{"id":1858,"date":"2019-05-29T08:00:48","date_gmt":"2019-05-29T03:30:48","guid":{"rendered":"https:\/\/www.apk.co.ir\/video\/?p=1858"},"modified":"2020-04-05T11:57:54","modified_gmt":"2020-04-05T07:27:54","slug":"manufacturing-industrial-security-solutions-overview","status":"publish","type":"post","link":"https:\/\/www.apk.co.ir\/video\/manufacturing-industrial-security-solutions-overview\/","title":{"rendered":"\u0645\u0639\u0631\u0641\u06cc \u0631\u0627\u0647\u06a9\u0627\u0631 Manufacturing Industrial Security \u0633\u06cc\u0633\u06a9\u0648"},"content":{"rendered":"\n
\u062f\u0631 \u0627\u06cc\u0646 \u0648\u06cc\u062f\u0626\u0648 \u0628\u0647 \u0645\u0639\u0631\u0641\u06cc \u0631\u0627\u0647\u06a9\u0627\u0631\u0647\u0627\u06cc Manufacturing Industrial Security<\/a> \u06cc\u0627 \u0647\u0645\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0635\u0646\u0639\u062a\u06cc \u062f\u0631 \u062a\u0648\u0644\u06cc\u062f \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0627\u0645\u0631\u0648\u0632\u0647 \u0645\u0642\u0648\u0644\u0647 \u06cc \u0627\u0645\u0646\u06cc\u062a\u060c \u06cc\u06a9\u06cc \u0627\u0632 \u0645\u0647\u0645\u200c\u062a\u0631\u06cc\u0646 \u0645\u0633\u0627\u0626\u0644 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647\u200c\u06cc \u062a\u0648\u0644\u06cc\u062f\u0627\u062a \u0635\u0646\u0639\u062a\u06cc \u0645\u06cc\u200c\u0628\u0627\u0634\u062f. \u0631\u0627\u0647\u06a9\u0627\u0631\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0633\u06cc\u0633\u06a9\u0648<\/a> \u0628\u0627 \u06a9\u0627\u0631\u06af\u0630\u0627\u0631\u06cc \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u062f\u0631 \u0633\u0631\u062a\u0627\u0633\u0631 \u0633\u0627\u0632\u0645\u0627\u0646 \u0634\u0645\u0627\u060c \u0627\u0632 \u062f\u0641\u062a\u0631 \u06a9\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u062a\u0627 \u06a9\u0627\u0631\u062e\u0627\u0646\u0647 \u0648 \u062d\u062a\u06cc \u067e\u0633 \u0627\u0632 \u0622\u0646\u060c \u0628\u0647 \u0635\u0648\u0631\u062a End-to-End\u060c \u0627\u0632 \u06a9\u0633\u0628\u200c\u0648\u200c\u06a9\u0627\u0631\u062a\u0627\u0646 \u0645\u062d\u0627\u0641\u0638\u062a \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.<\/p>\n","protected":false},"excerpt":{"rendered":" \u062f\u0631 \u0627\u06cc\u0646 \u0648\u06cc\u062f\u0626\u0648 \u0628\u0647 \u0645\u0639\u0631\u0641\u06cc \u0631\u0627\u0647\u06a9\u0627\u0631\u0647\u0627\u06cc Manufacturing Industrial Security \u06cc\u0627 \u0647\u0645\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0635\u0646\u0639\u062a\u06cc \u062f\u0631 \u062a\u0648\u0644\u06cc\u062f \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0627\u0645\u0631\u0648\u0632\u0647 \u0645\u0642\u0648\u0644\u0647 \u06cc \u0627\u0645\u0646\u06cc\u062a\u060c \u06cc\u06a9\u06cc \u0627\u0632 \u0645\u0647\u0645\u200c\u062a\u0631\u06cc\u0646 \u0645\u0633\u0627\u0626\u0644 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647\u200c\u06cc \u062a\u0648\u0644\u06cc\u062f\u0627\u062a \u0635\u0646\u0639\u062a\u06cc \u0645\u06cc\u200c\u0628\u0627\u0634\u062f. \u0631\u0627\u0647\u06a9\u0627\u0631\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0633\u06cc\u0633\u06a9\u0648 \u0628\u0627 \u06a9\u0627\u0631\u06af\u0630\u0627\u0631\u06cc \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u062f\u0631 \u0633\u0631\u062a\u0627\u0633\u0631 \u0633\u0627\u0632\u0645\u0627\u0646 \u0634\u0645\u0627\u060c \u0627\u0632 \u062f\u0641\u062a\u0631 \u06a9\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u062a\u0627 \u06a9\u0627\u0631\u062e\u0627\u0646\u0647 \u0648 \u062d\u062a\u06cc \u067e\u0633 \u0627\u0632 \u0622\u0646\u060c \u0628\u0647 \u0635\u0648\u0631\u062a […]<\/p>\n","protected":false},"author":1001792,"featured_media":1864,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"footnotes":""},"categories":[1],"tags":[674,692,693,691,680,188,675,117,676,684,682,683,686,694,677,681,679,175,689,564,690,688,687],"cactus_badges":[],"video-series":[],"class_list":{"0":"post-1858","1":"post","2":"type-post","3":"status-publish","4":"format-video","5":"has-post-thumbnail","7":"category-security","8":"tag-manufacturing-industrial-security","9":"tag--manufacturing-industrial-security","10":"tag-693","12":"tag--cisco","13":"tag-188","14":"tag-675","15":"tag-117","16":"tag-676","17":"tag-684","19":"tag-683","20":"tag-686","21":"tag-694","22":"tag-677","24":"tag-679","25":"tag-175","27":"tag-564","30":"tag-687","31":"post_format-post-format-video"},"yoast_head":"\n