{"id":79423,"date":"2024-06-24T11:38:19","date_gmt":"2024-06-24T03:38:19","guid":{"rendered":"https:\/\/version-2.com\/?p=79423"},"modified":"2024-06-20T11:41:02","modified_gmt":"2024-06-20T03:41:02","slug":"how-cybercare-integrated-zendesk-and-nordlayer-for-the-best-customer-support-on-the-market","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/06\/how-cybercare-integrated-zendesk-and-nordlayer-for-the-best-customer-support-on-the-market\/","title":{"rendered":"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79423\" class=\"elementor elementor-79423\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4qLiCID7HZv7SbYjb8UDec\/7ba7f5ef007fdb5a6683e1776c62408f\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"617\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">CyberCare is a beacon of customer support and stands tall with its roots firmly planted in customer experience excellence. With offices in Lithuania and Ukraine, the company\u2019s workforce of 400 employees embraces a hybrid model. CyberCare succeeds in a culture of quality and flexibility, serving millions worldwide.<\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Profile of CyberCare\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3rW2PKtJEp4QDSyt5ZCS5\/8a7b238c2b1d60ff4175fb0431350aaa\/Profile_of_CyberCare.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"537\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Darius Dagys, Head of Business Development, pilots the organization&#8217;s journey of supporting diverse cybersecurity products by leading external partnerships and automation internally. Operating with client data and handling user requests, the company understands the importance of employing the right tools to make work and security effortless and efficient.<\/p><h2 id=\"the-challenge\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The challenge<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">On a mission to secure client data effectively<\/h3><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Key pain points\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1ojaICJTdxFsa0ZiKyvNYf\/d875255a3c9691bbcdd0187b1d98b698\/Key_pain_points.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"410\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For CyberCare, the security of customer data is non-negotiable. As a company that prides itself on providing superior customer support, it became evident that an enhanced security framework was imperative.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The quest wasn&#8217;t sparked by a singular incident but by a continuous commitment to uphold the highest standards of data security and privacy.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cCustomers trust us with their data when we provide customer support, making the data paramount. To reflect how we value this trust, CyberCare follows best cybersecurity practices.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CCustomers%20trust%20us%20with%20their%20data%20when%20we%20provide%20customer%20support,%20making%20the%20data%20paramount.%20To%20reflect%20how%20we%20value%20this%20trust,%20CyberCare%20follows%20best%20cybersecurity%20practices.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-cybercare-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">CyberCare combines various technologies and solutions to achieve the best results. However, when they found themselves in need of a network security tool, the team looked for something to ease their daily tasks, maintenance, and configuration to integrate into the existing technology stack smoothly.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cWith three years of customer support experience under our belt, our team has provided over 38 million solutions to end-users. At Cybercare, we recognize the criticality of automation, the latest technologies, and top-notch quality in delivering\u00a0 services.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CWith%20three%20years%20of%20customer%20support%20experience%20under%20our%20belt,%20our%20team%20has%20provided%20over%2038%20million%20solutions%20to%20end-users.%20At%20Cybercare,%20we%20recognize%20the%20criticality%20of%20automation,%20the%20latest%20technologies,%20and%20top-notch%20quality%20in%20delivering%C2%A0%20services.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-cybercare-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Simple integration and high-security standards led the lookout for a new tool. The challenge was unique as the customer support software vendor secured part of the client data. For complete protection, CyberCare needed to ensure that access to the network is secure from its side as well.<\/p><h2 id=\"the-solution\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The solution<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">A simple and effective way to add another security layer<\/h3><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"410\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/WuPp7btI8ce8nArWNkKO1\/3c018e9b8e55fbe5f487b56539d608d9\/Main_criteria_choosing_the_solution.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Main criteria choosing the solution\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The pivot from previous VPN tools to NordLayer wasn&#8217;t a leap in the dark but a calculated step toward fortified security. NordLayer, with its robust VPN services, offered the perfect armor to shield the valuable data entrusted by clients.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cBefore NordLayer, we had a short sprint with other VPN tools, which were more complicated. They were managed manually and it was difficult to onboard and offboard new CyberCare employees.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CBefore%20NordLayer,%20we%20had%20a%20short%20sprint%20with%20other%20VPN%20tools,%20which%20were%20more%20complicated.%20They%20were%20managed%20manually%20and%20it%20was%20difficult%20to%20onboard%20and%20offboard%20new%20CyberCare%20employees.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-cybercare-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Eliminating the complexity and creating shortcuts in user management and network controls streamlined the processes of the CyberCare security team.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cIP allowlisting and creation of other policies are configured automatically, so my team doesn\u2019t have to spend much time setting up the tool.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CIP%20allowlisting%20and%20creation%20of%20other%20policies%20are%20configured%20automatically,%20so%20my%20team%20doesn%E2%80%99t%20have%20to%20spend%20much%20time%20setting%20up%20the%20tool.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-cybercare-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The most important thing is that NordLayer complemented already existing tools in use, such as SSO integration and the customer support solution Zendesk.<\/p><h2 id=\"why-choose-nordlayer\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Why choose NordLayer?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The choice was clear and devoid of lengthy deliberations. NordLayer promised simplicity, efficacy, and unwavering security.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cNordLayer solution is very simple to use\u2014no effort required.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CNordLayer%20solution%20is%20very%20simple%20to%20use%E2%80%94no%20effort%20required.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-cybercare-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">It stood out as CyberCare needed to navigate cyberspace, ensuring data remains inviolable confidently.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cHaving a combination of different security layers and solutions, I sleep well knowing that our customers&#8217; data is secure.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CHaving%20a%20combination%20of%20different%20security%20layers%20and%20solutions,%20I%20sleep%20well%20knowing%20that%20our%20customers'%20data%20is%20secure.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-cybercare-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">One of the criteria for selecting NordLayer was its adherence to security standards. Aligning with compliance requirements gives a stronger foundation to a company like CyberCare to be sure all is well on all fronts.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Strategic integration of NordLayer and Zendesk to efficiently protect customer data<\/h3><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Strategic integration of NordLayer and Zendesk to efficiently protect customer data \" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2r7yiFhMbOBNkfKUTmJzU5\/2aeeb485ce09bb62fa6bb75b9e744a56\/Scheme.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"434\" \/><\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Who? Dual synergy<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">CyberCare employs both internal policies and external tools to manage sensitive data. They emphasize selecting partners like Zendesk, known for its commitment to security and ensuring compliance with the latest standards.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Why? Strategic alignment<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Zendesk was chosen for its status as a leading CRM platform, ease of use, and significant investment in security. This partnership was based on the need for a CRM that matched CyberCare&#8217;s security requirements and business operations.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">How? The process<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">CyberCare leverages NordLayer to ensure that the login process to Zendesk is encrypted and secure. With NordLayer, they assign fixed IPs, meaning Zendesk can be accessed securely via these IPs. This setup guarantees that both the traffic within Zendesk and the access to it are encrypted and safeguarded.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">What? The usage<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The integration is seamless for employees who log into Zendesk through NordLayer without navigating complex security measures. This not only simplifies the process but also enforces a high level of security by default.<\/p><h2 id=\"the-outcome\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The outcome<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">An intuitive tool you can forget about<\/h3><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"The benefits of implementing NordLayer\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6q8H9Bxaa3F770EtRxfjPX\/da29d520332fb6f42a47e0a6afc37780\/The_benefits_of_implementing_NordLayer.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"410\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The integration of NordLayer into CyberCare&#8217;s operations marked a new dawn. With NordLayer&#8217;s intuitive design and features like 2FA, SSO, and static IPs, CyberCare not only safeguarded its data but also streamlined access and management processes.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cThere are two things about using NordLayer in the team. First, it\u2019s definitely easy, as the app always runs automatically in the background. Second, users must select the correct gateway to connect to Zendesk to do their work, so it\u2019s intuitive by design.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CThere%20are%20two%20things%20about%20using%20NordLayer%20in%20the%20team.%20First,%20it%E2%80%99s%20definitely%20easy,%20as%20the%20app%20always%20runs%20automatically%20in%20the%20background.%20Second,%20users%20must%20select%20the%20correct%20gateway%20to%20connect%20to%20Zendesk%20to%20do%20their%20work,%20so%20it%E2%80%99s%20intuitive%20by%20design.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-cybercare-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As for the tool implementation, NordLayer didn\u2019t require long preparations and complicated setups. Simple, from start to finish, the deployment and solution adoption in the team was as smooth as it gets.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cOnboarding people to NordLayer took one hour. We had to make preparations from the back end, but for the team, it was super easy. You just have an app, click connect, and you can forget about it. There was no trouble at all.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9COnboarding%20people%20to%20NordLayer%20took%20one%20hour.%20We%20had%20to%20make%20preparations%20from%20the%20back%20end,%20but%20for%20the%20team,%20it%20was%20super%20easy.%20You%20just%20have%20an%20app,%20click%20connect,%20and%20you%20can%20forget%20about%20it.%20There%20was%20no%20trouble%20at%20all.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-cybercare-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The simplicity of NordLayer&#8217;s VPN solution meant that employees could focus on their tasks without the distraction of complex security protocols.<\/p><h2 id=\"pro-cybersecurity-tips\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Pro cybersecurity tips<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Have you ever thought about your top cybersecurity hygiene actions you perform daily? It\u2019s a good question to ask yourself for a self-check because maybe today is the day you start acting a bit more secure than yesterday.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">If you don\u2019t know where to start or want to compare your habits with other professionals, here are Darius Dagys, the Head of Business Development and AI at CyberCare, the top favorite tips everyone should consider.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"569\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/11iRtN5foQdueQ8uQ2502q\/50549273304eed273f43e5c1e175a330\/Quote.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Darius Dagys, Head of Business Development @CyberCare, about cybersecurity\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In essence, the collaboration between NordLayer and Zendesk within CyberCare&#8217;s operations showcases a forward-thinking approach to data security, emphasizing ease of use without compromising on stringent security measures. This strategic choice not only aligns with their internal policies but also reinforces their commitment to protecting sensitive customer information.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a493c elementor-widget elementor-widget-text-editor\" data-id=\"c6a493c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CyberCare is a beacon of customer support and stands ta [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1130,61],"tags":[1272,974,1132],"class_list":["post-79423","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordlayer","category-press-release","tag-1272","tag-nord-security","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How CyberCare integrated Zendesk and NordLayer for the best customer support on the market - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market - Version 2\" \/>\n<meta property=\"og:description\" content=\"CyberCare is a beacon of customer support and stands ta [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-24T03:38:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4qLiCID7HZv7SbYjb8UDec\/7ba7f5ef007fdb5a6683e1776c62408f\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/how-cybercare-integrated-zendesk-and-nordlayer-for-the-best-customer-support-on-the-market\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market\",\"datePublished\":\"2024-06-24T03:38:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/how-cybercare-integrated-zendesk-and-nordlayer-for-the-best-customer-support-on-the-market\\\/\"},\"wordCount\":1155,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4qLiCID7HZv7SbYjb8UDec\\\/7ba7f5ef007fdb5a6683e1776c62408f\\\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"2024\",\"Nord Security\",\"NordLayer\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/how-cybercare-integrated-zendesk-and-nordlayer-for-the-best-customer-support-on-the-market\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/\",\"name\":\"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4qLiCID7HZv7SbYjb8UDec\\\/7ba7f5ef007fdb5a6683e1776c62408f\\\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-06-24T03:38:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4qLiCID7HZv7SbYjb8UDec\\\/7ba7f5ef007fdb5a6683e1776c62408f\\\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4qLiCID7HZv7SbYjb8UDec\\\/7ba7f5ef007fdb5a6683e1776c62408f\\\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-cybercare-x-nordlayer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/","og_locale":"zh_HK","og_type":"article","og_title":"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market - Version 2","og_description":"CyberCare is a beacon of customer support and stands ta [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/","og_site_name":"Version 2","article_published_time":"2024-06-24T03:38:19+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/4qLiCID7HZv7SbYjb8UDec\/7ba7f5ef007fdb5a6683e1776c62408f\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/06\/how-cybercare-integrated-zendesk-and-nordlayer-for-the-best-customer-support-on-the-market\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market","datePublished":"2024-06-24T03:38:19+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/06\/how-cybercare-integrated-zendesk-and-nordlayer-for-the-best-customer-support-on-the-market\/"},"wordCount":1155,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4qLiCID7HZv7SbYjb8UDec\/7ba7f5ef007fdb5a6683e1776c62408f\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["2024","Nord Security","NordLayer"],"articleSection":["2024","Nord Security","NordLayer","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/06\/how-cybercare-integrated-zendesk-and-nordlayer-for-the-best-customer-support-on-the-market\/","url":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/","name":"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4qLiCID7HZv7SbYjb8UDec\/7ba7f5ef007fdb5a6683e1776c62408f\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-06-24T03:38:19+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/4qLiCID7HZv7SbYjb8UDec\/7ba7f5ef007fdb5a6683e1776c62408f\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4qLiCID7HZv7SbYjb8UDec\/7ba7f5ef007fdb5a6683e1776c62408f\/Case_study__CyberCare_blog_cover.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/case-study-cybercare-x-nordlayer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How CyberCare integrated Zendesk and NordLayer for the best customer support on the market"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kF1","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=79423"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79423\/revisions"}],"predecessor-version":[{"id":79427,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79423\/revisions\/79427"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=79423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=79423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=79423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}