HTTP 200 OK
Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 4244,
"content_customizations": null,
"shortcut_customizations": [
{
"id": 3540,
"created_at": "2022-11-14T13:18:19.000746Z",
"updated_at": "2022-11-14T13:18:19.013251Z",
"action": "DOWNLOAD",
"color": "#FFFFFF",
"icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/977bd7b8ba2c4168974282ebcc98e7fb/download_icon.svg",
"additional_data": {
"download_url": "https://media.celero.io/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/original_file.pdf"
},
"content": 4244
}
],
"content_thumbnail": {
"original": "/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/thumbnails/1.jpg",
"high_quality": {
"small": "/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/thumbnails_high_quality/1.jpg",
"medium": "/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/thumbnails_high_quality/1_medium.jpg",
"large": "/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/thumbnails_high_quality/1_large.jpg",
"microsite_preview": "/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/thumbnails_high_quality/preview.jpg"
}
},
"edited_pages_metadata_count": {
"all_pages_count": 14,
"edited_pages_count": 0
},
"version": {
"id": 4242,
"version_number": 1,
"version_details": {
"uuid": "088c1466-6933-4777-a21c-0a6bae9580cc",
"created_at": "2022-11-14T13:18:20.124006Z",
"updated_at": "2025-03-23T10:59:09.696985Z",
"name": "Cognyte_TL_3_Key_Trends_WP_SP",
"is_live": true,
"access_control": {
"min_stage": "EVERYONE_ALLOWED",
"stage_options": {
"UNVERIFIED_CONTACT": {
"form_preview": "LANDING_PAGE",
"form_id": "default"
},
"VERIFIED_CONTACT": {
"form_preview": "LANDING_PAGE"
},
"GDPR_CONSENT": {},
"PRIVATE": {},
"EVERYONE_ALLOWED": {}
}
},
"tags": []
},
"created_at": "2022-11-14T13:18:20.136909Z",
"updated_at": "2022-11-14T13:18:20.136964Z",
"content_version_name": "3-Security-Trends-WhitePaper-SP",
"is_active": true,
"type": "DESKTOP",
"content": 4244,
"version": "088c1466-6933-4777-a21c-0a6bae9580cc",
"content_uuid": "088c1466-6933-4777-a21c-0a6bae9580cc",
"version_id": "088c1466-6933-4777-a21c-0a6bae9580cc"
},
"custom_events": [],
"content_action": null,
"content_stats": {
"version": "088c1466-6933-4777-a21c-0a6bae9580cc",
"visitors_count": 0,
"lifetime_visitors_count": 3,
"last_seen": "2023-04-03T08:52:54Z",
"last_updated": "2025-05-15T12:22:05Z",
"account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"
},
"content_meta_tags": {
"url_title": "3-key-trends-wp-sp",
"title": "3 PRINCIPALES TENDENCIAS",
"description": "ANALÍTICAS DE SEGURIDAD CONDUCIENDO LA NECESIDAD DE LAS 3 PRINCIPALES TENDENCIAS ",
"og_enabled": true,
"seo_enabled": true,
"version": "088c1466-6933-4777-a21c-0a6bae9580cc"
},
"keywords": [],
"seo_content_version_name": "cognyte-tl-3-key-trends-wp-sp",
"html_snippets": null,
"is_live": true,
"shorten": "https://engage.cognyte.com/s/7ed4484c/3-key-trends-wp-sp/",
"base_url": "/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu",
"fonts": [
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/Oswald-Regular_3-.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/Oswald-Regular_3u.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/Oswald-Regular_3w.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/Oswald-Regular_3x.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/Oswald-Regular_43.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-LightItalic_45.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Light_3t.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Light_3t_1.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Light_3t_2.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Light_3t_3.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Light_3t_4.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Light_3t_5.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Light_3z.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-MediumItalic_3y.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Medium_42.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-Medium_44.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-SemiBold_3v.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-SemiBold_41.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-SemiBold_41_1.woff",
"/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu/fonts/WorkSans-SemiBold_41_2.woff"
],
"source_url": "/users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu",
"content_type": [],
"created_at": "2022-11-14T13:18:18.725503Z",
"updated_at": "2025-05-16T00:02:16.417365Z",
"original_name": "3-Security-Trends-WhitePaper-SP.pdf",
"original_content_type": "application/pdf",
"original_file_extension": "pdf",
"original_file_size": 1323755.0,
"content_key": "users/557/content/9b6de328f53a42529c215146ec572142/_q6KgwOu",
"annotations": {
"pages": [
{
"page": 14,
"annotations": [
{
"type": "TextLink",
"bounds": [
72,
610,
96,
12
],
"action": {
"type": "URI",
"uri": "https://go.chainal"
}
},
{
"type": "TextLink",
"bounds": [
72,
688,
96,
12
],
"action": {
"type": "URI",
"uri": "https://info.clarot"
}
},
{
"type": "TextLink",
"bounds": [
74,
862,
231,
12
],
"action": {
"type": "URI",
"uri": "https://fas.org/sgp/crs/natsec/R45178.pdf"
}
},
{
"type": "TextLink",
"bounds": [
77,
940,
200,
12
],
"action": {
"type": "URI",
"uri": "https://ndupress.ndu.edu/Media/Ne"
}
},
{
"type": "Link",
"bounds": [
60,
382,
154,
35
],
"objref": "136",
"action": {
"type": "URI",
"uri": "https://analytics.cognyte.com/security-analytics-video-sp"
}
}
]
}
]
},
"config": {
"pagecount": 14,
"title": "Untitled",
"author": "",
"subject": "",
"keywords": "",
"creator": "Adobe InDesign 16.1 (Windows)",
"producer": "GPL Ghostscript 9.50",
"creationdate": "D:20220119074439Z00'00'",
"moddate": "D:20220119074439Z00'00'",
"trapped": "",
"fileName": "_q6KgwOu.pdf",
"bounds": [
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
]
],
"bookmarks": [],
"thumbnailType": "jpg",
"pageType": "html",
"pageLabels": []
},
"uuid": "088c1466-6933-4777-a21c-0a6bae9580cc",
"is_public": true,
"description": "ANALÍTICAS DE SEGURIDAD CONDUCIENDO LA NECESIDAD DE LAS 3 PRINCIPALES TENDENCIAS ",
"views_count": 59,
"is_high_quality_thumbnails_available": true,
"is_archived": false,
"conversion_type": "DOCUMENT",
"user": 557
}