{"id":11414,"date":"2024-03-25T07:30:12","date_gmt":"2024-03-25T07:30:12","guid":{"rendered":"http:\/\/54.151.138.194\/?page_id=11414"},"modified":"2024-05-07T00:14:29","modified_gmt":"2024-05-06T18:14:29","slug":"cybersecurity-solutions","status":"publish","type":"page","link":"https:\/\/atgsys.co.th\/th\/cybersecurity-solutions\/","title":{"rendered":"Cybersecurity Solutions\u00a0"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"11414\" class=\"elementor elementor-11414\">\n\t\t\t\t<div class=\"elementor-element elementor-element-872d2ce e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no qodef-elementor-content-no e-con e-parent\" data-id=\"872d2ce\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:14394,&quot;url&quot;:&quot;https:\\\/\\\/atgsys.co.th\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Cybersecurity-Solutions-1.png&quot;}],&quot;_ob_use_container_extras&quot;:&quot;no&quot;,&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500,&quot;_ob_column_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_glider_is_slider&quot;:&quot;no&quot;,&quot;_ob_column_has_pseudo&quot;:&quot;no&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e27528 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no qodef-elementor-content-no e-con e-parent\" data-id=\"6e27528\" data-element_type=\"container\" data-settings=\"{&quot;_ob_use_container_extras&quot;:&quot;no&quot;,&quot;_ob_column_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_glider_is_slider&quot;:&quot;no&quot;,&quot;_ob_column_has_pseudo&quot;:&quot;no&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-88d22da e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no qodef-elementor-content-no e-con e-child\" data-id=\"88d22da\" data-element_type=\"container\" data-settings=\"{&quot;_ob_use_container_extras&quot;:&quot;no&quot;,&quot;_ob_column_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_glider_is_slider&quot;:&quot;no&quot;,&quot;_ob_column_has_pseudo&quot;:&quot;no&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-921162e e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no qodef-elementor-content-no e-con e-child\" data-id=\"921162e\" data-element_type=\"container\" data-settings=\"{&quot;_ob_use_container_extras&quot;:&quot;no&quot;,&quot;_ob_column_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_glider_is_slider&quot;:&quot;no&quot;,&quot;_ob_column_has_pseudo&quot;:&quot;no&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1095581 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no qodef-elementor-content-no e-con e-child\" data-id=\"1095581\" data-element_type=\"container\" data-settings=\"{&quot;_ob_use_container_extras&quot;:&quot;no&quot;,&quot;_ob_column_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_glider_is_slider&quot;:&quot;no&quot;,&quot;_ob_column_has_pseudo&quot;:&quot;no&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3d24ae wpr-feature-list-left wpr-feature-list-square ob-has-background-overlay elementor-widget elementor-widget-wpr-feature-list\" data-id=\"f3d24ae\" data-element_type=\"widget\" data-settings=\"{&quot;_ob_perspektive_use&quot;:&quot;no&quot;,&quot;_ob_poopart_use&quot;:&quot;yes&quot;,&quot;_ob_shadough_use&quot;:&quot;no&quot;,&quot;_ob_allow_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_widget_stalker_use&quot;:&quot;no&quot;}\" data-widget_type=\"wpr-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"wpr-feature-list-wrap\"><ul class=\"wpr-feature-list\"><li class=\"wpr-feature-list-item elementor-repeater-item-da06200\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><img decoding=\"async\" src=\"https:\/\/atgsys.co.th\/wp-content\/uploads\/2024\/05\/Consulting-.png\"><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h3 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" href=\"https:\/\/atgsys.co.th\/th\/consulting-and-strategy\/\" rel=\"nofollow\">Consulting and Strategy <\/a><\/h3><p class=\"wpr-feature-list-description\"><\/p><\/div><\/li><li class=\"wpr-feature-list-item elementor-repeater-item-1d7449c\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><img decoding=\"async\" src=\"https:\/\/atgsys.co.th\/wp-content\/uploads\/2024\/05\/cloud.png\"><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h3 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" href=\"https:\/\/atgsys.co.th\/th\/cloud-integration-services\/\" rel=\"nofollow\">Cloud Integration Services<\/a><\/h3><p class=\"wpr-feature-list-description\"><\/p><\/div><\/li><li class=\"wpr-feature-list-item elementor-repeater-item-d86b784\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><img decoding=\"async\" src=\"https:\/\/atgsys.co.th\/wp-content\/uploads\/2024\/05\/cyber-security.png\"><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h3 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" href=\"https:\/\/atgsys.co.th\/th\/cybersecurity-solutions\/\" rel=\"nofollow\">Cybersecurity Solution<\/a><\/h3><p class=\"wpr-feature-list-description\"><\/p><\/div><\/li><li class=\"wpr-feature-list-item elementor-repeater-item-4d455e7\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><img decoding=\"async\" src=\"https:\/\/atgsys.co.th\/wp-content\/uploads\/2024\/05\/networking.png\"><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h3 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" href=\"https:\/\/atgsys.co.th\/th\/networking-and-infrastructure\/\" rel=\"nofollow\">Networking and Infrastructure <\/a><\/h3><p class=\"wpr-feature-list-description\"><\/p><\/div><\/li><li class=\"wpr-feature-list-item elementor-repeater-item-5c84035\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><img decoding=\"async\" src=\"https:\/\/atgsys.co.th\/wp-content\/uploads\/2024\/05\/service.png\"><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h3 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" href=\"https:\/\/atgsys.co.th\/th\/managed-it-services\/\" rel=\"nofollow\">Managed IT Services <\/a><\/h3><p class=\"wpr-feature-list-description\"><\/p><\/div><\/li><li class=\"wpr-feature-list-item elementor-repeater-item-2f6b2fd\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><img decoding=\"async\" src=\"https:\/\/atgsys.co.th\/wp-content\/uploads\/2024\/05\/disaster-2.png\"><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h3 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" href=\"https:\/\/atgsys.co.th\/th\/disaster-recovery-and-business-continuity\/\" rel=\"nofollow\">Disaster Recovery and Business Continuity <\/a><\/h3><p class=\"wpr-feature-list-description\"><\/p><\/div><\/li><\/ul><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73189b2 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no qodef-elementor-content-no e-con e-child\" data-id=\"73189b2\" data-element_type=\"container\" data-settings=\"{&quot;_ob_use_container_extras&quot;:&quot;no&quot;,&quot;_ob_column_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_glider_is_slider&quot;:&quot;no&quot;,&quot;_ob_column_has_pseudo&quot;:&quot;no&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14b7a52 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no qodef-elementor-content-no e-con e-child\" data-id=\"14b7a52\" data-element_type=\"container\" data-settings=\"{&quot;_ob_use_container_extras&quot;:&quot;no&quot;,&quot;_ob_column_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_glider_is_slider&quot;:&quot;no&quot;,&quot;_ob_column_has_pseudo&quot;:&quot;no&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8ca831 ob-harakiri-inherit ob-has-background-overlay elementor-widget elementor-widget-heading\" data-id=\"e8ca831\" data-element_type=\"widget\" data-settings=\"{&quot;_ob_use_harakiri&quot;:&quot;yes&quot;,&quot;_ob_harakiri_writing_mode&quot;:&quot;inherit&quot;,&quot;_ob_harakiri_text_clip&quot;:&quot;none&quot;,&quot;_ob_perspektive_use&quot;:&quot;no&quot;,&quot;_ob_poopart_use&quot;:&quot;yes&quot;,&quot;_ob_shadough_use&quot;:&quot;no&quot;,&quot;_ob_allow_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_widget_stalker_use&quot;:&quot;no&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Solution <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa9efea ob-harakiri-inherit ob-has-background-overlay elementor-widget elementor-widget-text-editor\" data-id=\"aa9efea\" data-element_type=\"widget\" data-settings=\"{&quot;_ob_use_harakiri&quot;:&quot;yes&quot;,&quot;_ob_harakiri_writing_mode&quot;:&quot;inherit&quot;,&quot;_ob_postman_use&quot;:&quot;no&quot;,&quot;_ob_perspektive_use&quot;:&quot;no&quot;,&quot;_ob_poopart_use&quot;:&quot;yes&quot;,&quot;_ob_shadough_use&quot;:&quot;no&quot;,&quot;_ob_allow_hoveranimator&quot;:&quot;no&quot;,&quot;_ob_widget_stalker_use&quot;:&quot;no&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><b><span data-contrast=\"auto\">\u201cCybersecurity Solutions&#8221; are crucial for protecting organizational digital assets, ensuring the integrity, confidentiality, and availability of data. Our Cybersecurity solution and services encompass a comprehensive approach to safeguarding information systems from cyber threats and vulnerabilities. Below are the detailed services offered by ATG:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol><li><b><span data-contrast=\"auto\"> Risk Assessment and Vulnerability Analysis<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"41\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Comprehensive evaluation of the IT environment to identify vulnerabilities and potential threats.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"41\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Prioritization of risks based on their potential impact on business operations.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"2\"><li><b><span data-contrast=\"auto\"> Cybersecurity Strategy and Policy Development<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Crafting tailored cybersecurity strategies and policies that align with business objectives and regulatory requirements.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Guidance on implementing best practices for information security management.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"3\"><li><b><span data-contrast=\"auto\"> Security Architecture and Design<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"45\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Designing robust security architectures that protect against a wide array of cyber threats while supporting business processes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"45\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Implementation of security controls and measures tailored to the organization\u2019s specific needs.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"4\"><li><b><span data-contrast=\"auto\"> Identity and Access Management (IAM)<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"47\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Solutions to ensure that only authorized individuals can access sensitive information and resources.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"47\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Implementation of multi-factor authentication, single sign-on (SSO), and identity governance systems.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"5\"><li><b><span data-contrast=\"auto\"> Data Protection and Encryption<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"49\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Techniques and tools to protect data at rest, in transit, and during processing.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"49\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Encryption strategies to safeguard sensitive information from unauthorized access.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"6\"><li><b><span data-contrast=\"auto\"> Intrusion Detection and Prevention Systems (IDPS)<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"51\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Deployment of systems that monitor network and system activities for malicious activities or policy violations.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"51\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Automated responses to detected incidents to prevent or minimize damage.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"7\"><li><b><span data-contrast=\"auto\"> Endpoint Security<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"53\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Solutions to protect end-user devices like desktops, laptops, and mobile devices from being exploited by malicious actors.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"53\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Includes antivirus, anti-malware, and advanced endpoint protection platforms.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"8\"><li><b><span data-contrast=\"auto\"> Firewall Management<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"55\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Configuration and management of firewalls to control incoming and outgoing network traffic based on an applied rule set.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"55\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Regular updates and rule adjustments to adapt to new security threats.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"9\"><li><b><span data-contrast=\"auto\"> Security Monitoring and Incident Response<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"57\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Continuous monitoring of IT systems for security incidents and anomalies.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"57\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Rapid response to security breaches or incidents to mitigate impacts and recover normal operations.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"10\"><li><b><span data-contrast=\"auto\"> Cybersecurity Training and Awareness<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"59\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Programs to educate employees about cybersecurity best practices, phishing scams, and safe internet usage to reduce human error.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"59\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Regular updates and drills to keep cybersecurity awareness top of mind.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"11\"><li><b><span data-contrast=\"auto\"> Regulatory Compliance and Audit Support<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"61\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Assistance in achieving compliance with industry regulations and standards such as GDPR, HIPAA, PCI-DSS, and more.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"61\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Support during audits to ensure cybersecurity measures meet regulatory requirements.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><ol start=\"12\"><li><b><span data-contrast=\"auto\"> Managed Security Services<\/span><\/b><\/li><\/ol><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"63\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Outsourced monitoring and management of security devices and systems.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"63\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u00b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Access to specialized security expertise and 24\/7 support.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Cybersecurity Solutions are vital for businesses of all sizes to protect against the ever-evolving landscape of cyber threats, ensuring the trust of customers and the reputation of the business.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:360,&quot;335559991&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Consulting and Strategy Cloud Integration Services Cybersecurity Solution Networking and Infrastructure Managed IT Services Disaster Recovery and Business Continuity Cybersecurity Solution \u201cCybersecurity Solutions&#8221; are crucial for protecting organizational digital assets, ensuring the integrity, confidentiality, and availability of data. Our Cybersecurity solution and services encompass a comprehensive approach to safeguarding information systems from cyber threats and [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"content-type":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"https:\/\/atgsys.co.th\/th\/wp-json\/wp\/v2\/pages\/11414"}],"collection":[{"href":"https:\/\/atgsys.co.th\/th\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/atgsys.co.th\/th\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/atgsys.co.th\/th\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/atgsys.co.th\/th\/wp-json\/wp\/v2\/comments?post=11414"}],"version-history":[{"count":62,"href":"https:\/\/atgsys.co.th\/th\/wp-json\/wp\/v2\/pages\/11414\/revisions"}],"predecessor-version":[{"id":14405,"href":"https:\/\/atgsys.co.th\/th\/wp-json\/wp\/v2\/pages\/11414\/revisions\/14405"}],"wp:attachment":[{"href":"https:\/\/atgsys.co.th\/th\/wp-json\/wp\/v2\/media?parent=11414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}