{"content_customizations":null,"shortcut_customizations":[{"id":3541,"created_at":"2022-11-14T13:20:45.689648Z","updated_at":"2022-11-14T13:20:45.694753Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/c7ba4e563b7b4d3ea5912feaf20a1a44/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/original_file.pdf"},"content":4245}],"content_thumbnail":{"original":"/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails/1.jpg","high_quality":{"small":"/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1.jpg","medium":"/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1_medium.jpg","large":"/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":1,"version_details":{"uuid":"ee08ff0d-3377-4d7f-8d19-1230a0d7e865","name":"Cognyte_TL_How_Security_Analytics_EB_SP","is_live":false,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":null,"tags":[]},"is_active":true,"type":"DESKTOP","version":"ee08ff0d-3377-4d7f-8d19-1230a0d7e865","content_uuid":"ee08ff0d-3377-4d7f-8d19-1230a0d7e865","version_id":"ee08ff0d-3377-4d7f-8d19-1230a0d7e865"},"custom_events":[],"content_action":null,"content_stats":null,"content_meta_tags":{"url_title":"cognyte-tl-how-security-analytics-eb-sp","title":"How Security Analytics Transforms the Ba","description":"LAS ANALÍTICAS LAS ANALÍTICAS DE SEGURIDAD DE SEGURIDAD ESTÁN TRANSFORMANDO LA LUCHA CONTRA EL CRIMEN Y EL TERRORISMO CONTRA EL CRIMEN Y EL TERRORISMO ¿CÓMO ? ","og_enabled":true,"seo_enabled":true,"version":"ee08ff0d-3377-4d7f-8d19-1230a0d7e865"},"keywords":[],"seo_content_version_name":"cognyte-tl-how-security-analytics-eb-sp","html_snippets":null,"is_live":false,"shorten":"https://engage.cognyte.com/s/b05bd0b1/cognyte-tl-how-security-analytics-eb-sp/","base_url":"/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0","config":{"pagecount":9,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":3,"annotations":[{"type":"Link","bounds":[261,353,358,15],"objref":"139","action":{"type":"URI","uri":"https://www.cognyte.com/get-resource/analytics-platform/51e2038e383ecfc953bf1ab5a0747c63/"}},{"type":"Link","bounds":[74,370,193,17],"objref":"140","action":{"type":"URI","uri":"https://www.cognyte.com/get-resource/analytics-platform/51e2038e383ecfc953bf1ab5a0747c63/"}}]},{"page":9,"annotations":[{"type":"Link","bounds":[75,1054,116,35],"objref":"367","action":{"type":"URI","uri":"https://analytics.cognyte.com/security-analytics-video-sp"}}]}]},"created_at":"2022-11-14T13:20:45.412072Z","updated_at":"2026-04-17T04:50:59.912058Z","original_name":"How-Security-Analytics-Transforms-the-Crime-Terror-Landscape_SP.pdf","uuid":"ee08ff0d-3377-4d7f-8d19-1230a0d7e865","description":"LAS ANALÍTICAS LAS ANALÍTICAS DE SEGURIDAD DE SEGURIDAD ESTÁN TRANSFORMANDO LA LUCHA CONTRA EL CRIMEN Y EL TERRORISMO CONTRA EL CRIMEN Y EL TERRORISMO ¿CÓMO ? ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}