{"id":5463,"date":"2021-09-07T12:18:13","date_gmt":"2021-09-07T12:18:13","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5463"},"modified":"2021-09-07T12:22:54","modified_gmt":"2021-09-07T12:22:54","slug":"professional-information-security","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5463","title":{"rendered":"Professional Information Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5463\" class=\"elementor elementor-5463\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3ba37c3a elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ba37c3a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ad491ce ot-flex-column-vertical\" data-id=\"5ad491ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16e5af1 elementor-widget elementor-widget-text-editor\" data-id=\"16e5af1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-2215 alignleft\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/IT-CONSULTANCY-_-CYBER-SECURITY-322-300x300-1.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/IT-CONSULTANCY-_-CYBER-SECURITY-322-300x300-1.png 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/IT-CONSULTANCY-_-CYBER-SECURITY-322-300x300-1-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p><h4><strong>GET IT RIGHT THE FIRST TIME<\/strong><\/h4><p>We help ensure your security technologies are designed, implemented and integrated correctly the first time. This gives you the confidence to invest in new technology and successfully deploy it within your organization without the headache finding the right people to implement it. It sets you up to more readily achieve a positive return on your security investment.<\/p><p>We help by delivering the right skills and expertise to manage the different complexities of your chosen security technology. Our combined team has experience in security and solution architecture, cloud infrastructure, gateway, endpoint, email and web and security analytics.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33852aa5 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33852aa5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41944ab7 ot-flex-column-vertical\" data-id=\"41944ab7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ed2d650 elementor-widget elementor-widget-iserv_box\" data-id=\"3ed2d650\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iserv_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"serv-box s1 elementor-animation-\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-unlock-alt\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Key benefits of using our Professional Services:<\/h5>\r\n\t            <div>Reduce the cost of planning and implementing with predictable timelines <br>\nAchieve outcomes with end-to-end management of your security <br>\nFree-up your team to stay focused on business-critical functions <br>\nNo need to find, hire and manage a contractor for a single project <br>\nMaximize the value of your security solutions so you achieve a better security posture <br>\nImplementation by certified and experienced security engineers with industry experience <br>\nOur engineers follow global and vendor best practices for all projects<\/div>\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-132ed8b ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"132ed8b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-486c84b ot-flex-column-vertical\" data-id=\"486c84b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-abafade elementor-widget elementor-widget-text-editor\" data-id=\"abafade\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><strong>Our services include:<\/strong><\/h5><ul><li>Solution scoping and transition services<\/li><li>Solution design and architecture<\/li><li>Solution implementation and migration projects<\/li><li>Solution refresh and upgrades<\/li><li>Cyber Security reviews<\/li><li>Solution health checks and audit services<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>GET IT RIGHT THE FIRST TIME We help ensure your security technologies are designed, implemented and integrated correctly the first time. This gives you the confidence to invest in new technology and successfully deploy it within your organization without the headache finding the right people to implement it. It sets you up to more readily [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5463","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5463"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5463\/revisions"}],"predecessor-version":[{"id":5467,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5463\/revisions\/5467"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}