{"id":8105,"date":"2021-02-16T12:06:21","date_gmt":"2021-02-16T12:06:21","guid":{"rendered":"https:\/\/test.uploadbook.com\/syscom\/?page_id=8105"},"modified":"2021-11-08T19:35:54","modified_gmt":"2021-11-08T19:35:54","slug":"managed-security","status":"publish","type":"page","link":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/","title":{"rendered":"Managed IT Security"},"content":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Comprehensive Managed IT Security Services<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Your business is at risk when assets are not sufficiently protected and security systems are not properly configured and managed. It\u2019s essential for businesses today to have a comprehensive managed security service provider (MSSP). It costs less than in-house solutions, provides round-the-clock service, and always remains up-to-date. Most importantly, it allows your organization to focus on its core activities while remaining protected against threats and vulnerabilities.[\/vc_column_text][vc_single_image image=&#8221;8258&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Threat Defense Lifecycle (TDL)<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]There are five important categories in our Threat Defense Lifecycle (TDL). When fully engaged with our TDL framework, businesses will be more secure and compliant with regulations. They will have access to experts who understand the most unique and leading technologies out there. And with such comprehensive protection, businesses can go back to focusing on their core activities.[\/vc_column_text][vc_single_image image=&#8221;11380&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-120 pb-80 content-columns3 padding-box padding-full-left gray-d0-bg hide-mobile&#8221;][vc_column][vc_row_inner equal_height=&#8221;yes&#8221; cms_row_inner_overflow=&#8221;&#8221; el_id=&#8221;rounded-icon-row desktop-view&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tdXNlci1ibGFjayUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tc2VjdXJpdHlfcHJvdGVjdGlvbiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tbW9uaXRvcmluZyUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221; el_id=&#8221;column-separator-full&#8221;][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Consulting<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Protection<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Detection<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>Assessment of business risks and security architecture for security requirements, policies,\u202fand processes.<\/li>\n<li>Budgeting, proposal, roadmap development<\/li>\n<li>Configuration tuning<\/li>\n<li>Management reports to the customer on incidents<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>Installing, upgrading, and managing first line of defense such as firewall, IPS\/IDS,\u202fantivirus\/EDR, SOC, next-gen email protection, training, secure web gateway, CASB, MFA,\u202fand access management \u2013 performed on behalf of the customer.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>Day-to-day monitoring, detection and interpretation of important system events throughout the network\u2014including unauthorized behavior, malicious hacks,\u202fdenial of service\u202f(DoS), anomalies, and trend analysis.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;pt-120 pb-30 content-columns3 padding-box padding-full-left gray-d0-bg display-mobile&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tdXNlci1ibGFjayUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Consulting<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>Assessment of business risks and security architecture for security requirements, policies,\u202fand processes.<\/li>\n<li>Budgeting, proposal, roadmap development<\/li>\n<li>Configuration tuning<\/li>\n<li>Management reports to the customer on incidents<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tc2VjdXJpdHlfcHJvdGVjdGlvbiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Protection<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>Installing, upgrading, and managing first line of defense such as firewall, IPS\/IDS,\u202fantivirus\/EDR, SOC, next-gen email protection, training, secure web gateway, CASB, MFA,\u202fand access management \u2013 performed on behalf of the customer.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tbW9uaXRvcmluZyUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Detection<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>Day-to-day monitoring, detection and interpretation of important system events throughout the network\u2014including unauthorized behavior, malicious hacks,\u202fdenial of service\u202f(DoS), anomalies, and trend analysis.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;content-columns3 padding-box padding-full-left gray-d0-bg hide-mobile&#8221;][vc_column][vc_row_inner equal_height=&#8221;yes&#8221; cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tYnVzaW5lc3NfaW50ZWxsaWxsZW5nZSUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tZW5naW5lZXIlMjIlM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJyb3VuZGVkLWljb24taW5uZXIlMjIlM0UlM0MlMkZzcGFuJTNFJTBBJTNDJTJGc3BhbiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Incident Handling<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Incident Response<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>Log analysis and triage on alerts<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>On-site\/Off-site mitigation support after an intrusion has occurred, including emergency incident response and forensic analysis.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;content-columns3 padding-box padding-full-left gray-d0-bg display-mobile&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tYnVzaW5lc3NfaW50ZWxsaWxsZW5nZSUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Incident Handling<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>Log analysis and triage on alerts<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tZW5naW5lZXIlMjIlM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJyb3VuZGVkLWljb24taW5uZXIlMjIlM0UlM0MlMkZzcGFuJTNFJTBBJTNDJTJGc3BhbiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">Incident Response<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<ul class=\"list-under-icon\">\n<li>On-site\/Off-site mitigation support after an intrusion has occurred, including emergency incident response and forensic analysis.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;padding-box padding-top padding-top-gray-d0 padding-bottom gradient gradient-l hide-mobile&#8221; css=&#8221;.vc_custom_1622480467300{background-image: url(https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/Module-Security.jpeg?id=4461) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;pt-30per pb-30per section-mobile-bg&#8221; offset=&#8221;vc_col-md-6&#8243;][vc_column_text el_class=&#8221;mod_features block-text-with-link&#8221;]<\/p>\n<h2>Protect Your Business<\/h2>\n<p class=\"s1 white\">Comprehensive\u202fsecurity solutions\u202fhelp companies of all sizes keep every part of their business secure,\u202ftrusted\u202fand worry-free.\u202fOur experts will\u202fbe on your side to\u202fensure\u202fyour\u202fmost important resources are protected and business\u202frisks\u202fare minimized.<\/p>\n<p><a class=\"link white\" href=\"https:\/\/test.uploadbook.com\/syscom\/solutions\/it-security-solutions\/\">Learn More<\/a>[\/vc_column_text][vc_raw_html el_class=&#8221;button-panel&#8221;]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[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_single_image image=&#8221;4461&#8243; img_size=&#8221;syscom_full_mobile&#8221; vc_none_hover_effect=&#8221;&#8221; vc_set_img_bg=&#8221;true&#8221; el_class=&#8221;img-mobile&#8221;][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;padding-box padding-top padding-top-gray-d0 padding-bottom gradient gradient-l display-mobile&#8221; css=&#8221;.vc_custom_1622480457664{background-image: url(https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/Module-Security.jpeg?id=4461) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-6 vc_col-xs-12&#8243;][vc_single_image image=&#8221;4461&#8243; img_size=&#8221;syscom_full_mobile&#8221; vc_none_hover_effect=&#8221;&#8221; vc_set_img_bg=&#8221;true&#8221; el_class=&#8221;img-mobile&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;pt-30per pb-30per section-mobile-bg&#8221; offset=&#8221;vc_col-md-6 vc_col-xs-12&#8243;][vc_column_text el_class=&#8221;mod_features block-text-with-link&#8221;]<\/p>\n<h2>Protect Your Business<\/h2>\n<p class=\"s1 white\">Comprehensive\u202fsecurity solutions\u202fhelp companies of all sizes keep every part of their business secure,\u202ftrusted\u202fand worry-free.\u202fOur experts will\u202fbe on your side to\u202fensure\u202fyour\u202fmost important resources are protected and business\u202frisks\u202fare minimized.<\/p>\n<p><a class=\"link white\" href=\"https:\/\/test.uploadbook.com\/syscom\/solutions\/it-security-solutions\/\">Learn More<\/a>[\/vc_column_text][vc_raw_html el_class=&#8221;button-panel&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left home-intro hidden&#8221;][vc_column el_class=&#8221;custom-news&#8221;][vc_column_text]<\/p>\n<h2>News &amp;<br \/>\nResources<\/h2>\n<p>[\/vc_column_text][cms_latest_news categories_name=&#8221;News&#8221; cms_template=&#8221;cms_latest_news&#8211;layout-columns.php&#8221;][vc_column_text el_class=&#8221;block-text-with-link&#8221;]<a class=\"cms-button md mt-30\" href=\"https:\/\/test.uploadbook.com\/syscom\/company\/news-and-resources\/\">Learn More<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left columns-vertical-center&#8221;][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;syscom-blockquote red-sym first-column vertical-center&#8221;][vc_column_text el_class=&#8221;block-text-link&#8221;]We help protect your infrastructure, data, and people from external and internal security\u00a0threats. Please contact us for more details.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;vertical-center&#8221;][vc_column_text el_class=&#8221;block-text-link&#8221;]<a class=\"cms-button md\" href=\"https:\/\/test.uploadbook.com\/syscom\/contact-us\/\">CONTACT US TODAY<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-5per padding-box padding-top padding-bottom footer-bg&#8221;][vc_column][vc_raw_html el_id=&#8221;footer-block&#8221;]JTNDJTIxLS0lMjBUSElTJTIwSVMlMjBBJTIwRk9PVEVSJTIwQkxPQ0slMjAtLSUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text] Comprehensive Managed IT Security Services [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Your business is at risk when assets are not sufficiently protected<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":4435,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managed IT Security Services &amp; Solutions - SYSCOM GLOBAL SOLUTIONS<\/title>\n<meta name=\"description\" content=\"We provide managed IT security services &amp; solutions to help protect your most important assets - infrastructure, data, and people.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed IT Security Services &amp; Solutions - SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"og:description\" content=\"We provide managed IT security services &amp; solutions to help protect your most important assets - infrastructure, data, and people.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-08T19:35:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"60\" \/>\n<meta name=\"twitter:description\" content=\"false\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/\",\"name\":\"Managed IT Security Services & Solutions - SYSCOM GLOBAL SOLUTIONS\",\"isPartOf\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\"},\"datePublished\":\"2021-02-16T12:06:21+00:00\",\"dateModified\":\"2021-11-08T19:35:54+00:00\",\"description\":\"We provide managed IT security services & solutions to help protect your most important assets - infrastructure, data, and people.\",\"breadcrumb\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"name\":\"Syscom Global Solutions\",\"description\":\"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS\",\"publisher\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\",\"name\":\"syscom global solutions\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"contentUrl\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"width\":204,\"height\":46,\"caption\":\"syscom global solutions\"},\"image\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed IT Security Services & Solutions - SYSCOM GLOBAL SOLUTIONS","description":"We provide managed IT security services & solutions to help protect your most important assets - infrastructure, data, and people.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/","og_locale":"en_US","og_type":"article","og_title":"Managed IT Security Services & Solutions - SYSCOM GLOBAL SOLUTIONS","og_description":"We provide managed IT security services & solutions to help protect your most important assets - infrastructure, data, and people.","og_url":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/","og_site_name":"SYSCOM GLOBAL SOLUTIONS","article_modified_time":"2021-11-08T19:35:54+00:00","twitter_card":"summary_large_image","twitter_title":"60","twitter_description":"false","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/","url":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/","name":"Managed IT Security Services & Solutions - SYSCOM GLOBAL SOLUTIONS","isPartOf":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website"},"datePublished":"2021-02-16T12:06:21+00:00","dateModified":"2021-11-08T19:35:54+00:00","description":"We provide managed IT security services & solutions to help protect your most important assets - infrastructure, data, and people.","breadcrumb":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test.uploadbook.com\/syscom\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Managed IT Security"}]},{"@type":"WebSite","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","name":"Syscom Global Solutions","description":"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS","publisher":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization","name":"syscom global solutions","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/","url":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","contentUrl":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","width":204,"height":46,"caption":"syscom global solutions"},"image":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8105"}],"collection":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/comments?post=8105"}],"version-history":[{"count":23,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8105\/revisions"}],"predecessor-version":[{"id":11448,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8105\/revisions\/11448"}],"up":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/4435"}],"wp:attachment":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/media?parent=8105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}