{"id":362,"date":"2024-03-12T07:08:18","date_gmt":"2024-03-12T07:08:18","guid":{"rendered":"https:\/\/cyberwissen.io\/pt\/solution\/managed-security-services-mss-copy\/"},"modified":"2024-03-25T09:19:51","modified_gmt":"2024-03-25T09:19:51","slug":"managed-it-services","status":"publish","type":"solution","link":"https:\/\/cyberwissen.io\/pt\/solution\/managed-it-services\/","title":{"rendered":"Managed IT Services"},"content":{"rendered":"<section id=\"whyChoose\" class=\"bg_1\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h3 class=\"bold primary uppercase\">Why Choose CyberWissen\u2019s Managed IT Services? <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row scroll-solution-tiles\">\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1058739808  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/029-mission.svg\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Expertise and Specialization: <\/h4>\n<p>Trust in our seasoned professionals to manage your systems with unparalleled expertise, allowing you to focus on driving your core business forward.<br \/>\nLearn more<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1602973129  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/022-financial.svg\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Cost Efficiency <\/h4>\n<p>Benefit from cost-effective IT management solutions that optimise resource allocation, saving you both time and money.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1993744539  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/014-research.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Proactive Monitoring <\/h4>\n<p>Stay ahead of potential issues with our round-the-clock monitoring, ensuring uninterrupted operations and minimal downtime for your business.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1109393314  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/023-global-connection.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Scalability <\/h4>\n<p>Adapt effortlessly to the evolving needs of your business with our scalable services, ensuring your IT solutions grow alongside your organisation.\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=2084882789  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/007-mission.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Focus on Core Business <\/h4>\n<p>Redirect your valuable time and energy towards achieving your business goals while we efficiently manage your IT infrastructure.\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1237210310  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/Security-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Enhanced Security <\/h4>\n<p>Rest easy knowing your digital assets are safeguarded with our comprehensive security measures, providing advanced protection against threats and unauthorised access.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1636265230  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/008-ideas.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Efficient Problem Resolution <\/h4>\n<p>Experience swift and efficient resolution of technical challenges with our rapid-response support, minimising disruptions and ensuring smooth business operations.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<section id=\"\" class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"primary uppercase\"> Our Services <\/h4>\n<h3 class=\"  \">At CyberWissen, we offer a comprehensive range of Managed IT Services designed to elevate your digital infrastructure to new heights.  <\/h3>\n<p class=\"xl\">\n<p>Our services include:<\/p>\n<p>\n<\/p>\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row \">\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=648344792  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/Infrastructure.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Infrastructure Management:<\/h4>\n<p><p>Ensure the reliability and robustness of your IT operations with our expertise in server health, network optimization, and storage solutions.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=721603327  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/004-cyber-security.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Security  Management:<\/h4>\n<p><p>Safeguard your data with our vigilant approach to security, featuring firewalls, malware protection, data encryption, and intrusion prevention measures.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=370187200  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/034-data-security.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Data Backup  and Recovery:<\/h4>\n<p><p>Protect your valuable data from unforeseen disasters with our reliable data backup solutions and efficient recovery strategies.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=67181367  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/012-monitoring.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Remote Monitoring  and Support:<\/h4>\n<p><p>Keep your systems in check with our 24\/7 monitoring and remote troubleshooting services, minimising disruptions to your operations.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=557942460  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/007-software.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Software  Management:<\/h4>\n<p><p>Stay secure and up-to-date with our patch management and software compliance services, ensuring your software environment remains resilient.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=892378964  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/021-user.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Help Desk and End-User Support:<\/h4>\n<p><p>Access expert technical assistance and troubleshooting whenever you need it, ensuring smooth operations for your end-users.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1043172229  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/021-cloud-computing.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Cloud Services:<\/h4>\n<p><p>Navigate the cloud confidently with our support in migration, management, and optimization of cloud resources tailored to your needs.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1492221642  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/034-vulnerability.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">IT Strategy  and Planning:<\/h4>\n<p><p>Collaborate with us to align your IT strategies with your business objectives, ensuring sustainable growth and innovation.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1339124618  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/004-authorization.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Vendor  Management:<\/h4>\n<p><p>Simplify technology procurement and vendor relationships with our expert management, enabling informed decisions without the hassle.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=97719310  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/019-analysis.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Reporting  and Analytics:<\/h4>\n<p><p>Stay informed with detailed performance reports and actionable insights, continually enhancing your IT infrastructure&#8217;s efficiency.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n \n<section class=\"\">\n    <div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-center\">\n  \n\n\n<div class=\"col-lg-6 col-xs-12 text-left\"> \n<div class=\"padR50\">\n\n  \n         \n      \n      \n         \n        \n   <div class=\"white\">   \n   <h5>Partner with CyberWissen today to revolutionise your IT landscape, drive unprecedented success for your business, and embark on a journey towards unmatched efficiency, security, and innovation. Contact us now to get started!<\/h5><br \/>\n   \n   \n \n\n \n       \n       \n         \n   \n    \n    \n   \n   <\/div>\n  \n   <div class=\"vGap25\"><\/div>\n      \n      \n\n   \n \n<\/ul>\n<\/div>\n\n<\/div>\n\n   <div class=\"col-lg-6 col-xs-12 text-left\"> \n<div class=\"padL50\">\n\n   \n<\/ul>\n\n <\/div>\n<\/div>\n  \n \n<\/div>\n    <div class=\"vGap15\"><\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Our experienced team and cutting-edge solutions ensure reliable and efficient IT management tailored to your needs. Whether small business or large enterprise, we&#8217;re here to drive your success through hassle-free IT management. Let&#8217;s achieve your business goals together with confidence and peace of mind<\/p>\n","protected":false},"featured_media":2722,"template":"","meta":{"inline_featured_image":false},"class_list":["post-362","solution","type-solution","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution\/362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution"}],"about":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/types\/solution"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media\/2722"}],"wp:attachment":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media?parent=362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}