"ce81235\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6cc8bca e-con-full e-flex e-con e-child\" data-id=\"6cc8bca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a68862 elementor-widget elementor-widget-heading\" data-id=\"6a68862\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Attacks Hiding Inside Your Operations<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c07114c elementor-widget elementor-widget-heading\" data-id=\"c07114c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How TLPO threats bypass traditional defenses by targeting your operational processes \u2014 and what Solusoft does about it<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c02de5b e-con-full e-flex e-con e-child\" data-id=\"c02de5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ae6c3a3 e-con-full e-flex e-con e-child\" data-id=\"ae6c3a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5906136 elementor-widget elementor-widget-text-editor\" data-id=\"5906136\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>The Threat<\/strong><\/p><p>Traditional cybersecurity focuses on the perimeter. TLPO attacks target the business processes themselves, corrupting the systems that run your operations from the inside \u2014 bypassing perimeter defenses entirely.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eea0a80 e-con-full e-flex e-con e-child\" data-id=\"eea0a80\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef58436 elementor-widget elementor-widget-text-editor\" data-id=\"ef58436\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>The Cost<\/strong><\/p><p>NotPetya cost Maersk $300 million in 2017. Logistics companies lose up to 10% of monthly revenue when inventory systems go down. These aren&#8217;t edge cases \u2014 they&#8217;re the new normal for unprotected businesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b807c97 e-con-full e-flex e-con e-child\" data-id=\"b807c97\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f1c87f1 e-con-full e-flex e-con e-child\" data-id=\"f1c87f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b26df19 elementor-widget elementor-widget-heading\" data-id=\"b26df19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Success <span>Stories<\/span>\n <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-885aac1 e-con-full e-flex e-con e-child\" data-id=\"885aac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-81359df e-con-full e-flex e-con e-child\" data-id=\"81359df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04e01fe elementor-widget elementor-widget-text-editor\" data-id=\"04e01fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Solusoft starts by mapping your critical business processes \u2014 identifying which operational systems, if disrupted, would cause the most damage to your revenue and continuity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2c698c e-con-full e-flex e-con e-child\" data-id=\"e2c698c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8bfc9d elementor-widget elementor-widget-text-editor\" data-id=\"c8bfc9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Using AI-powered anomaly detection and machine learning, Solusoft monitors operational process behavior in real time \u2014 catching deviations from normal patterns before they cascade into system-wide failures.<\/p><p>Beyond detection, Solusoft hardens the operational layer itself \u2014 protecting the specific business process touchpoints that TLPO attackers target, and building runbooks that keep IT teams focused on strategy instead of permanent crisis response.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c80fee1 e-con-full e-flex e-con e-child\" data-id=\"c80fee1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fce5d69 e-con-full e-flex e-con e-child\" data-id=\"fce5d69\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dbf4ed elementor-widget elementor-widget-heading\" data-id=\"3dbf4ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Takeaways<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39b8b7f elementor-widget elementor-widget-text-editor\" data-id=\"39b8b7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul role=\"list\"><li><strong>Process-Level Threat Detection \u2014 <\/strong>AI and ML tools monitor operational system behavior \u2014 identifying unusual patterns that bypass traditional perimeter defenses.<\/li><li><strong>Critical Process Mapping \u2014 <\/strong>Every business process that could be weaponized against your operations is identified, documented, and hardened.<\/li><li><strong>Reduced Productivity Loss \u2014 <\/strong>Organizations with proactive TLPO defenses avoid the 25% productivity redirect that occurs when teams drop everything to contain an attack.<\/li><li><strong>Resilient Supply Chain \u2014 <\/strong>Digital supply chain touchpoints are protected against infiltration \u2014 preventing cascading failures.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20345a4 e-con-full e-flex e-con e-child\" data-id=\"20345a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2f6621 elementor-widget elementor-widget-image\" data-id=\"e2f6621\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"590\" height=\"532\" src=\"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/04\/Group-1000001531.png\" class=\"attachment-large size-large wp-image-2324\" alt=\"\" srcset=\"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/04\/Group-1000001531.png 590w, https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/04\/Group-1000001531-300x271.png 300w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-83d83d4 e-con-full e-flex e-con e-child\" data-id=\"83d83d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ef66c2 elementor-widget elementor-widget-text-editor\" data-id=\"4ef66c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><em>&#8220;Traditional perimeter defenses weren&#8217;t built for attacks that target your operational processes. You need a layer of protection that understands how your business actually runs.&#8221;<\/em><\/p><p><strong>\u2014 Solusoft Advisory Team<\/strong><\/p><p><em>The most damaging attacks don&#8217;t come through your front door \u2014 they come through the systems your business can&#8217;t stop using, at exactly the moment you can least afford it.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e4feff e-con-full e-flex e-con e-child\" data-id=\"1e4feff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5c4f6d elementor-widget elementor-widget-heading\" data-id=\"b5c4f6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Are Your Operational Processes Protected Against Next-Generation Threats?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe420c0 elementor-widget elementor-widget-text-editor\" data-id=\"fe420c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Solusoft maps and hardens your operational layer \u2014 before attackers find their way in.<\/p><p><strong>\u00a0 Book a Call\u00a0 <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc malesuada feugiat nulla non viverra. Quisque auctor elementum augue et varius. In hac habitasse platea dictumst. Etiam ornare mi lacus, vel bibendum mi lobortis eu. Maecenas feugiat, tortor nec pretium tempor, odio ligula vehicula metus, non convallis leo ex at lacus.<\/p>\n","protected":false},"author":2,"featured_media":2235,"parent":2211,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2422","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Attacks Hiding Inside Your Operations - Solusoft<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Attacks Hiding Inside Your Operations - Solusoft\" \/>\n<meta property=\"og:description\" content=\"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc malesuada feugiat nulla non viverra. Quisque auctor elementum augue et varius. In hac habitasse platea dictumst. Etiam ornare mi lacus, vel bibendum mi lobortis eu. Maecenas feugiat, tortor nec pretium tempor, odio ligula vehicula metus, non convallis leo ex at lacus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Solusoft\" \/>\n<meta property=\"og:image\" content=\"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"592\" \/>\n\t<meta property=\"og:image:height\" content=\"462\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-attacks-hiding-inside-your-operations\\\/\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-attacks-hiding-inside-your-operations\\\/\",\"name\":\"The Attacks Hiding Inside Your Operations - Solusoft\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-attacks-hiding-inside-your-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-attacks-hiding-inside-your-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/why_solusoft_img2.png\",\"datePublished\":\"2026-04-14T15:55:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-attacks-hiding-inside-your-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-attacks-hiding-inside-your-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-attacks-hiding-inside-your-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/why_solusoft_img2.png\",\"contentUrl\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/why_solusoft_img2.png\",\"width\":592,\"height\":462},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/the-attacks-hiding-inside-your-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Success Stories\u200b\",\"item\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/index.php\\\/success-stories\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Attacks Hiding Inside Your Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#website\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/\",\"name\":\"Solusoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#organization\",\"name\":\"Solusoft\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/logo-solusoft.png\",\"contentUrl\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/logo-solusoft.png\",\"width\":350,\"height\":38,\"caption\":\"Solusoft\"},\"image\":{\"@id\":\"https:\\\/\\\/solusoft.digitalchif.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/instagram.com\\\/solusoftlatam\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/solusoft\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Attacks Hiding Inside Your Operations - Solusoft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/","og_locale":"en_US","og_type":"article","og_title":"The Attacks Hiding Inside Your Operations - Solusoft","og_description":"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc malesuada feugiat nulla non viverra. Quisque auctor elementum augue et varius. In hac habitasse platea dictumst. Etiam ornare mi lacus, vel bibendum mi lobortis eu. Maecenas feugiat, tortor nec pretium tempor, odio ligula vehicula metus, non convallis leo ex at lacus.","og_url":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/","og_site_name":"Solusoft","og_image":[{"width":592,"height":462,"url":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/","url":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/","name":"The Attacks Hiding Inside Your Operations - Solusoft","isPartOf":{"@id":"https:\/\/solusoft.digitalchif.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/#primaryimage"},"image":{"@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png","datePublished":"2026-04-14T15:55:49+00:00","breadcrumb":{"@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/#primaryimage","url":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png","contentUrl":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/why_solusoft_img2.png","width":592,"height":462},{"@type":"BreadcrumbList","@id":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/the-attacks-hiding-inside-your-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/solusoft.digitalchif.com\/"},{"@type":"ListItem","position":2,"name":"Success Stories\u200b","item":"https:\/\/solusoft.digitalchif.com\/index.php\/success-stories\/"},{"@type":"ListItem","position":3,"name":"The Attacks Hiding Inside Your Operations"}]},{"@type":"WebSite","@id":"https:\/\/solusoft.digitalchif.com\/#website","url":"https:\/\/solusoft.digitalchif.com\/","name":"Solusoft","description":"","publisher":{"@id":"https:\/\/solusoft.digitalchif.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/solusoft.digitalchif.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/solusoft.digitalchif.com\/#organization","name":"Solusoft","url":"https:\/\/solusoft.digitalchif.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/solusoft.digitalchif.com\/#\/schema\/logo\/image\/","url":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/logo-solusoft.png","contentUrl":"https:\/\/solusoft.digitalchif.com\/wp-content\/uploads\/2026\/03\/logo-solusoft.png","width":350,"height":38,"caption":"Solusoft"},"image":{"@id":"https:\/\/solusoft.digitalchif.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/instagram.com\/solusoftlatam","https:\/\/www.linkedin.com\/company\/solusoft"]}]}},"_links":{"self":[{"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages\/2422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/comments?post=2422"}],"version-history":[{"count":4,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages\/2422\/revisions"}],"predecessor-version":[{"id":2502,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages\/2422\/revisions\/2502"}],"up":[{"embeddable":true,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/pages\/2211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/media\/2235"}],"wp:attachment":[{"href":"https:\/\/solusoft.digitalchif.com\/index.php\/wp-json\/wp\/v2\/media?parent=2422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}