{"id":636,"date":"2023-02-22T19:16:59","date_gmt":"2023-02-22T19:16:59","guid":{"rendered":"http:\/\/localhost\/devopsinsiders\/?page_id=636"},"modified":"2023-02-22T19:51:50","modified_gmt":"2023-02-22T19:51:50","slug":"advanced-security-solutions","status":"publish","type":"page","link":"http:\/\/localhost\/devopsinsiders\/advanced-security-solutions\/","title":{"rendered":"Advanced Security Solutions"},"content":{"rendered":"\n\n <div class=\"banner has-hover has-parallax\" id=\"banner-713556340\">\n <div class=\"banner-inner fill\">\n <div class=\"banner-bg fill\" data-parallax=\"-3\" data-parallax-container=\".banner\" data-parallax-background>\n <div class=\"bg fill bg-fill \"><\/div>\n <div class=\"overlay\"><\/div> \n <\/div>\n <div class=\"banner-layers container\">\n <div class=\"fill banner-link\"><\/div> \n\n <div id=\"text-box-1944192344\" class=\"text-box banner-layer x50 md-x50 lg-x50 y80 md-y80 lg-y80 res-text\">\n <div class=\"text dark\">\n \n <div class=\"text-inner text-center\">\n \n\n<h1 class=\"lead\">Advanced Security Solutions<\/h1>\n<p class=\"lead\">Our advanced SOC\/SIEM solutions provide robust and comprehensive security measures to protect against a wide range of threats and ensure that your organization is fully protected.<\/p>\n\n <\/div>\n <\/div>\n \n<style>\n#text-box-1944192344 {\n width: 70%;\n}\n#text-box-1944192344 .text {\n font-size: 100%;\n}\n<\/style>\n <\/div>\n \n\n <\/div>\n <\/div>\n\n \n<style>\n#banner-713556340 {\n padding-top: 507px;\n}\n#banner-713556340 .bg.bg-loaded {\n background-image: url(http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2016\/08\/dummy-2.jpg);\n}\n#banner-713556340 .overlay {\n background-color: rgba(0, 0, 0, 0.49);\n}\n<\/style>\n <\/div>\n\n\n\t<div id=\"gap-2115155767\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-2115155767 {\n padding-top: 61px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row\" id=\"row-1354254003\">\n\n\n\t<div id=\"col-1288570635\" class=\"col medium-6 small-12 large-6\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_2088934271\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1020\" height=\"680\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/3198965-1200x800.jpg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/3198965-1200x800.jpg 1200w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/3198965-600x400.jpg 600w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/3198965-768x512.jpg 768w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/3198965-1536x1024.jpg 1536w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/3198965-2048x1365.jpg 2048w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_2088934271 {\n width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-156005970\" class=\"col medium-6 small-12 large-6\" >\n\t\t<div class=\"col-inner text-left\" >\n\t\t\t\n\t\t\t\n\n<h1>Intelligent Security Analytics<\/h1>\n<p>Protect your business applications and data with our comprehensive security solutions. Our SOC\/SIEM solutions provide advanced threat detection, increased visibility, and scalability to safeguard your IT infrastructure from potential cyber threats.<\/p>\n<p>Our knowledgeable and professional team will work with you to understand your specific security needs and provide you with a comprehensive security solution that’s designed to meet your unique requirements.<\/p>\n<p>With our SOC\/SIEM solutions, you can detect and respond to potential security incidents in real-time, giving you the peace of mind that your IT infrastructure is secured. Contact us today to learn more about our security solutions and how we can help protect your business.<\/p>\n\n\t\t<\/div>\n\t\t\n<style>\n#col-156005970 > .col-inner {\n padding: 4px 0px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-1076674016\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1076674016 {\n padding-top: 61px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"container section-title-container\" ><h3 class=\"section-title section-title-bold-center\"><b><\/b><span class=\"section-title-main\" style=\"font-size:130%;\">Deployment Architecture<\/span><b><\/b><\/h3><\/div>\n\n<div class=\"row\" id=\"row-5291655\">\n\n\n\t<div id=\"col-88282042\" class=\"col small-12 large-12\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n<p>ABC Corporation had a basic IT infrastructure with a few servers running critical business applications. They had recently migrated their infrastructure to the cloud and were using Azure for hosting their Microservice Based Application on AKS. They were also using a basic firewall to protect their network from cyber threats. However, as their business grew, so did the complexity of their infrastructure.<\/p>\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_106867819\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1020\" height=\"613\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Before-Security.jpg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Before-Security.jpg 1267w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Before-Security-665x400.jpg 665w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Before-Security-768x462.jpg 768w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_106867819 {\n width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-649496071\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-649496071 {\n padding-top: 61px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"container section-title-container\" ><h3 class=\"section-title section-title-bold-center\"><b><\/b><span class=\"section-title-main\" style=\"font-size:130%;\">Potential Security Vulnerabilities<\/span><b><\/b><\/h3><\/div>\n\n<div class=\"row\" id=\"row-938287082\">\n\n\n\t<div id=\"col-1108376221\" class=\"col small-12 large-12\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n<p>As the infrastructure grew, so did the potential security vulnerabilities. The basic firewall that ABC Corporation was using was no longer enough to protect their network from sophisticated cyber threats. Their IT team realized that they needed a more comprehensive security solution to safeguard their business applications and data.<\/p>\n<p>ABC Corporation’s IT team identified the following potential security vulnerabilities:<\/p>\n<ul>\n<li>\n<p>Lack of visibility: The basic firewall did not provide visibility into the network traffic, making it difficult to detect and respond to threats in real-time.<\/p>\n<\/li>\n<li>\n<p>Inadequate threat detection: The basic firewall did not have advanced threat detection capabilities, making it vulnerable to advanced and sophisticated cyber threats.<\/p>\n<\/li>\n<li>\n<p>Limited scalability: The basic firewall was not designed to scale with the growing infrastructure of ABC Corporation, making it difficult to manage and maintain.<\/p>\n<\/li>\n<\/ul>\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1306872894\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1020\" height=\"609\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Security-Issues-1339x800.jpg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Security-Issues-1339x800.jpg 1339w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Security-Issues-669x400.jpg 669w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Security-Issues-768x459.jpg 768w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Security-Issues-1536x918.jpg 1536w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-Security-Issues.jpg 1742w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1306872894 {\n width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-1840359742\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1840359742 {\n padding-top: 61px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"container section-title-container\" ><h3 class=\"section-title section-title-bold-center\"><b><\/b><span class=\"section-title-main\" style=\"font-size:130%;\">the Secured architecture<\/span><b><\/b><\/h3><\/div>\n\n<div class=\"row\" id=\"row-1091509942\">\n\n\n\t<div id=\"col-357011248\" class=\"col small-12 large-12\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n<p>ABC Corporation’s IT team realized that they needed a more comprehensive security solution that could provide advanced threat detection, scalability, and visibility into their network traffic. They decided to implement a SOC and SIEM solution to secure their infrastructure.<\/p>\n<p>The SOC and SIEM solution provided the following benefits:<\/p>\n<p>Advanced threat detection: The SOC and SIEM solution provided advanced threat detection capabilities, enabling ABC Corporation to detect and respond to threats in real-time.<\/p>\n<p>Increased visibility: The SOC and SIEM solution provided visibility into the network traffic, enabling ABC Corporation to detect and investigate potential security incidents.<\/p>\n<p>Scalability: The SOC and SIEM solution was designed to scale with the growing infrastructure of ABC Corporation, making it easy to manage and maintain.<\/p>\n<p>With the implementation of the SOC and SIEM solution, ABC Corporation was able to secure their infrastructure and protect their business applications and data from potential cyber threats. They were now able to focus on their core business operations with the peace of mind that their IT infrastructure was secured.<\/p>\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1538755370\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1020\" height=\"550\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-After-Security-1400x755.jpg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-After-Security-1400x755.jpg 1400w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-After-Security-742x400.jpg 742w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-After-Security-768x414.jpg 768w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-After-Security-1536x828.jpg 1536w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-Architecture-After-Security.jpg 1751w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1538755370 {\n width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-1858023556\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1858023556 {\n padding-top: 61px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"container section-title-container\" ><h3 class=\"section-title section-title-bold-center\"><b><\/b><span class=\"section-title-main\" style=\"font-size:130%;\">DEVSECOPS PIPELINE<\/span><b><\/b><\/h3><\/div>\n\n<div class=\"row\" id=\"row-862315079\">\n\n\n\t<div id=\"col-2112803975\" class=\"col small-12 large-12\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n<p>Our DevSecOps pipeline integrates security into every stage of the software development lifecycle to ensure that your applications and services are secure from the ground up. Our pipeline combines development, security, and operations to create a seamless workflow that streamlines the software delivery process while prioritizing security.<\/p>\n<p>Our experienced team will work with you to develop and implement a DevSecOps pipeline that’s tailored to your specific needs. Our pipeline includes automated testing, vulnerability scanning, and continuous monitoring to ensure that your applications and services are protected against potential security threats.<\/p>\n<p>With our DevSecOps pipeline, you can achieve faster time-to-market without compromising security. Contact us today to learn more about our DevSecOps pipeline and how we can help you build and deliver secure applications and services.<\/p>\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1927928693\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1020\" height=\"637\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-devsecops-Azure-Pipeline--1282x800.jpg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-devsecops-Azure-Pipeline--1282x800.jpg 1282w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-devsecops-Azure-Pipeline--641x400.jpg 641w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-devsecops-Azure-Pipeline--768x479.jpg 768w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-devsecops-Azure-Pipeline--1536x958.jpg 1536w, http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/02\/aks-reference-architecture-devsecops-Azure-Pipeline--2048x1278.jpg 2048w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1927928693 {\n width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-1921006732\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1921006732 {\n padding-top: 61px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t<section class=\"section\" id=\"section_1214955560\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row align-center\" id=\"row-1564459581\">\n\n\n\t<div id=\"col-138704045\" class=\"col medium-10 small-12 large-10\" >\n\t\t<div class=\"col-inner text-center\" >\n\t\t\t\n\t\t\t\n\n<h2 class=\"uppercase\">I would highly recommend Devops insiders SOC\/SIEM solutions to any business looking to improve their security posture and protect their business applications and data from potential cyber threats. Thank you, devops insiders, for your expertise and support!”<\/h2>\n<p>Michael Johnson, Security Architect | Shield Security<\/p>\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1214955560 {\n padding-top: 60px;\n padding-bottom: 60px;\n min-height: 300px;\n background-color: rgb(245, 245, 245);\n}\n<\/style>\n\t<\/section>\n\t\n\t<div id=\"gap-1999370744\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1999370744 {\n padding-top: 61px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row\" id=\"row-724260691\">\n\n\n\t<div id=\"col-1673717330\" class=\"col medium-6 small-12 large-6\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n<div class=\"container section-title-container\" ><h3 class=\"section-title section-title-normal\"><b><\/b><span class=\"section-title-main\" style=\"font-size:147%;\">From Migration to securing applications<\/span><b><\/b><\/h3><\/div>\n\n<p>DevOps Insiders has a well-established reputation for providing SOC and SIEM solutions to organizations of all sizes. Their team of experts has a deep understanding of the latest security technologies, and they stay up-to-date with the ever-evolving threat landscape.<\/p>\n<a class=\"button primary is-outline\" >\n <span>Contact US<\/span>\n <\/a>\n\n\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1411643209\" class=\"col medium-6 small-12 large-6\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n<div class=\"row\" id=\"row-2045271450\">\n\n\n\t<div id=\"col-1482117132\" class=\"col medium-6 small-12 large-6\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_2040144641\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1\" height=\"1\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/01\/work_icon.svg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_2040144641 {\n width: 31%;\n}\n<\/style>\n\t<\/div>\n\t\n\n<p style=\"text-align: left;\">Guidance on usage of security tools<\/p>\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-770386699\" class=\"col medium-6 small-12 large-6\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1773187500\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1\" height=\"1\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/01\/vm_and_containers-02.svg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1773187500 {\n width: 31%;\n}\n<\/style>\n\t<\/div>\n\t\n\n<p style=\"text-align: left;\">Secure deployment of applications<\/p>\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1324679691\" class=\"col medium-6 small-12 large-6\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1497426813\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1\" height=\"1\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/01\/containers-02.svg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1497426813 {\n width: 31%;\n}\n<\/style>\n\t<\/div>\n\t\n\n<p style=\"text-align: left;\">Robust Security Solutions<\/p>\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1534381122\" class=\"col medium-6 small-12 large-6\" >\n\t\t<div class=\"col-inner\" >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_280539786\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1\" height=\"1\" src=\"http:\/\/localhost\/devopsinsiders\/wp-content\/uploads\/2023\/01\/consultancy_icon_001-02.svg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_280539786 {\n width: 31%;\n}\n<\/style>\n\t<\/div>\n\t\n\n<p style=\"text-align: left;\">Real-Time Threat Detections<\/p>\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\t\t\t<\/div>\n\n\t\n\n<\/div>\n\t<div id=\"gap-543276645\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-543276645 {\n padding-top: 61px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-transparent-header-light.php","meta":[],"_links":{"self":[{"href":"http:\/\/localhost\/devopsinsiders\/wp-json\/wp\/v2\/pages\/636"}],"collection":[{"href":"http:\/\/localhost\/devopsinsiders\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/localhost\/devopsinsiders\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/localhost\/devopsinsiders\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/localhost\/devopsinsiders\/wp-json\/wp\/v2\/comments?post=636"}],"version-history":[{"count":7,"href":"http:\/\/localhost\/devopsinsiders\/wp-json\/wp\/v2\/pages\/636\/revisions"}],"predecessor-version":[{"id":649,"href":"http:\/\/localhost\/devopsinsiders\/wp-json\/wp\/v2\/pages\/636\/revisions\/649"}],"wp:attachment":[{"href":"http:\/\/localhost\/devopsinsiders\/wp-json\/wp\/v2\/media?parent=636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}