HTTP 200 OK
Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"content_customizations": null,
"shortcut_customizations": [
{
"id": 3541,
"created_at": "2022-11-14T13:20:45.689648Z",
"updated_at": "2022-11-14T13:20:45.694753Z",
"action": "DOWNLOAD",
"color": "#FFFFFF",
"icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/c7ba4e563b7b4d3ea5912feaf20a1a44/download_icon.svg",
"additional_data": {
"download_url": "https://media.celero.io/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/original_file.pdf"
},
"content": 4245
}
],
"content_thumbnail": {
"original": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails/1.jpg",
"high_quality": {
"small": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1.jpg",
"medium": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1_medium.jpg",
"large": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1_large.jpg",
"microsite_preview": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/preview.jpg"
}
},
"version": {
"version_number": 1,
"version_details": {
"uuid": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
"name": "Cognyte_TL_How_Security_Analytics_EB_SP",
"is_live": true,
"access_control": {
"min_stage": "EVERYONE_ALLOWED",
"stage_options": {
"UNVERIFIED_CONTACT": {
"form_preview": "LANDING_PAGE",
"form_id": "default"
},
"VERIFIED_CONTACT": {
"form_preview": "LANDING_PAGE"
},
"GDPR_CONSENT": {},
"PRIVATE": {},
"EVERYONE_ALLOWED": {}
}
},
"base_shorten": null,
"tags": []
},
"is_active": true,
"type": "DESKTOP",
"version": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
"content_uuid": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
"version_id": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865"
},
"custom_events": [],
"content_action": null,
"content_stats": null,
"content_meta_tags": {
"url_title": "cognyte-tl-how-security-analytics-eb-sp",
"title": "How Security Analytics Transforms the Ba",
"description": "LAS ANALÍTICAS LAS ANALÍTICAS DE SEGURIDAD DE SEGURIDAD ESTÁN TRANSFORMANDO LA LUCHA CONTRA EL CRIMEN Y EL TERRORISMO CONTRA EL CRIMEN Y EL TERRORISMO ¿CÓMO ? ",
"og_enabled": true,
"seo_enabled": true,
"version": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865"
},
"keywords": [],
"seo_content_version_name": "cognyte-tl-how-security-analytics-eb-sp",
"html_snippets": null,
"is_live": true,
"shorten": "https://engage.cognyte.com/s/b05bd0b1/cognyte-tl-how-security-analytics-eb-sp/",
"base_url": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0",
"config": {
"pagecount": 9,
"bounds": [
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
],
[
909,
1286
]
]
},
"annotations": {
"pages": [
{
"page": 3,
"annotations": [
{
"type": "Link",
"bounds": [
261,
353,
358,
15
],
"objref": "139",
"action": {
"type": "URI",
"uri": "https://www.cognyte.com/get-resource/analytics-platform/51e2038e383ecfc953bf1ab5a0747c63/"
}
},
{
"type": "Link",
"bounds": [
74,
370,
193,
17
],
"objref": "140",
"action": {
"type": "URI",
"uri": "https://www.cognyte.com/get-resource/analytics-platform/51e2038e383ecfc953bf1ab5a0747c63/"
}
}
]
},
{
"page": 9,
"annotations": [
{
"type": "Link",
"bounds": [
75,
1054,
116,
35
],
"objref": "367",
"action": {
"type": "URI",
"uri": "https://analytics.cognyte.com/security-analytics-video-sp"
}
}
]
}
]
},
"created_at": "2022-11-14T13:20:45.412072Z",
"updated_at": "2026-02-22T10:38:02.654722Z",
"original_name": "How-Security-Analytics-Transforms-the-Crime-Terror-Landscape_SP.pdf",
"uuid": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
"description": "LAS ANALÍTICAS LAS ANALÍTICAS DE SEGURIDAD DE SEGURIDAD ESTÁN TRANSFORMANDO LA LUCHA CONTRA EL CRIMEN Y EL TERRORISMO CONTRA EL CRIMEN Y EL TERRORISMO ¿CÓMO ? ",
"is_high_quality_thumbnails_available": true,
"conversion_type": "DOCUMENT"
}