{"id":28,"date":"2022-10-25T05:45:00","date_gmt":"2022-10-25T05:45:00","guid":{"rendered":"https:\/\/www.timeteccloud.com\/blog\/index.php\/2022\/10\/25\/5-ways-of-security-enhancement-with-ineighbour\/"},"modified":"2024-10-15T08:21:57","modified_gmt":"2024-10-15T08:21:57","slug":"5-ways-of-security-enhancement-with-ineighbour","status":"publish","type":"post","link":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/","title":{"rendered":"5 Ways of Security Enhancement with iNeighbour"},"content":{"rendered":"<p><b><\/b><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\"><span style=\"font-size: x-large;\"><b><a style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjB9P00okWaQwPivFDy_Q_ZcO16hKFECdV8PdhbGc_LgnnApxTkFNCqdr9Bf-1adsrXfOEmHQS4fES7YDpRJ698HL53rBMUx96-Mxy4_dBBQGm8yPv8EIgPiCzuVlackU4j5EqJpQtUYGR_rlCkGsi1OTOu7OycDiXL-zrCn98JPxhjo7Wr8K4DC-bi\/s300\/1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjB9P00okWaQwPivFDy_Q_ZcO16hKFECdV8PdhbGc_LgnnApxTkFNCqdr9Bf-1adsrXfOEmHQS4fES7YDpRJ698HL53rBMUx96-Mxy4_dBBQGm8yPv8EIgPiCzuVlackU4j5EqJpQtUYGR_rlCkGsi1OTOu7OycDiXL-zrCn98JPxhjo7Wr8K4DC-bi\/s1600\/1.png\" width=\"300\" height=\"300\" border=\"0\" data-original-height=\"300\" data-original-width=\"300\" \/><\/a><\/b><\/span><\/span><\/span><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\"><span style=\"font-size: x-large;\"><b>Visitor Management System<\/b><\/span><br \/>\niNeighbour provides the guardhouse panel tablet replaces the traditional way of handwriting in a notebook, the Visitor Management System able to record every visitor&#8217;s checked in-out time, the purpose of visit, the unit and resident they visited. The residents would receive the live notification once the security checked-in-out the visitor, they are also able to report the \u201cwrong visitor\u201d check in their unit to management.<\/span><\/span><\/p>\n<p>For management, admins are able to customise the settings and different questions before allowing visitors to access from their own neighbourhood iNeighbour account web portal. Management admin is also able to generate different reports, for example visitor checked-in-out, pre-registered and invited visitor, visitor checked-in trend, restricted visitor, wrong visitor checked-in and etc from web portal.<\/p>\n<p>&nbsp;<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"clear: right; float: right; margin-bottom: 1em; margin-left: 1em;\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxT1wmdMlAQpIOVI-wEyRKMkFLlRXSSOCNTMg3vLd2g2KgiZkZzIzmS2FocolU_bgcAqHkZ-_svYgQ25UFA4YkedP3k66xmJtL2FJ49zW8qR73XzEh1xvqrhKZms29q7Po1MSuLa_31V7J-KTFKlXP3UpmtRXEYDyQS5Gt4DrQAmXLrVjSy5-94Oeu\/s300\/2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxT1wmdMlAQpIOVI-wEyRKMkFLlRXSSOCNTMg3vLd2g2KgiZkZzIzmS2FocolU_bgcAqHkZ-_svYgQ25UFA4YkedP3k66xmJtL2FJ49zW8qR73XzEh1xvqrhKZms29q7Po1MSuLa_31V7J-KTFKlXP3UpmtRXEYDyQS5Gt4DrQAmXLrVjSy5-94Oeu\/s1600\/2.png\" width=\"300\" height=\"300\" border=\"0\" data-original-height=\"300\" data-original-width=\"300\" \/><\/a><\/div>\n<p>Intercom<br \/>\nThe security guards are able to intercom contact residents handphone through the iNeighbour Visitor Management System guardhouse panel tablet, it is able to control access and ensure that only authorised visitors are permitted into the neighbourhood. And for contact numbers of residents will remain concealed and protected for security and privacy purposes from iNeighbour Visitor Management System.<br \/>\n<b><\/b><\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMHMDBCcMpjpZ3jG1F7LBI91KJwCjFGKuihyLzWa_MMirIvVIWLesKkOnlnc9iU_MOGPAjgFZfSKrtyKgF4Ns67rSsPetd35Mu9zmXSBPxs1LKWBdvcg_IVCVs74LSW-StobvWFeeqSBgvKme7YlnK0UE88DjMwKKVj0HtA8bo2gjYNNVEQpZcBVU3\/s300\/3.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMHMDBCcMpjpZ3jG1F7LBI91KJwCjFGKuihyLzWa_MMirIvVIWLesKkOnlnc9iU_MOGPAjgFZfSKrtyKgF4Ns67rSsPetd35Mu9zmXSBPxs1LKWBdvcg_IVCVs74LSW-StobvWFeeqSBgvKme7YlnK0UE88DjMwKKVj0HtA8bo2gjYNNVEQpZcBVU3\/s1600\/3.png\" width=\"300\" height=\"300\" border=\"0\" data-original-height=\"300\" data-original-width=\"300\" \/><\/a><\/div>\n<p>BLE-2<br \/>\nTimeTec BLE-2 is integrated into the iNeighbour Visitor Management System, the function can automatically trigger the visitor check-in and check-out lane barrier gates to open, it can avoid the security guards simply manually pressing the push button to allow the visitor access. Therefore the security guards have to register every visitor via the guardhouse tablet panel before allowing visitor access into the neighbourhood.<\/p>\n<p>&nbsp;<\/p>\n<div style=\"clear: both; text-align: center;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\"><b><span style=\"font-size: x-large;\"><a style=\"clear: right; float: right; margin-bottom: 1em; margin-left: 1em;\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiON-96TOEHF1UkIwOUkiQw9Gx7rGCofwAXiGH9RGI58eiHkZ-F-IzRnGUhYRG6CZmjQlsrwYIpRm_7i4w9z8VatlG9qd5ZHEEPh5ZeAg-J8lrnD7ogDZ-yKRQzfxqtbWxRhg-wuoPaHbYZtslB9WWrn-rIxesQHow-A_GviKKlU5oa6hqU3iflTjhr\/s300\/4.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiON-96TOEHF1UkIwOUkiQw9Gx7rGCofwAXiGH9RGI58eiHkZ-F-IzRnGUhYRG6CZmjQlsrwYIpRm_7i4w9z8VatlG9qd5ZHEEPh5ZeAg-J8lrnD7ogDZ-yKRQzfxqtbWxRhg-wuoPaHbYZtslB9WWrn-rIxesQHow-A_GviKKlU5oa6hqU3iflTjhr\/s1600\/4.png\" width=\"300\" height=\"300\" border=\"0\" data-original-height=\"300\" data-original-width=\"300\" \/><\/a><\/span><\/b><\/span><\/span><\/div>\n<p><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\"><b><span style=\"font-size: x-large;\">Panic Button<\/span><\/b><br \/>\nThe Panic Button is designed to ensure the safety of the residents within a neighbourhood. In the event of an emergency, residents can trigger the Panic Button buzzing alarm in order to inform the guardhouse panel tablet to alert guards on duty and emergency contact persons.<\/span><\/span><\/p>\n<p>The residents will be given the choice for the option to specify the types of incident involved (standard, burglary, fire, medical assistance), and 4 photos will be taken via the resident\u2019s smartphone to be uploaded into the server for better description of the incident happening or for the sake of obtaining crucial evidence.<\/p>\n<p>&nbsp;<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjiw7StgoDZic_dafc3nIeul1ZqRkNnaaCBzaWaoWfPmkCIXFGcTI2DKaihyaqjIq2GMYn3Ab2I1cuwXGLGK4r4WjSVoI8CYAavwq3J8Xp3IYh2Ww_lX5BfFdzpcWi2HmPs5XOOQA5Hv8sJzgUBza_EnBOpHYb8p8qSzOHt86mBoASzqWGyOrzvCXL7\/s300\/5.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjiw7StgoDZic_dafc3nIeul1ZqRkNnaaCBzaWaoWfPmkCIXFGcTI2DKaihyaqjIq2GMYn3Ab2I1cuwXGLGK4r4WjSVoI8CYAavwq3J8Xp3IYh2Ww_lX5BfFdzpcWi2HmPs5XOOQA5Hv8sJzgUBza_EnBOpHYb8p8qSzOHt86mBoASzqWGyOrzvCXL7\/s1600\/5.png\" width=\"300\" height=\"300\" border=\"0\" data-original-height=\"300\" data-original-width=\"300\" \/><\/a><\/div>\n<p>iPatrol System<br \/>\niPatrol system is our guard patrolling solution that offers cloud connectivity. The iPatrol system provides flexible and rotated schedules remotely,\u00a0 and also able to track your security guards KPI more accurately compared to the offline system.The supervisors and admin also will receive the live notification for any late or misses scanning during patrolling, and also able to generate the daily, weekly,and monthly report from the iPatrol system web portal. Security guards are able to report incidents during their patrolling duties to the management personnel in real-time.<\/p>\n<div style=\"text-align: center;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">03-8070 9933\u00a0\u00a0\u00a0\u00a0 |\u00a0\u00a0\u00a0\u00a0 <a href=\"mailto:info@i-neighbour.com\">Email<\/a>\u00a0\u00a0\u00a0\u00a0 |\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/www.i-neighbour.com\/\" target=\"_blank\" rel=\"noopener\">www.i-neighbour.com<\/a>\u00a0\u00a0\u00a0\u00a0 |\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/www.timeteccloud.com\/interest_form\" target=\"_blank\" rel=\"noopener\">Interest Form<\/a><\/span><\/span><\/span><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Visitor Management System iNeighbour provides the guardhouse panel tablet replaces the traditional way of handwriting in a notebook, the Visitor Management System able to record [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[295,294,238,243],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Ways of Security Enhancement with iNeighbour<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Ways of Security Enhancement with iNeighbour\" \/>\n<meta property=\"og:description\" content=\"Visitor Management System iNeighbour provides the guardhouse panel tablet replaces the traditional way of handwriting in a notebook, the Visitor Management System able to record [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-25T05:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-15T08:21:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TimeTec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TimeTec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/\"},\"author\":{\"name\":\"TimeTec\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/adaf3b42a2df0a10d3661ff6a2f778f5\"},\"headline\":\"5 Ways of Security Enhancement with iNeighbour\",\"datePublished\":\"2022-10-25T05:45:00+00:00\",\"dateModified\":\"2024-10-15T08:21:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/\"},\"wordCount\":452,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg\",\"keywords\":[\"BLE-2\",\"i-Patrol System\",\"iNeighbour\",\"Visitor Management System\"],\"articleSection\":[\"Property Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/\",\"name\":\"5 Ways of Security Enhancement with iNeighbour\",\"isPartOf\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg\",\"datePublished\":\"2022-10-25T05:45:00+00:00\",\"dateModified\":\"2024-10-15T08:21:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#primaryimage\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg\",\"contentUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg\",\"width\":1000,\"height\":507},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.timeteccloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Ways of Security Enhancement with iNeighbour\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#website\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/\",\"name\":\"TimeTec\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.timeteccloud.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\",\"name\":\"TimeTec\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png\",\"contentUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png\",\"width\":1000,\"height\":313,\"caption\":\"TimeTec\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/adaf3b42a2df0a10d3661ff6a2f778f5\",\"name\":\"TimeTec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"TimeTec\"},\"url\":\"https:\/\/www.timeteccloud.com\/blog\/author\/timetec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Ways of Security Enhancement with iNeighbour","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/","og_locale":"en_US","og_type":"article","og_title":"5 Ways of Security Enhancement with iNeighbour","og_description":"Visitor Management System iNeighbour provides the guardhouse panel tablet replaces the traditional way of handwriting in a notebook, the Visitor Management System able to record [&hellip;]","og_url":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/","article_published_time":"2022-10-25T05:45:00+00:00","article_modified_time":"2024-10-15T08:21:57+00:00","og_image":[{"width":1000,"height":507,"url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg","type":"image\/jpeg"}],"author":"TimeTec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TimeTec","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#article","isPartOf":{"@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/"},"author":{"name":"TimeTec","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/adaf3b42a2df0a10d3661ff6a2f778f5"},"headline":"5 Ways of Security Enhancement with iNeighbour","datePublished":"2022-10-25T05:45:00+00:00","dateModified":"2024-10-15T08:21:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/"},"wordCount":452,"commentCount":0,"publisher":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#primaryimage"},"thumbnailUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg","keywords":["BLE-2","i-Patrol System","iNeighbour","Visitor Management System"],"articleSection":["Property Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/","url":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/","name":"5 Ways of Security Enhancement with iNeighbour","isPartOf":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#primaryimage"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#primaryimage"},"thumbnailUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg","datePublished":"2022-10-25T05:45:00+00:00","dateModified":"2024-10-15T08:21:57+00:00","breadcrumb":{"@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#primaryimage","url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg","contentUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2022\/10\/header-3.jpg","width":1000,"height":507},{"@type":"BreadcrumbList","@id":"https:\/\/www.timeteccloud.com\/blog\/5-ways-of-security-enhancement-with-ineighbour\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.timeteccloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Ways of Security Enhancement with iNeighbour"}]},{"@type":"WebSite","@id":"https:\/\/www.timeteccloud.com\/blog\/#website","url":"https:\/\/www.timeteccloud.com\/blog\/","name":"TimeTec","description":"","publisher":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.timeteccloud.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.timeteccloud.com\/blog\/#organization","name":"TimeTec","url":"https:\/\/www.timeteccloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png","contentUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png","width":1000,"height":313,"caption":"TimeTec"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/adaf3b42a2df0a10d3661ff6a2f778f5","name":"TimeTec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"TimeTec"},"url":"https:\/\/www.timeteccloud.com\/blog\/author\/timetec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/28"}],"collection":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":1,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/28\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/28\/revisions\/314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/media\/313"}],"wp:attachment":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/media?parent=28"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/categories?post=28"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/tags?post=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}