{"id":8140,"date":"2021-02-16T18:06:05","date_gmt":"2021-02-16T18:06:05","guid":{"rendered":"https:\/\/test.uploadbook.com\/syscom\/?page_id=8140"},"modified":"2021-11-08T19:38:47","modified_gmt":"2021-11-08T19:38:47","slug":"managed-soc-service","status":"publish","type":"page","link":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/","title":{"rendered":"Managed SOC Service"},"content":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Managed SOC Service for More Advanced Protection<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Our managed Security Operations Center (SOC) service offers advanced and extensive cybersecurity protection of your most critical IT assets, including corporate and customer data. We also simplify your path to compliance with various regulatory and vertical-specific requirements.[\/vc_column_text][vc_single_image image=&#8221;8229&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Our managed SOC Service covers from detecting suspicious activity to escalating it by email or phone (Step 1 to 5 below). Then, SYSCOM and\/or Client team would execute SYSCOM\u2019s recommendations on incident management and resolution(Step 6).[\/vc_column_text][vc_single_image image=&#8221;9695&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>24\/7 Monitoring and Analysis<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Without properly managing and adopting a complete defense cycle, your SOC service or other security tools could actually hurt your business financially, while not improving cyber-defense. Our 24\/7 SOC service provides a far-reaching security posture ensuring your assets and data have multiple layers of protection.[\/vc_column_text][vc_single_image image=&#8221;8231&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Reporting<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]As a part of managed SOC services, each month or quarter, we provide a detailed report containing all relevant information about your ongoing threat monitoring service. It starts with a high-level assessment of your security posture all the way down to a detailed analysis of every facet of your chosen services. The information is presented as trends over four months so you can track your organization\u2019s performance from various angles, including the number of incidents, time-to-resolution of incidents, and the overall number of vulnerabilities.[\/vc_column_text][vc_single_image image=&#8221;8233&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Vulnerability Assessment<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Regular vulnerability assessments help analyze and uncover issues facing information systems and offer recommendations to reduce your organization\u2019s level of risk. A vulnerability assessment usually includes the following elements:[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-40 padding-box padding-full-left&#8221;][vc_column][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_id=&#8221;syscom-arrow&#8221;][vc_column_inner el_class=&#8221;blue-sym first-column vertical-center pb-20&#8243; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;mt-20&#8243;]<\/p>\n<p class=\"syscom-arrow pb-20\">Network infrastructure review<\/p>\n<p class=\"syscom-arrow pb-20\">Vulnerability scanning, including filtering false positives<\/p>\n<p class=\"syscom-arrow pb-20\">Vulnerability research<\/p>\n<p class=\"syscom-arrow pb-20\">Production of a final vulnerability report<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;pb-20&#8243;]With these elements, you can:[\/vc_column_text][vc_column_text el_class=&#8221;mt-20&#8243;]<\/p>\n<p class=\"syscom-arrow pb-20\">Establish a baseline (and thus see potentially dangerous anomalies)<\/p>\n<p class=\"syscom-arrow pb-20\">Track effects of patching and remediation efforts<\/p>\n<p class=\"syscom-arrow pb-20\">Report to management (PCI compliance)<\/p>\n<p class=\"syscom-arrow pb-20\">Identify vulnerabilities before they impact your organization<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;vertical-center&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;8316&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Penetration Test<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Once you agree on the scope of work, we verify\u202fsecurity weakness\u202fto determine\u202fif your organization\u2019s data and applications will resist\u202fexternal\u202fattacks.\u202fIn addition, we provide\u202fpenetration\u202ftesting on\u202fknown\u202f(White Box), half-known\u202f(Gray Box),\u202fand\u202funknown\u202f(Black Box)\u202fenvironments.[\/vc_column_text][vc_single_image image=&#8221;8239&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Testing\u202fLevels Offered:[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-50 padding-box padding-full-left hide-mobile&#8221;][vc_column][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_id=&#8221;syscom-arrow&#8221;][vc_column_inner el_class=&#8221;blue-sym&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<p class=\"syscom-arrow pb-20\">Recognition phase<\/p>\n<p class=\"syscom-arrow pb-20\">Port scanning and systems identification<\/p>\n<p class=\"syscom-arrow pb-20\">Services drilling\/search<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;blue-sym&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;pb-50&#8243;]<\/p>\n<p class=\"syscom-arrow pb-20\">Vulnerability identification and validation<\/p>\n<p class=\"syscom-arrow pb-20\">Vulnerability exploitation and evaluation of associated risks<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-50 padding-box padding-full-left display-mobile&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;blue-sym&#8221;][vc_column_text]<\/p>\n<p class=\"syscom-arrow pb-20\">Recognition phase<\/p>\n<p class=\"syscom-arrow pb-20\">Port scanning and systems identification<\/p>\n<p class=\"syscom-arrow pb-20\">Services drilling\/search<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;blue-sym&#8221;][vc_column_text el_class=&#8221;pb-50&#8243;]<\/p>\n<p class=\"syscom-arrow pb-20\">Vulnerability identification and validation<\/p>\n<p class=\"syscom-arrow pb-20\">Vulnerability exploitation and evaluation of associated risks<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-60 padding-box padding-full-left&#8221;][vc_column][vc_column_text]The penetration test will verify if those assets will resist hostile attacks without revealing too much information on your environment. These steps will be carried out using multiple open source tools and also specialized tools, SYSCOM will attack the systems if a potentially viable method of exploitation exists.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;padding-box padding-top padding-bottom padding-bottom-gray gradient gradient-l hide-mobile&#8221; css=&#8221;.vc_custom_1622480054435{background-image: url(https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/Module-Security.jpeg?id=4461) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;pt-30per pb-30per section-mobile-bg&#8221; offset=&#8221;vc_col-md-6&#8243;][vc_column_text el_class=&#8221;mod_features block-text-with-link&#8221;]<\/p>\n<h2>Protect Your Business<\/h2>\n<p class=\"s1 white\">Comprehensive\u202fsecurity solutions\u202fhelp companies of all sizes keep every part of their business secure,\u202ftrusted\u202fand worry-free.\u202fOur experts will\u202fbe on your side to\u202fensure\u202fyour\u202fmost important resources are protected and business\u202frisks\u202fare minimized.<\/p>\n<p><a class=\"link white\" href=\"https:\/\/test.uploadbook.com\/syscom\/solutions\/it-security-solutions\/\">Learn More<\/a>[\/vc_column_text][vc_raw_html el_class=&#8221;button-panel&#8221;]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[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_single_image image=&#8221;4461&#8243; img_size=&#8221;syscom_full_mobile&#8221; vc_none_hover_effect=&#8221;&#8221; vc_set_img_bg=&#8221;true&#8221; el_class=&#8221;img-mobile&#8221;][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;padding-box padding-top padding-bottom padding-bottom-gray gradient gradient-l display-mobile&#8221; css=&#8221;.vc_custom_1622480061296{background-image: url(https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/Module-Security.jpeg?id=4461) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-6 vc_col-xs-12&#8243;][vc_single_image image=&#8221;4461&#8243; img_size=&#8221;syscom_full_mobile&#8221; vc_none_hover_effect=&#8221;&#8221; vc_set_img_bg=&#8221;true&#8221; el_class=&#8221;img-mobile&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;pt-30per pb-30per section-mobile-bg&#8221; offset=&#8221;vc_col-md-6 vc_col-xs-12&#8243;][vc_column_text el_class=&#8221;mod_features block-text-with-link&#8221;]<\/p>\n<h2>Protect Your Business<\/h2>\n<p class=\"s1 white\">Comprehensive\u202fsecurity solutions\u202fhelp companies of all sizes keep every part of their business secure,\u202ftrusted\u202fand worry-free.\u202fOur experts will\u202fbe on your side to\u202fensure\u202fyour\u202fmost important resources are protected and business\u202frisks\u202fare minimized.<\/p>\n<p><a class=\"link white\" href=\"https:\/\/test.uploadbook.com\/syscom\/solutions\/it-security-solutions\/\">Learn More<\/a>[\/vc_column_text][vc_raw_html el_class=&#8221;button-panel&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left home-intro hidden&#8221;][vc_column el_class=&#8221;custom-news&#8221;][vc_column_text]<\/p>\n<h2>News &amp;<br \/>\nResources<\/h2>\n<p>[\/vc_column_text][cms_latest_news categories_name=&#8221;News&#8221; cms_template=&#8221;cms_latest_news&#8211;layout-columns.php&#8221;][vc_column_text el_class=&#8221;block-text-with-link&#8221;]<a class=\"cms-button md mt-30\" href=\"https:\/\/test.uploadbook.com\/syscom\/company\/news-and-resources\/\">Learn More<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left columns-vertical-center gray-bg&#8221;][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;syscom-blockquote red-sym first-column vertical-center&#8221;][vc_column_text el_class=&#8221;block-text-link&#8221;]Our managed Security Operations Center (SOC) service offers advanced and extensive cybersecurity protection of your most critical IT assets. Please contact us for more details.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;vertical-center&#8221;][vc_column_text el_class=&#8221;block-text-link&#8221;]<a class=\"cms-button md\" href=\"https:\/\/test.uploadbook.com\/syscom\/contact-us\/\">CONTACT US TODAY<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-5per padding-box padding-top padding-bottom padding-bottom-gray footer-bg&#8221;][vc_column][vc_raw_html el_id=&#8221;footer-block&#8221;]JTNDJTIxLS0lMjBUSElTJTIwSVMlMjBBJTIwRk9PVEVSJTIwQkxPQ0slMjAtLSUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text] Managed SOC Service for More Advanced Protection [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Our managed Security Operations Center (SOC) service offers advanced<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":8105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managed SOC Services - SYSCOM GLOBAL SOLUTIONS<\/title>\n<meta name=\"description\" content=\"Our managed Security Operations Center (SOC) service offers advanced and extensive cybersecurity protection of your most critical IT assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed SOC Services - SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"og:description\" content=\"Our managed Security Operations Center (SOC) service offers advanced and extensive cybersecurity protection of your most critical IT assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-08T19:38:47+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"60\" \/>\n<meta name=\"twitter:description\" content=\"false\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/\",\"name\":\"Managed SOC Services - SYSCOM GLOBAL SOLUTIONS\",\"isPartOf\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\"},\"datePublished\":\"2021-02-16T18:06:05+00:00\",\"dateModified\":\"2021-11-08T19:38:47+00:00\",\"description\":\"Our managed Security Operations Center (SOC) service offers advanced and extensive cybersecurity protection of your most critical IT assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed IT Security\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Managed SOC Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"name\":\"Syscom Global Solutions\",\"description\":\"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS\",\"publisher\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\",\"name\":\"syscom global solutions\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"contentUrl\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"width\":204,\"height\":46,\"caption\":\"syscom global solutions\"},\"image\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed SOC Services - SYSCOM GLOBAL SOLUTIONS","description":"Our managed Security Operations Center (SOC) service offers advanced and extensive cybersecurity protection of your most critical IT assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/","og_locale":"en_US","og_type":"article","og_title":"Managed SOC Services - SYSCOM GLOBAL SOLUTIONS","og_description":"Our managed Security Operations Center (SOC) service offers advanced and extensive cybersecurity protection of your most critical IT assets.","og_url":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/","og_site_name":"SYSCOM GLOBAL SOLUTIONS","article_modified_time":"2021-11-08T19:38:47+00:00","twitter_card":"summary_large_image","twitter_title":"60","twitter_description":"false","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/","url":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/","name":"Managed SOC Services - SYSCOM GLOBAL SOLUTIONS","isPartOf":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website"},"datePublished":"2021-02-16T18:06:05+00:00","dateModified":"2021-11-08T19:38:47+00:00","description":"Our managed Security Operations Center (SOC) service offers advanced and extensive cybersecurity protection of your most critical IT assets.","breadcrumb":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/managed-soc-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test.uploadbook.com\/syscom\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Managed IT Security","item":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/"},{"@type":"ListItem","position":4,"name":"Managed SOC Service"}]},{"@type":"WebSite","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","name":"Syscom Global Solutions","description":"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS","publisher":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization","name":"syscom global solutions","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/","url":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","contentUrl":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","width":204,"height":46,"caption":"syscom global solutions"},"image":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8140"}],"collection":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/comments?post=8140"}],"version-history":[{"count":35,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8140\/revisions"}],"predecessor-version":[{"id":11449,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8140\/revisions\/11449"}],"up":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8105"}],"wp:attachment":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/media?parent=8140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}