{"id":5433,"date":"2021-09-07T11:41:34","date_gmt":"2021-09-07T11:41:34","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5433"},"modified":"2021-09-07T11:45:51","modified_gmt":"2021-09-07T11:45:51","slug":"enterprise-security-architecture","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5433","title":{"rendered":"ENTERPRISE SECURITY ARCHITECTURE"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5433\" class=\"elementor elementor-5433\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2582fa9d elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2582fa9d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3497c161 ot-flex-column-vertical\" data-id=\"3497c161\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5eedbf6 elementor-widget elementor-widget-heading\" data-id=\"5eedbf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Align Information Security to your Business Objectives<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef6f341 elementor-widget elementor-widget-spacer\" data-id=\"ef6f341\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5945ffa5 elementor-widget elementor-widget-text-editor\" data-id=\"5945ffa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-2183 alignleft\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/1_UdZf5qFWo55HE2M96TxvbQ-300x169-1.jpeg\" alt=\"\" width=\"300\" height=\"169\" \/>Implementing formal enterprise architecture allows your organization to integrate security and risk into your business objectives. The result is consistency and traceability throughout your organization. To help you, we offer certified SABSA architects that assist with planning and implementing the architecture across different layers from business drivers to operational. If required, we can also provide a full suite of enterprise architecture service.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Align Information Security to your Business Objectives Implementing formal enterprise architecture allows your organization to integrate security and risk into your business objectives. The result is consistency and traceability throughout your organization. To help you, we offer certified SABSA architects that assist with planning and implementing the architecture across different layers from business drivers to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5433","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5433"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5433\/revisions"}],"predecessor-version":[{"id":5438,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5433\/revisions\/5438"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}