{"id":10740,"date":"2022-09-05T16:18:55","date_gmt":"2022-09-05T16:18:55","guid":{"rendered":"https:\/\/www.sifytechnologies.com\/?p=10740"},"modified":"2022-09-09T08:24:16","modified_gmt":"2022-09-09T08:24:16","slug":"teqzest-security-summit-2017","status":"publish","type":"post","link":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/","title":{"rendered":"TEQzest Security Summit 2017"},"content":{"rendered":"\n<div class=\"post-pad-tp-btm-20 post-border-bottom \">\n<p>&#8220;Sify TEQzest&#8221; the first exclusive Security Summit event held in association with Akamai on December 20th, 2017<\/p>\n<p>Vijay Rama Chandran, an industry veteran in the IT security domain, shared insights from his recent &#8220;Digital Transformation Audit 2017&#8221; on key concerns faced by leading organizations during their digital transformation journey and how players like Sify and Akamai should step in to address it.<\/p>\n<p>Palaniraja M. spoke about Sify&#8217;s capabilities that organizations should consider to build a impregnable security-multi-layer defense covering their access, network and platform layer. Bruno R. Goveas from Akamai presented the Zero Trust Security Model for enterprise threat protection thus emphasizing a strong partnership with Sify, that can help organizations adapt to the current threats without any compromises on performance.<\/p>\n<\/div>\n<div class=\"post-pad-tp-btm-20 post-border-bottom \">\n<h4 class=\"fontweight600 marginbottom10\">Venue<\/h4>\n<p>Claridges, New Delhi<\/p>\n<h4 class=\"fontweight600 marginbottom10\"> Date <\/h4>\n<p>20 Dec 2017<\/p>\n<h4 class=\"fontweight600 marginbottom10\"> Organizers <\/h4>\n<p>Sify Technologies Ltd<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img2.jpeg\" alt=\"\" class=\"wp-image-10744\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img2.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img2-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img2-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img3.jpeg\" alt=\"\" class=\"wp-image-10745\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img3.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img3-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img3-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img4.jpeg\" alt=\"\" class=\"wp-image-10746\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img4.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img4-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img4-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img5.jpeg\" alt=\"\" class=\"wp-image-10747\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img5.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img5-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img5-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img6.jpeg\" alt=\"\" class=\"wp-image-10748\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img6.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img6-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img6-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img7.jpeg\" alt=\"\" class=\"wp-image-10749\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img7.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img7-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img7-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img8.jpeg\" alt=\"\" class=\"wp-image-10750\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img8.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img8-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img8-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img9.jpeg\" alt=\"\" class=\"wp-image-10751\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img9.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img9-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img9-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.sifytechnologies.com\/wp-content\/uploads\/2022\/09\/security_summit_2017_img10.jpeg\" alt=\"\" class=\"wp-image-10752\" srcset=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img10.jpeg 800w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img10-300x225.jpeg 300w, http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img10-768x576.jpeg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Sify TEQzest&#8221; the first exclusive Security Summit event held in association with Akamai on December 20th, 2017 Vijay Rama Chandran, an industry veteran in the IT security domain, shared insights from his recent &#8220;Digital Transformation Audit 2017&#8221; on key concerns faced by leading organizations during their digital transformation journey and how players like Sify and Akamai should step in to address it. Palaniraja M. spoke about Sify&#8217;s capabilities that organizations should consider to build a impregnable security-multi-layer defense covering their access, network and platform layer. Bruno R. Goveas from Akamai presented the Zero Trust Security Model for enterprise threat protection thus emphasizing a strong partnership with Sify, that can help organizations adapt to the current threats without any compromises on performance. Venue Claridges, New Delhi Date 20 Dec 2017 Organizers Sify Technologies Ltd<\/p>\n","protected":false},"author":1,"featured_media":10743,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[91],"tags":[],"class_list":["post-10740","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TEQzest Security Summit 2017 - Sify Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TEQzest Security Summit 2017 - Sify Technologies\" \/>\n<meta property=\"og:description\" content=\"&#8220;Sify TEQzest&#8221; the first exclusive Security Summit event held in association with Akamai on December 20th, 2017 Vijay Rama Chandran, an industry veteran in the IT security domain, shared insights from his recent &#8220;Digital Transformation Audit 2017&#8221; on key concerns faced by leading organizations during their digital transformation journey and how players like Sify and Akamai should step in to address it. Palaniraja M. spoke about Sify&#8217;s capabilities that organizations should consider to build a impregnable security-multi-layer defense covering their access, network and platform layer. Bruno R. Goveas from Akamai presented the Zero Trust Security Model for enterprise threat protection thus emphasizing a strong partnership with Sify, that can help organizations adapt to the current threats without any compromises on performance. Venue Claridges, New Delhi Date 20 Dec 2017 Organizers Sify Technologies Ltd\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"Sify Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-05T16:18:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-09T08:24:16+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sify Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sify Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/\"},\"author\":{\"name\":\"Sify Technologies\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/person\/1a38acb3aa7a01be42e656ef80c7c855\"},\"headline\":\"TEQzest Security Summit 2017\",\"datePublished\":\"2022-09-05T16:18:55+00:00\",\"dateModified\":\"2022-09-09T08:24:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/\"},\"wordCount\":132,\"publisher\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#organization\"},\"articleSection\":[\"Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/\",\"url\":\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/\",\"name\":\"TEQzest Security Summit 2017 - Sify Technologies\",\"isPartOf\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#website\"},\"datePublished\":\"2022-09-05T16:18:55+00:00\",\"dateModified\":\"2022-09-09T08:24:16+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/www.sifytechnologies.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TEQzest Security Summit 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#website\",\"url\":\"http:\/\/www.sifytechnologies.com\/us\/\",\"name\":\"Sify Technologies\",\"description\":\"Keeping you ahead\",\"publisher\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.sifytechnologies.com\/us\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#organization\",\"name\":\"Sify Technologies\",\"url\":\"http:\/\/www.sifytechnologies.com\/us\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/04\/Sifylogo.png\",\"contentUrl\":\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/04\/Sifylogo.png\",\"width\":156,\"height\":89,\"caption\":\"Sify Technologies\"},\"image\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/person\/1a38acb3aa7a01be42e656ef80c7c855\",\"name\":\"Sify Technologies\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/061c062f94c30096566e5955be354dc6d39f9df4738ab2cdb1890c8002f176d3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/061c062f94c30096566e5955be354dc6d39f9df4738ab2cdb1890c8002f176d3?s=96&d=mm&r=g\",\"caption\":\"Sify Technologies\"},\"sameAs\":[\"https:\/\/www.sifytechnologies.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TEQzest Security Summit 2017 - Sify Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/","og_locale":"en_US","og_type":"article","og_title":"TEQzest Security Summit 2017 - Sify Technologies","og_description":"&#8220;Sify TEQzest&#8221; the first exclusive Security Summit event held in association with Akamai on December 20th, 2017 Vijay Rama Chandran, an industry veteran in the IT security domain, shared insights from his recent &#8220;Digital Transformation Audit 2017&#8221; on key concerns faced by leading organizations during their digital transformation journey and how players like Sify and Akamai should step in to address it. Palaniraja M. spoke about Sify&#8217;s capabilities that organizations should consider to build a impregnable security-multi-layer defense covering their access, network and platform layer. Bruno R. Goveas from Akamai presented the Zero Trust Security Model for enterprise threat protection thus emphasizing a strong partnership with Sify, that can help organizations adapt to the current threats without any compromises on performance. Venue Claridges, New Delhi Date 20 Dec 2017 Organizers Sify Technologies Ltd","og_url":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/","og_site_name":"Sify Technologies","article_published_time":"2022-09-05T16:18:55+00:00","article_modified_time":"2022-09-09T08:24:16+00:00","og_image":[{"width":800,"height":600,"url":"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2022\/09\/security_summit_2017_img1.jpeg","type":"image\/jpeg"}],"author":"Sify Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sify Technologies","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/#article","isPartOf":{"@id":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/"},"author":{"name":"Sify Technologies","@id":"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/person\/1a38acb3aa7a01be42e656ef80c7c855"},"headline":"TEQzest Security Summit 2017","datePublished":"2022-09-05T16:18:55+00:00","dateModified":"2022-09-09T08:24:16+00:00","mainEntityOfPage":{"@id":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/"},"wordCount":132,"publisher":{"@id":"http:\/\/www.sifytechnologies.com\/us\/#organization"},"articleSection":["Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/","url":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/","name":"TEQzest Security Summit 2017 - Sify Technologies","isPartOf":{"@id":"http:\/\/www.sifytechnologies.com\/us\/#website"},"datePublished":"2022-09-05T16:18:55+00:00","dateModified":"2022-09-09T08:24:16+00:00","breadcrumb":{"@id":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.sifytechnologies.com\/us\/events\/teqzest-security-summit-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.sifytechnologies.com\/us\/"},{"@type":"ListItem","position":2,"name":"TEQzest Security Summit 2017"}]},{"@type":"WebSite","@id":"http:\/\/www.sifytechnologies.com\/us\/#website","url":"http:\/\/www.sifytechnologies.com\/us\/","name":"Sify Technologies","description":"Keeping you ahead","publisher":{"@id":"http:\/\/www.sifytechnologies.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.sifytechnologies.com\/us\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/www.sifytechnologies.com\/us\/#organization","name":"Sify Technologies","url":"http:\/\/www.sifytechnologies.com\/us\/","sameAs":[],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/logo\/image\/","url":"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/04\/Sifylogo.png","contentUrl":"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/04\/Sifylogo.png","width":156,"height":89,"caption":"Sify Technologies"},"image":{"@id":"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/person\/1a38acb3aa7a01be42e656ef80c7c855","name":"Sify Technologies","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/061c062f94c30096566e5955be354dc6d39f9df4738ab2cdb1890c8002f176d3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/061c062f94c30096566e5955be354dc6d39f9df4738ab2cdb1890c8002f176d3?s=96&d=mm&r=g","caption":"Sify Technologies"},"sameAs":["https:\/\/www.sifytechnologies.com"]}]}},"_links":{"self":[{"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/posts\/10740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/comments?post=10740"}],"version-history":[{"count":3,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/posts\/10740\/revisions"}],"predecessor-version":[{"id":11218,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/posts\/10740\/revisions\/11218"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/media\/10743"}],"wp:attachment":[{"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/media?parent=10740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/categories?post=10740"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/tags?post=10740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}