{"content_customizations":null,"shortcut_customizations":[{"id":7909,"created_at":"2023-11-12T12:06:47.736331Z","updated_at":"2023-11-12T12:06:47.742206Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/272/shortcut_customizations/eaf6dbc440644ea4a3ed80d3622047e4/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/272/content/8ca687b00b9b4a99b654264b721d5815/_vjyPwNn/original_file.pdf"},"content":8613}],"content_thumbnail":{"original":"/users/272/content/8ca687b00b9b4a99b654264b721d5815/_vjyPwNn/thumbnails/1.jpg","high_quality":{"small":"/users/272/content/8ca687b00b9b4a99b654264b721d5815/_vjyPwNn/thumbnails_high_quality/1.jpg","medium":"/users/272/content/8ca687b00b9b4a99b654264b721d5815/_vjyPwNn/thumbnails_high_quality/1_medium.jpg","large":"/users/272/content/8ca687b00b9b4a99b654264b721d5815/_vjyPwNn/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/272/content/8ca687b00b9b4a99b654264b721d5815/_vjyPwNn/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":1,"version_details":{"uuid":"2c74c8ab-e97e-4bc6-afbd-25065e725da4","name":"Cognyte_TL_How_Security_Analytics_EB_EN","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":"58861634","tags":[]},"is_active":true,"type":"DESKTOP","version":"2c74c8ab-e97e-4bc6-afbd-25065e725da4","content_uuid":"2c74c8ab-e97e-4bc6-afbd-25065e725da4","version_id":"2c74c8ab-e97e-4bc6-afbd-25065e725da4"},"custom_events":[],"content_action":{"id":462,"created_at":"2023-11-12T12:07:20.136806Z","updated_at":"2026-01-15T12:11:40.306607Z","is_enabled":true,"button_text":"Contact us","button_color":"#0A0F38","button_position":"BAR","destination_url":"https://www.cognyte.com/contact/","open_in_new_tab":false,"version":"2c74c8ab-e97e-4bc6-afbd-25065e725da4"},"content_stats":null,"content_meta_tags":{"url_title":"cognyte-tl-how-security-analytics-eb-en","title":"Transforms the Battle Against Crime","description":"HOW SECURITY ANALYTICS TRANSFORMS THE BATTLE AGAINST CRIME & TERROR","og_enabled":true,"seo_enabled":false,"version":"2c74c8ab-e97e-4bc6-afbd-25065e725da4"},"keywords":[],"seo_content_version_name":"cognyte-tl-how-security-analytics-eb-en","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/58861634/","base_url":"/users/272/content/8ca687b00b9b4a99b654264b721d5815/_vjyPwNn","config":{"pagecount":9,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":3,"annotations":[{"type":"Link","bounds":[197,352,416,26],"objref":"137","action":{"type":"URI","uri":"https://www.cognyte.com/blog/3-key-trends-driving-the-shift-to-security-analytics/"}}]},{"page":9,"annotations":[{"type":"Link","bounds":[74,1051,122,41],"objref":"361","action":{"type":"URI","uri":"https://www.cognyte.com/"}},{"type":"Link","bounds":[70,1044,132,55],"objref":"362","action":{"type":"URI","uri":"https://www.cognyte.com/contact/"}}]}]},"created_at":"2023-11-12T12:06:47.290796Z","updated_at":"2026-04-17T04:50:59.261027Z","original_name":"How-Security-Analytics-Transforms-the-Crime-Terror-Landscape.pdf","uuid":"2c74c8ab-e97e-4bc6-afbd-25065e725da4","description":"HOW SECURITY ANALYTICS TRANSFORMS THE BATTLE AGAINST CRIME & TERROR ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}