{"id":3130,"date":"2019-04-03T12:51:58","date_gmt":"2019-04-03T11:51:58","guid":{"rendered":"https:\/\/10.0.10.213\/?page_id=3130"},"modified":"2023-04-19T21:15:08","modified_gmt":"2023-04-19T19:15:08","slug":"stealthaudit","status":"publish","type":"page","link":"https:\/\/www.sertalink.com\/fr\/stealthaudit\/","title":{"rendered":"StealthAUDIT"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2023\/03\/purp2-1-1.png&#8221; background_position=&#8221;top_left&#8221; custom_padding=&#8221;13em||||false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;5em||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|phone&#8221; animation_style=&#8221;zoom&#8221; animation_intensity_zoom=&#8221;10%&#8221; animation_starting_opacity=&#8221;100%&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Fjalla|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;50px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;35px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>StealthAUDIT<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Montserrat Regular||||||||&#8221; text_text_color=&#8221;#bfbfbf&#8221; text_font_size=&#8221;16px&#8221; header_font=&#8221;Fjalla|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<a href=\"https:\/\/www.sertalink.com\/fr\/\" style=\"color: #fff;\">Homepage<\/a>\/ StealthAUDIT[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_text_color=&#8221;#0c71c3&#8243; text_font_size=&#8221;30&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<strong><span class=\"text-non-captial\">StealthAUDIT\u00ae Management Platform<\/span><\/strong><br \/>\n[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_font_size=&#8221;18&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]Scaling up, automating, and seamlessly integrating to maximize security &amp; governance investments.<\/p>\n<p>The platform is the power behind the StealthAUDIT products. It has the automation, management, and integration building blocks that ensure the solutions\u2019 advanced data collection and analysis deliver meaningful results to your team, your infrastructure, and your other technologies.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_text_color=&#8221;#0c71c3&#8243; text_font_size=&#8221;26&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<strong>StealthAUDIT Takes a Data Centric Audit and Protection (DCAP) approach to avoid the weaknesses of a siloed Data Security strategy.<\/strong><\/p>\n<p>&nbsp;<br \/>\n[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]Data Centric Audit and Protection is a term defined by Gartner in response to the weaknesses of the Data Security Governance practices at the time. At that time, data protection strategies focused on the security of the application, or storage system that contained the data. This focus led to a variety of technology specific security tools which tended to be owned and managed by different teams within IT. This siloed approach to data security worked well as long as the data stayed in that system, but failed to provide any protection when the data, or copies of the data were exported or copied into other unstructured applications and cloud storage systems. A change was needed, and the guidance was to take a Data Centric approach to protect access to the data no matter where it was stored, or where it moved to.<\/p>\n<p>STEALTHbits has embraced this strategy and has evolved our products and features to help our customers implement a comprehensive DCAP security focus.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_text_color=&#8221;#0c71c3&#8243; text_font_size=&#8221;26&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<strong>Data Discovery<\/strong><br \/>\n[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]STEALTHbits can discover and classify data from the largest number of data sources in the market. From structured data repositories like major business applications and databases, to semi structured repositories like business productivity software to unstructured data sources like file shares and cloud storage services, STEALTHbits can discover and classify more types of business data than any other vendor. With this capability comes the ability to recognized sensitive data types that may deserve additional protection and control. Once you understanding where the data is located and whether it\u2019s sensitive or not, you then need to understand who is accessing the data.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_text_color=&#8221;#0c71c3&#8243; text_font_size=&#8221;26&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<strong>Data Activity Monitoring<\/strong><br \/>\n[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]Once STEALTHbits has located and classified your business data across all of your applications and storage, it can then provide detailed access and activity monitoring so you know who is using the data. Along with activity, STEALTHbits gathers details about how users have been granted access, and can quickly identify unsafe \u201copen access\u201d conditions that could lead to sensitive data getting into the wrong hands. Another benefit of this access monitoring is that you can see if anyone is even using the data that is available. After all, why manage data that no one is using? This provides a great opportunity to archive off any unused data, thereby reducing the management overhead.<\/p>\n<p>Once the types of data have been identified, and user access is understood, you can then start to make some decisions about restricting access to reduce risk and secure sensitive information.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_text_color=&#8221;#0c71c3&#8243; text_font_size=&#8221;26&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<strong>Data Governance<\/strong><br \/>\n[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]The DCAP approach encourages IT teams to focus on the data, not on the underlying technology. IT is responsible for the installation, configuration and management of business applications, but who really understands the value and sensitivity of the data? The data owners, the people that created it and their managers in the lines of business. They are the ones who know if data is still relevant and needed by their teams. STEALTHbits enables IT to let the business owners decide who should have access. With automated periodic access and entitlement reviews, IT can get out of the middle and let the business leaders make decisions about what to keep and who should have access.<\/p>\n<p>Embracing a DCAP approach requires shifting the focus away from a siloed security stance to a more business informed focus data access. For more information on how STEALTHbits can provide the tools necessary to achieve a DCAP focus, visit the resource section at the bottom of this page.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_text_color=&#8221;#0c71c3&#8243; text_font_size=&#8221;30&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<strong>FEATURES AND BENEFITS<\/strong><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/sa-marketecture.png&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; admin_label=&#8221;Image&#8221; _builder_version=&#8221;3.23&#8243; animation=&#8221;off&#8221; sticky=&#8221;off&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<ul>\n<li><strong>Lightweight yet Scalable<\/strong>\u00a0\u2013 Forged in the fires of the most demanding IT infrastructures in the world, StealthAUDIT is both lightweight enough to run everywhere it\u2019s needed yet scalable enough to handle the load that spreading out far and wide brings.<\/li>\n<li><strong>Seamless Integration<\/strong>\u00a0\u2013 StealthAUDIT can push and pull data to and from dozens of technologies, including home-grown systems, to enhance the value of your other technology investments. Integrations with IAM, IAG, PIM, PAM, SIEM, CMDB, and other enterprise platforms are examples of how this integration is leveraged by our customers.<\/li>\n<li><strong>Process Automation<\/strong>\u00a0\u2013 StealthAUDIT seamlessly ties together disparate processes, creating fully automated solutions that save time, avoid unnecessary costs, and alleviate burden on IT.<\/li>\n<li><strong>End-User Workflows<\/strong>\u00a0\u2013 Not all the data you need comes from a system or application. When input and answers are required from actual human beings, StealthAUDIT provides simple, yet effective survey capabilities to retrieve and incorporate end-user feedback into the data analysis and decision-making process.<\/li>\n<li><strong>Data Analysis<\/strong>\u00a0\u2013 StealthAUDIT Analysis Modules allow you to slice-and-dice your data in every way possible, including correlation with existing and alternative data sources, easy-to-use view creation, historical trending, injection of business rules and logic, notification, exportation, and more. Users and consultants can also extend analysis with powerful SQL, PowerShell, and VB script inputs and exits.<\/li>\n<li><strong>Powerful Reporting<\/strong>\u00a0\u2013 Regardless of source, StealthAUDIT can report on any available dataset. Already have a reporting platform? StealthAUDIT can supply the comprehensive, fully integrated and analyzed data that your favorite reporting platform has been waiting for. Either way, your reports transform into the authoritative data you need to power insight and decisions.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>StealthAUDITHomepage\/ StealthAUDITStealthAUDIT\u00ae Management Platform Scaling up, automating, and seamlessly integrating to maximize security &amp; governance investments. The platform is the power behind the StealthAUDIT products. It has the automation, management, and integration building blocks that ensure the solutions\u2019 advanced data collection and analysis deliver meaningful results to your team, your infrastructure, and your other technologies. [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-3130","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>StealthAUDIT | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/stealthaudit\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"StealthAUDIT | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/stealthaudit\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-19T19:15:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/www.sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/www.sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/www.sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/www.sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/stealthaudit\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/stealthaudit\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sertalink.com\/fr\/#website\",\"url\":\"https:\/\/www.sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/www.sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/stealthaudit\/#webpage\",\"url\":\"https:\/\/sertalink.com\/stealthaudit\/\",\"name\":\"StealthAUDIT | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.sertalink.com\/fr\/#website\"},\"datePublished\":\"2019-04-03T11:51:58+00:00\",\"dateModified\":\"2023-04-19T19:15:08+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/stealthaudit\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/stealthaudit\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/stealthaudit\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/3130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=3130"}],"version-history":[{"count":2,"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/3130\/revisions"}],"predecessor-version":[{"id":18057,"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/3130\/revisions\/18057"}],"wp:attachment":[{"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=3130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}