{"id":2714,"date":"2026-04-15T15:44:42","date_gmt":"2026-04-15T15:44:42","guid":{"rendered":"https:\/\/lightgreen-wombat-810778.hostingersite.com\/?page_id=2714"},"modified":"2026-04-27T19:28:44","modified_gmt":"2026-04-27T19:28:44","slug":"dmarc-advisor","status":"publish","type":"page","link":"https:\/\/www.castelis.com\/en\/technology-partners\/dmarc-advisor\/","title":{"rendered":"DMARC Advisor"},"content":{"rendered":"<section class=\"castelis-hero-banner\" >\n            <div class=\"hero-image-bg\">\n            <img decoding=\"async\" src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/04\/Infra2-e1777224040971.webp\" alt=\"DMARC Advisor: Protect Your Domains\">\n        <\/div>\n    \n    <div class=\"container\">\n                        <div class=\"hero-content-wrapper\">\n            <div class=\"hero-content\">\n                                    <h1 class=\"hero-title\">DMARC Advisor: Protect Your Domains<\/h1>\n                \n                                    <div class=\"hero-description\">\n                        <p>Is your domain a weak link for cyberattacks? Discover how a poor DMARC configuration can compromise your security and how to remedy it effectively.<\/p>\n\n                    <\/div>\n                \n                \n                            <\/div>\n        <\/div>\n\n        \n            <\/div>\n<\/section>\n\n\n<section class=\"castelis-content-image frame-grey\" >\n    <div class=\"container align-items-center\"> \n        \n        <div class=\"order-2 content-wrapper \">\n                            <div class=\"content-image-hashtag hashtag-title\"># Exploitation of a poor DMARC configuration<\/div>\n            \n                            <h2 class=\"content-title\">\n                    <span class=\"slash-prefix\">\/<\/span>\n                    <div>A risk for your organization<\/div>\n                <\/h2>\n                        \n                            <div class=\"castelis-content-text\">\n                    <p>An incorrect DMARC (Domain-based Message Authentication, Reporting, and Conformance) configuration opens the door to serious email security threats. It exposes your organization to targeted attacks and potential losses. Protect your domain with an optimal DMARC configuration.<\/p>\n\n                <\/div>\n                        \n                    <\/div>\n        \n        \n        <div class=\"order-1 image-style-framed \">\n                            <img decoding=\"async\" \n                    src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/04\/wesfly-biBRoGc7ir0-unsplash.webp\" \n                    alt=\"A risk for your organization\"\n                \/>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"castelis-content-image frameless\" >\n    <div class=\"container align-items-center\"> \n        \n        <div class=\"order-1 content-wrapper \">\n            \n                            <h2 class=\"content-title\">\n                    <span class=\"slash-prefix\">\/<\/span>\n                    <div>Why email security depends on a proper DMARC configuration?<\/div>\n                <\/h2>\n                        \n                            <div class=\"castelis-content-text\">\n                    <p><strong>DMARC<\/strong> constitutes a crucial barrier against <strong>malicious exploitation of your domain<\/strong>. It is an essential standard that combines SPF and DKIM mechanisms to <strong>authenticate emails sent on behalf of your domain<\/strong>. DMARC is therefore much more than a simple technical formality. A poor configuration can:<\/p>\n<ul>\n<li>Leave your domain vulnerable to phishing attacks and identity theft.<\/li>\n<li>Damage the trust of your customers and partners, leading to financial losses and reputational harm.<\/li>\n<li>Hinder the detection of emerging threats, letting abuse attempts go unnoticed.<\/li>\n<\/ul>\n\n                <\/div>\n                        \n                    <\/div>\n        \n        \n        <div class=\"order-2 image-style-background \">\n                            <img decoding=\"async\" \n                    src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/04\/this_is_engineering-engineer-4904884_1280.webp\" \n                    alt=\"Why email security depends on a proper DMARC configuration?\"\n                \/>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"client-case-studies\" >\n    <div class=\"container\">\n        \n        \n                    <div class=\"case-studies__wrapper\">\n                <div class=\"case-studies-grid\">\n                                            <div class=\"case-study-card\">\n                            \n                            <div class=\"case-content\">\n                                                                    <h3 class=\"case-title\">90%<\/h3>\n                                \n                                                                    <p class=\"case-description\">of successful cyberattacks begin with email phishing (Cloudflare, 2023)<\/p>\n                                \n                                                                \n                                                                    <a href=\"https:\/\/blog.cloudflare.com\/fr-fr\/2023-phishing-report\/\" class=\"card-cta\" target=\"_blank\" rel=\"noopener\">\n                                        Learn more\n                                        <i class=\"fas fa-chevron-right\"><\/i>\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                                            <div class=\"case-study-card\">\n                            \n                            <div class=\"case-content\">\n                                                                    <h3 class=\"case-title\">+ 1265%<\/h3>\n                                \n                                                                    <p class=\"case-description\">increase in malicious emails since the arrival of ChatGPT (Stormshield 2023)<\/p>\n                                \n                                                                \n                                                                    <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-chiffres-cles-statistiques-2023\/\" class=\"card-cta\" target=\"_blank\" rel=\"noopener\">\n                                        Learn more\n                                        <i class=\"fas fa-chevron-right\"><\/i>\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                                            <div class=\"case-study-card\">\n                            \n                            <div class=\"case-content\">\n                                                                    <h3 class=\"case-title\">16.6%<\/h3>\n                                \n                                                                    <p class=\"case-description\">only of .fr domains publish a DMARC policy (similar for .com) (One2Net, 2023)<\/p>\n                                \n                                                                \n                                                                    <a href=\"https:\/\/www.one2net.fr\/actualite\/adoption-spf-dkim-dmarc-zone-fr\/\" class=\"card-cta\" target=\"_blank\" rel=\"noopener\">\n                                        Learn more\n                                        <i class=\"fas fa-chevron-right\"><\/i>\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                                    <\/div>\n\n                \n                <div class=\"case-studies__nav\">\n                    <button class=\"case-studies__btn case-studies__btn--prev\" disabled>\n                        <i class=\"fas fa-chevron-left\"><\/i>\n                    <\/button>\n\n                    <div class=\"case-studies__dots\"><\/div>\n\n                    <button class=\"case-studies__btn case-studies__btn--next\">\n                        <i class=\"fas fa-chevron-right\"><\/i>\n                    <\/button>\n                <\/div>\n            <\/div>\n            <\/div>\n<\/section>\n\n\n<section class=\"castelis-logos variation-partner\" >\n    <div class=\"container\">\n                    <div class=\"logos-header\">\n                \n                                    <h2 class=\"logos-heading\">\n                        <span class=\"slash-prefix\">\/<\/span>\n                        The main exploitations of a poor DMARC configuration\n                    <\/h2>\n                \n                            <\/div>\n            <\/div>\n\n    <\/section>\n\n\n<section class=\"castelis-content-image frame-black\" >\n    <div class=\"container align-items-center\"> \n        \n        <div class=\"order-1 content-wrapper \">\n            \n                            <h2 class=\"content-title\">\n                    <span class=\"slash-prefix\">\/<\/span>\n                    <div>Identity Spoofing (Phishing)<\/div>\n                <\/h2>\n                        \n                            <div class=\"castelis-content-text\">\n                    <p>When a DMARC policy is poorly defined (for example, none or non-existent), attackers can send emails spoofing the company&#8217;s domain. These fraudulent emails can deceive recipients, leading to:<\/p>\n<ul>\n<li>Theft of sensitive data (passwords, personal information).<\/li>\n<li>Financial scams via Business Email Compromise (BEC) attacks.<\/li>\n<li>Damage to your organization&#8217;s reputation, particularly if customers or partners are victimized.<\/li>\n<\/ul>\n\n                <\/div>\n                        \n                    <\/div>\n        \n        \n        <div class=\"order-2 image-style-framed \">\n                            <img decoding=\"async\" \n                    src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/04\/mohammad-rahmani-_Fx34KeqIEw-unsplash.webp\" \n                    alt=\"Identity Spoofing (Phishing)\"\n                \/>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"castelis-content-image frame-grey\" >\n    <div class=\"container align-items-center\"> \n        \n        <div class=\"order-2 content-wrapper \">\n            \n                            <h2 class=\"content-title\">\n                    <span class=\"slash-prefix\">\/<\/span>\n                    <div>Exploitation of non-compliant subdomains<\/div>\n                <\/h2>\n                        \n                            <div class=\"castelis-content-text\">\n                    <p>If your DMARC policy does not explicitly cover subdomains, these become easy targets for attackers.<\/p>\n<ul>\n<li>Use of an unprotected subdomain, such as secure.yourdomain.com, to bypass SPF and DKIM controls.<\/li>\n<li>Launch of phishing campaigns with a legitimate appearance.<\/li>\n<\/ul>\n\n                <\/div>\n                        \n                    <\/div>\n        \n        \n        <div class=\"order-1 image-style-framed \">\n                            <img decoding=\"async\" \n                    src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/04\/fotis-fotopoulos-DuHKoV44prg-unsplash.webp\" \n                    alt=\"Exploitation of non-compliant subdomains\"\n                \/>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"castelis-content-image frame-black\" >\n    <div class=\"container align-items-center\"> \n        \n        <div class=\"order-1 content-wrapper \">\n            \n                            <h2 class=\"content-title\">\n                    <span class=\"slash-prefix\">\/<\/span>\n                    <div>Lack of reporting and monitoring<\/div>\n                <\/h2>\n                        \n                            <div class=\"castelis-content-text\">\n                    <p>Without adequate configuration of DMARC reports (rua for aggregate reports, ruf for forensic reports), attacks go unnoticed.<\/p>\n<ul>\n<li>Lack of visibility into spoofing attempts on your domain.<\/li>\n<li>Inability to identify third-party domains abusing your identity.<\/li>\n<li>Weakness in adjusting and improving your DMARC policy.<\/li>\n<\/ul>\n\n                <\/div>\n                        \n                    <\/div>\n        \n        \n        <div class=\"order-2 image-style-framed \">\n                            <img decoding=\"async\" \n                    src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/04\/innovalabs-software-developer-6521720_1280.webp\" \n                    alt=\"Lack of reporting and monitoring\"\n                \/>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"castelis-content-image frame-grey\" >\n    <div class=\"container align-items-center\"> \n        \n        <div class=\"order-2 content-wrapper \">\n            \n                            <h2 class=\"content-title\">\n                    <span class=\"slash-prefix\">\/<\/span>\n                    <div>Partial or inconsistent implementation<\/div>\n                <\/h2>\n                        \n                            <div class=\"castelis-content-text\">\n                    <p>A non-optimized DMARC policy, such as the absence of a reject level or a partial implementation, allows fraudulent emails to bypass protection mechanisms.<\/p>\n<ul>\n<li>Malicious emails can be successfully delivered, putting your recipients at risk.<\/li>\n<li>Attackers exploit the trust placed in the domain to reinforce the credibility of their attacks.<\/li>\n<\/ul>\n\n                <\/div>\n                        \n                    <\/div>\n        \n        \n        <div class=\"order-1 image-style-framed \">\n                            <img decoding=\"async\" \n                    src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/04\/luca-bravo-XJXWbfSo2f0-unsplash.webp\" \n                    alt=\"Partial or inconsistent implementation\"\n                \/>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"castelis-expertise-content-image\" >\n    <div class=\"container\">\n        \n        <div class=\"content-wrapper order-1\">\n                            <h2 class=\"content-title\">\n                    <span class=\"slash-prefix-v2\">\/<\/span>\n                    <div>Which organizations are concerned?<\/div>\n                <\/h2>\n                        \n                            <div class=\"castelis-content-text\">\n                    <p>Email security concerns all organizations that communicate electronically \u2014 meaning all of them. But some are more exposed than others:<\/p>\n<ul>\n<li><strong>Large companies and international groups<\/strong>: dozens of domains to manage, massive email flows and critical security issues. A single breach can impact thousands of contacts.<\/li>\n<li><strong>Public organizations<\/strong>: subject to strict compliance requirements (GDPR, NIS2) and particularly targeted by phishing campaigns impersonating an institutional identity.<\/li>\n<li><strong>SMEs and mid-market companies<\/strong>: often without dedicated technical resources, they remain a preferred target. Protecting the main domain is an accessible and essential first line of defense.<\/li>\n<\/ul>\n\n                <\/div>\n                        \n                    <\/div>\n        \n        \n        <div class=\"image-wrapper order-2\">\n                            <img decoding=\"async\" \n                    src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/03\/cas-client-lucernys.webp\" \n                    alt=\"Which organizations are concerned?\"\n                \/>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"castelis-testimonials\" >\n    <div class=\"container\">\n                    <div class=\"testimonials-header\">\n                <div class=\"testimonials-tag hashtag-title\"># Real-world examples of exploited DMARC vulnerabilities<\/div>\n                \n                                    <div class=\"testimonials-navigation\">\n                        <button class=\"nav-arrow prev-arrow\" data-carousel=\"testimonials-69f0b29a26625\" data-direction=\"prev\">\n                            <i class=\"fas fa-chevron-left\"><\/i>\n                        <\/button>\n                        <button class=\"nav-arrow next-arrow\" data-carousel=\"testimonials-69f0b29a26625\" data-direction=\"next\">\n                            <i class=\"fas fa-chevron-right\"><\/i>\n                        <\/button>\n                    <\/div>\n                            <\/div>\n        \n                    <div class=\"testimonials-carousel\" id=\"testimonials-69f0b29a26625\">\n                <div class=\"testimonials-track\">\n                                            <div class=\"testimonial-card\">\n                            <div class=\"testimonial-content\">\n                                \n                                <div class=\"testimonial-info\">\n                                                                            <div class=\"testimonial-author\">\n                                                                                        <div class=\"author-details\">\n                                                <div class=\"testimonial-author-name\">Mairie de Sartrouville <\/div>\n                                                                                                    <div class=\"author-position\">\n                                                                                                                    2023\n                                                                                                                                                                             \u2022 \n                                                                                                                                                                            France 3 R\u00e9gion\n                                                                                                            <\/div>\n                                                                                            <\/div>\n                                        <\/div>\n                                    \n                                                                            <div class=\"testimonial-text\">\n                                            \u201c In August 2023, the Sartrouville city hall fell victim to a ransomware cyberattack, paralyzing its computer servers.\r\n\r\nConsequences: The hackers exfiltrated sensitive data, including financial and personal information of municipal employees, and demanded a ransom of $500,000.\r\n\r\nWhat lesson to take away? A strict DMARC policy could have prevented the spoofing of official email addresses, reducing the risk of such attacks. \u201d\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"testimonial-card\">\n                            <div class=\"testimonial-content\">\n                                \n                                <div class=\"testimonial-info\">\n                                                                            <div class=\"testimonial-author\">\n                                                                                        <div class=\"author-details\">\n                                                <div class=\"testimonial-author-name\">Bouygues Construction <\/div>\n                                                                                                    <div class=\"author-position\">\n                                                                                                                    2020\n                                                                                                                                                                             \u2022 \n                                                                                                                                                                            Le Monde Informatique\n                                                                                                            <\/div>\n                                                                                            <\/div>\n                                        <\/div>\n                                    \n                                                                            <div class=\"testimonial-text\">\n                                            \u201c In January 2020, Bouygues Construction fell victim to a major cyberattack involving ransomware, disrupting its computer systems.\r\nConsequences: The company had to halt operations at several sites, resulting in financial losses and operational disruption.\r\nWhat lesson to take away? Implementing DMARC could have helped prevent email identity spoofing, a potential vector of the attack. \u201d\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n            <\/div>\n<\/section>\n\n\n<section class=\"castelis-cards-panel alignment-vertical bg-green heading-center\" >\n    <div class=\"container\">\n                    <div class=\"cards-panel-header\">\n                                    <div class=\"cards-panel-heading\">\n                        <span class=\"slash-prefix\">\/<\/span>\n                        <h2>The benefits of a correctly configured DMARC<\/h2>\n                    <\/div>\n                                \n                                    <div class=\"cards-panel-description\">\n                        <p>A well-implemented DMARC policy is part of your plan to ensure your organization&#8217;s resilience against cyber threats.<\/p>\n\n                    <\/div>\n                            <\/div>\n                \n                    <div class=\"cards-grid cards-grid-4\">\n                                    <div class=\"card-item\">\n                                                    \n                            <div class=\"card-icon\">\n                                                                    <img decoding=\"async\" src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/02\/check-1.svg\" alt=\"Domain security\" \/>\n                                                            <\/div>\n                            \n                                                            <h3 class=\"card-title\">Domain security<\/h3>\n                                                        \n                                                            <p class=\"card-description\">Automatically block fraudulent emails through strict policies.<\/p>\n                                                        \n                                                        \n                                                                        <\/div>\n                                    <div class=\"card-item\">\n                                                    \n                            <div class=\"card-icon\">\n                                                                    <img decoding=\"async\" src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/02\/check-1.svg\" alt=\"Reputation protection\" \/>\n                                                            <\/div>\n                            \n                                                            <h3 class=\"card-title\">Reputation protection<\/h3>\n                                                        \n                                                            <p class=\"card-description\">Maintain the trust of your partners and clients by guaranteeing the integrity of your communications.<\/p>\n                                                        \n                                                        \n                                                                        <\/div>\n                                    <div class=\"card-item\">\n                                                    \n                            <div class=\"card-icon\">\n                                                                    <img decoding=\"async\" src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/02\/check-1.svg\" alt=\"Proactive threat detection\" \/>\n                                                            <\/div>\n                            \n                                                            <h3 class=\"card-title\">Proactive threat detection<\/h3>\n                                                        \n                                                            <p class=\"card-description\">Quickly identify abuse and adjust your policies to better protect your domain.<\/p>\n                                                        \n                                                        \n                                                                        <\/div>\n                                    <div class=\"card-item\">\n                                                    \n                            <div class=\"card-icon\">\n                                                                    <img decoding=\"async\" src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2026\/02\/check-1.svg\" alt=\"Regulatory compliance\" \/>\n                                                            <\/div>\n                            \n                                                            <h3 class=\"card-title\">Regulatory compliance<\/h3>\n                                                        \n                                                            <p class=\"card-description\">Comply with current cybersecurity standards, such as GDPR, NIS2, DORA, SOC 2\u2026<\/p>\n                                                        \n                                                        \n                                                                        <\/div>\n                            <\/div>\n            <\/div>\n<\/section>\n\n\n<section class=\"castelis-content-image frameless\" >\n    <div class=\"container align-items-center\"> \n        \n        <div class=\"order-2 content-wrapper \">\n            \n                        \n                        \n                    <\/div>\n        \n        \n        <div class=\"order-1 image-style-background \">\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"castelis-logos variation-partner\" >\n    <div class=\"container\">\n                    <div class=\"logos-header\">\n                \n                                    <h2 class=\"logos-heading\">\n                        <span class=\"slash-prefix\">\/<\/span>\n                        Don&#039;t let configuration vulnerabilities compromise your security\n                    <\/h2>\n                \n                                    <div class=\"logos-description\">\n                        <p>DMARC is more than a simple formality: it is an essential barrier against modern threats. Make sure to configure it correctly to protect your organization and preserve the trust of your stakeholders.<\/p>\n<p><strong>Need a diagnosis or assistance?<\/strong> Discover our solutions to analyze, test and optimize your DMARC configuration today.<\/p>\n\n                    <\/div>\n                            <\/div>\n            <\/div>\n\n    <\/section>\n\n\n<section class=\"castelis-contact-form\"  id=\"contact\" >\n    <div class=\"container\">   \n                    <div class=\"contact-tag hashtag-title\">CONTACT<\/div>\n        \n                    <h2 class=\"contact-heading\">Let&#039;s talk about your project<\/h2>\n        \n        \n        <div class=\"contact-wrapper\">\n            \n            <div class=\"contact-form-side\">\n                                    <div class=\"contact-form-container\">\n                        \n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 9318812,\n\t\t\t\t\t\t\t\t\tformId: \"312183e0-8b6c-488d-ac79-af4a4fbc82fe\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1777382042000-6814353787\",\n\t\t\t\t\t\t\t\t\tregion: \"na1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1777382042000-6814353787\"><\/div>\n                    <\/div>\n                            <\/div>\n\n            \n            <div class=\"contact-sidebar\">\n                <div class=\"sidebar-content\">\n                                            <h3 class=\"sidebar-heading\">Why choose us?<\/h3>\n                    \n                                            <div class=\"reasons-list\">\n                                                            <div class=\"reason-item\">\n                                    <i class=\"green-icon-bg\"><\/i>\n                                    <div class=\"reason-content\">\n                                        <h4 class=\"reason-title\">Technical expertise<\/h4>\n                                        <div class=\"reason-description\">15+ years of experience, AWS\/Azure certifications, modern stack<\/div>\n                                    <\/div>\n                                <\/div>\n                                                            <div class=\"reason-item\">\n                                    <i class=\"green-icon-bg\"><\/i>\n                                    <div class=\"reason-content\">\n                                        <h4 class=\"reason-title\">Proven methodology<\/h4>\n                                        <div class=\"reason-description\">100+ projects delivered, 95% client satisfaction, on-time delivery<\/div>\n                                    <\/div>\n                                <\/div>\n                                                            <div class=\"reason-item\">\n                                    <i class=\"green-icon-bg\"><\/i>\n                                    <div class=\"reason-content\">\n                                        <h4 class=\"reason-title\">Ongoing support<\/h4>\n                                        <div class=\"reason-description\">TMA available, team training, 24\/7 monitoring<\/div>\n                                    <\/div>\n                                <\/div>\n                                                    <\/div>\n                    \n                                            <div class=\"satisfaction-rating\">\n                            <div class=\"rating-display\">\n                                <div class=\"rating-label\">Satisfaction rating<\/div>\n                                <div class=\"rating-number\">4.8\/5<\/div>\n                            <\/div>\n                            <div class=\"rating-stars\">\n                                                                                                            <i class=\"fas fa-star\"><\/i>\n                                                                                                                                                <i class=\"fas fa-star\"><\/i>\n                                                                                                                                                <i class=\"fas fa-star\"><\/i>\n                                                                                                                                                <i class=\"fas fa-star\"><\/i>\n                                                                                                                                                <i class=\"fas fa-star-half-alt\"><\/i>\n                                                                                                <\/div>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n            <div class=\"contact-form-image\">\n            <img decoding=\"async\" src=\"https:\/\/www.castelis.com\/wp-content\/uploads\/2025\/12\/designer-working-3d-model-2.png\" alt=\"\" \/>\n        <\/div>\n    <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":2692,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-2714","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/pages\/2714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/comments?post=2714"}],"version-history":[{"count":6,"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/pages\/2714\/revisions"}],"predecessor-version":[{"id":2741,"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/pages\/2714\/revisions\/2741"}],"up":[{"embeddable":true,"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/pages\/2692"}],"wp:attachment":[{"href":"https:\/\/www.castelis.com\/en\/wp-json\/wp\/v2\/media?parent=2714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}