{"version":"1.0","provider_name":"GVM-Global","provider_url":"https:\/\/www.gvm-global.com\/th","author_name":"admingvmweb2","author_url":"https:\/\/www.gvm-global.com\/th\/author\/admingvmweb2\/","title":"Endpoint Security Management - GVM-Global","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"lhPaKz1Uql\"><a href=\"https:\/\/www.gvm-global.com\/th\/deep-instinct\/\">Endpoint Security Management<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.gvm-global.com\/th\/deep-instinct\/embed\/#?secret=lhPaKz1Uql\" width=\"600\" height=\"338\" title=\"&#8220;Endpoint Security Management&#8221; &#8212; GVM-Global\" data-secret=\"lhPaKz1Uql\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.gvm-global.com\/th\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"[vc_row][vc_column][vc_single_image image=&#8221;1630&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;7\/12&#8243;][vc_column_text] We Prevent What Others Can\u2019t Find At Deep Instinct we provide resilient prevention against the ever-increasing avalanche of new and complex threats. This resilient prevention is achieved through the advanced application of deep learning to cybersecurity which enables greater protection against the failings of other solutions. [...]"}