{"id":2,"date":"2024-01-26T12:42:22","date_gmt":"2024-01-26T12:42:22","guid":{"rendered":"https:\/\/fourprotect.com\/?page_id=2"},"modified":"2024-10-29T13:58:04","modified_gmt":"2024-10-29T13:58:04","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/fourprotect.com\/?page_id=2","title":{"rendered":"Our Services"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><strong>Capabilities<\/strong><\/p>\n\n\n\n<p>Expert security engineers, architects, and seasoned professionals, our capabilities span the spectrum of cybersecurity. Leveraging our extensive knowledge and industry expertise, we craft advanced solutions through consulting, implementation, and managed services, ensuring comprehensive protection for your business from start to finish.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Security Architecture Design:<\/mark><\/strong> We design and implement secure infrastructures that provide resilience against cyber threats while ensuring optimal performance.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Proactive Monitoring &amp; Maintenance:<\/mark><\/strong> We provide continuous monitoring and scheduled maintenance of your security infrastructure, identifying and mitigating potential threats before they cause damage.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/10\/pandemic-virus_17459768s.webp\" alt=\"\" class=\"wp-image-103\"\/><\/figure>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Vulnerability Management:<\/mark><\/strong> Continuously identify, assess, and remediate security vulnerabilities across your network and applications, reducing risk exposure.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/10\/privacy_17620273s.webp\" alt=\"\" class=\"wp-image-104\"\/><\/figure>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Endpoint Security:<\/mark> <\/strong>Deploy advanced protection solutions to secure devices from malware, ransomware, and other cyber threats, ensuring endpoint integrity and data protection.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">xDR (Extended Detection and Response):<\/mark> <\/strong>Integrate data from various security tools to provide holistic visibility, real-time detection, and coordinated response to threats across endpoints, networks, and cloud environments.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/10\/spyware_17620599s.webp\" alt=\"\" class=\"wp-image-105\"\/><\/figure>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Cloud Security (CASB, CSPM, M365):<\/mark><\/strong> Implement Cloud Access Security Broker (CASB), Cloud Security Posture Management (CSPM), and Microsoft 365 (M365) security solutions to protect cloud applications, data, and compliance.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Web Security:<\/mark><\/strong> Enhance security by filtering web traffic, controlling access to web resources, and protecting servers from external threats through reverse proxying.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/10\/cyber-security_17621745s.webp\" alt=\"\" class=\"wp-image-106\"\/><\/figure>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Log Management:<\/mark><\/strong> Collect, monitor, and analyze logs from various sources to detect anomalies, support compliance efforts, and enhance incident response with detailed audit trails.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Mobile Security:<\/mark><\/strong> Protect mobile devices with robust security solutions, ensuring secure access to corporate resources and safeguarding data from mobile-specific vulnerabilities.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/lock_16370160.png\" alt=\"\" class=\"wp-image-56\" style=\"width:108px;height:auto\" srcset=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/lock_16370160.png 512w, https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/lock_16370160-300x300.png 300w, https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/lock_16370160-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Why Choose Us?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Tailored Solutions:<\/mark><\/strong> Every business has unique security needs. We assess your current setup and design a customized security infrastructure that fits your operations.<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Proven Expertise:<\/mark><\/strong> Our team consists of certified cybersecurity professionals with extensive experience across various industries and sectors.<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Reliable Support:<\/mark><\/strong> Beyond the initial setup, we provide ongoing support and maintenance to ensure your security systems remain effective and up-to-date.<\/li>\n<\/ul>\n\n\n\n<p>Let us help you build a resilient and secure digital environment that supports your business goals while safeguarding critical assets.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Collaborative partners<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" data-id=\"60\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/trellixlogo.png\" alt=\"\" class=\"wp-image-60\" srcset=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/trellixlogo.png 600w, https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/trellixlogo-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" data-id=\"61\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/rapid7logo.png\" alt=\"\" class=\"wp-image-61\" srcset=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/rapid7logo.png 600w, https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/rapid7logo-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" data-id=\"59\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/mslogo.png\" alt=\"\" class=\"wp-image-59\" srcset=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/mslogo.png 600w, https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/mslogo-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" data-id=\"63\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/lookoutlogo.png\" alt=\"\" class=\"wp-image-63\" srcset=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/lookoutlogo.png 600w, https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/lookoutlogo-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" data-id=\"65\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/zscalerlogo.png\" alt=\"\" class=\"wp-image-65\" srcset=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/zscalerlogo.png 600w, https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/zscalerlogo-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" data-id=\"64\" src=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/splunklogo.png\" alt=\"\" class=\"wp-image-64\" srcset=\"https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/splunklogo.png 600w, https:\/\/fourprotect.com\/wp-content\/uploads\/2024\/09\/splunklogo-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Capabilities Expert security engineers, architects, and seasoned professionals, our capabilities span the spectrum of cybersecurity. Leveraging our extensive knowledge and industry expertise, we craft advanced solutions through consulting, implementation, and managed services, ensuring comprehensive protection for your business from start to finish. Security Architecture Design: We design and implement secure infrastructures that provide resilience against [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fourprotect.com\/index.php?rest_route=\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourprotect.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fourprotect.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fourprotect.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fourprotect.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2"}],"version-history":[{"count":15,"href":"https:\/\/fourprotect.com\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/fourprotect.com\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions\/110"}],"wp:attachment":[{"href":"https:\/\/fourprotect.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}