{"id":11,"date":"2017-03-23T09:23:01","date_gmt":"2017-03-23T09:23:01","guid":{"rendered":"https:\/\/www.techinetics.com\/?page_id=11"},"modified":"2017-04-26T12:20:36","modified_gmt":"2017-04-26T12:20:36","slug":"security-solutions","status":"publish","type":"page","link":"https:\/\/www.techinetics.com\/security-solutions\/","title":{"rendered":"Security Solutions"},"content":{"rendered":"[vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”50″ bottom_padding=”50″ class=”empty-row” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1\/3″ tablet_text_alignment=”default” phone_text_alignment=”default”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1\/3″ tablet_text_alignment=”default” phone_text_alignment=”default”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1\/3″ tablet_text_alignment=”default” phone_text_alignment=”default”][\/vc_column][\/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” equal_height=”yes” content_placement=”top” scene_position=”center” text_color=”dark” text_align=”left” id=”package_container” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#339deb” background_color_opacity=”1″ background_color_hover=”#3084dd” background_hover_color_opacity=”1″ font_color=”#ffffff” width=”1\/3″ tablet_text_alignment=”default” phone_text_alignment=”default”]
\"package_A\"<\/div><\/div>[vc_column_text]\n
\n
    \n
  • Free Security Assessment<\/li>\n
  • Security Policy and Design<\/li>\n
  • Endpoint AntiVirus\/Security<\/li>\n
  • Next Generation Firewall Setup<\/li>\n
  • Basic Security Logging Response and Advising<\/li>\n
  • Monthly Health Reports<\/li>\n<\/ul>\n<\/div>\n[\/vc_column_text][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#339deb” background_color_opacity=”1″ background_color_hover=”#3084dd” background_hover_color_opacity=”1″ font_color=”#ffffff” width=”1\/3″ tablet_text_alignment=”default” phone_text_alignment=”default”]
    \"package_B\"<\/div><\/div>[vc_column_text]\n
    \n
      \n
    • Free Security Assessment<\/li>\n
    • Security Policy and Design<\/li>\n
    • Endpoint AntiVirus\/Security<\/li>\n
    • Next Generation Firewall Setup<\/li>\n
    • Application Control<\/li>\n
    • Email Filter<\/li>\n
    • Basic Security Logging Response and Advising<\/li>\n
    • Monthly Health Reports<\/li>\n<\/ul>\n<\/div>\n[\/vc_column_text][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#339deb” background_color_opacity=”1″ background_color_hover=”#3084dd” background_hover_color_opacity=”1″ font_color=”#ffffff” width=”1\/3″ tablet_text_alignment=”default” phone_text_alignment=”default”]
      \"package_C\"<\/div><\/div>[vc_column_text]\n
      \n
        \n
      • Free \u00a0Assessment<\/li>\n
      • Security Policy and Design<\/li>\n
      • Endpoint AntiVirus\/Security<\/li>\n
      • Next Generation Firewall Setup<\/li>\n
      • Application Control<\/li>\n
      • Email Filter<\/li>\n
      • Intrusion Prevention<\/li>\n
      • Web Filtering<\/li>\n
      • Security Logging Response and Advising<\/li>\n
      • Health Reports on Demand<\/li>\n<\/ul>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"

        [vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”50″ bottom_padding=”50″ class=”empty-row” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1\/3″ tablet_text_alignment=”default” phone_text_alignment=”default”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1\/3″ tablet_text_alignment=”default” phone_text_alignment=”default”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1\/3″ tablet_text_alignment=”default”…<\/p>\n","protected":false},"author":1,"featured_media":323,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/pages\/11"}],"collection":[{"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":25,"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":268,"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/pages\/11\/revisions\/268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/media\/323"}],"wp:attachment":[{"href":"https:\/\/www.techinetics.com\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}