{
    "id": 2407,
    "date": "2020-03-06T07:58:00",
    "date_gmt": "2020-03-06T00:58:00",
    "guid": {
        "rendered": "http:\/\/wpdemo.archiwp.com\/engitech\/?page_id=2407"
    },
    "modified": "2022-08-01T10:56:13",
    "modified_gmt": "2022-08-01T03:56:13",
    "slug": "services",
    "status": "publish",
    "type": "page",
    "link": "https:\/\/cybersec.co.th\/en\/services\/",
    "title": {
        "rendered": "Services"
    },
    "content": {
        "rendered": "<div data-elementor-type=\"wp-page\" data-elementor-id=\"2407\" class=\"elementor elementor-2407\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ad1723e ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad1723e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a7bea69 ot-flex-column-vertical\" data-id=\"a7bea69\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0bcdf9 elementor-widget elementor-widget-spacer\" data-id=\"c0bcdf9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e2729a8 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e2729a8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:1397,&quot;url&quot;:&quot;https:\\\/\\\/cybersec.co.th\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/bg-maps.jpg&quot;},{&quot;id&quot;:1624,&quot;url&quot;:&quot;https:\\\/\\\/cybersec.co.th\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/bg-maps-dots-alt.jpg&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a94e994 ot-flex-column-vertical\" data-id=\"a94e994\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1208c9a elementor-widget elementor-widget-heading\" data-id=\"1208c9a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24e901d elementor-widget elementor-widget-text-editor\" data-id=\"24e901d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">At CyberSec, we understand that cybersecurity components play a critical role in system and software safety. That\u2019s why we provide\u00a0extensive and scalable options you can rely on\u00a0to protect sensitive information and preserve work data.<\/p><p style=\"font-weight: 400;\">To secure your online and application activities, you need business cybersecurity solutions from CyberSec.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ecba781 ot-flex-column-vertical\" data-id=\"ecba781\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-488cc4f elementor-widget elementor-widget-text-editor\" data-id=\"488cc4f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the rise of online services and technology across industries, cybersecurity has more relevance than ever before. Without the proper security measures, your business may be at risk for data loss and breaches that could compromise information privacy.\u00a0<\/p><p>Managed cybersecurity solutions, such as anti-virus programs, data backup strategies and education for your employees, can minimize risk and keep your business safe from threats.\u00a0<\/p><p>Implementing a variety of protective resources and plans will make all the difference in your expenses and productivity. You will have more control over your system processes and can keep everything running smoothly each day.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da94a88 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da94a88\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4cbc2eb ot-flex-column-vertical\" data-id=\"4cbc2eb\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3aa88a0 elementor-widget elementor-widget-iheading\" data-id=\"3aa88a0\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ How We Can Help You<\/span>\r\n\t        \t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f95603 elementor-widget elementor-widget-text-editor\" data-id=\"6f95603\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At CyberSec, we offer a wide range of small business cybersecurity solutions to help you protect essential network and computer processes. Our comprehensive resources and management tactics will cover your local and online system processes from every angle, so you can feel confident in your ability to prevent and respond to threats.<\/p><p>The cybersecurity services we provide include:<\/p><ul><li>\u00a0 \u00a0 \u00a0Backup and Recovery Solutions<\/li><li>\u00a0 \u00a0 \u00a0System Vulnerability Assessments<\/li><li>\u00a0 \u00a0 \u00a0Mobile Device Management<\/li><li>\u00a0 \u00a0 \u00a0Cyber Security Awareness Training<\/li><li>\u00a0 \u00a0 \u00a0Next-Generation Firewalls<\/li><li>\u00a0 \u00a0 \u00a0Multifactor Authentication and Identity Management<\/li><li>\u00a0 \u00a0 \u00a0Malware Protection<\/li><\/ul><p>Whether you need a plan to protect company data in case of a system failure or want to update your system to prevent unwanted access, we have the right solution for your business. We\u2019ll work to meet your individual needs with a solution that provides the highest level of protection, even as your company grows.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a14542f ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a14542f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-564f7db ot-flex-column-vertical\" data-id=\"564f7db\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03d2163 elementor-widget elementor-widget-text-editor\" data-id=\"03d2163\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyberSec is The Leading Independent Supplier of IT Hardware and Software In Eastern and Surrounding Areas.\nWithout a doubt, IT now plays a major role in almost every business up and down the land, but how often do you as a business owner actually know what is the correct product or service to take your company forward.  The wrong product purchased now, could easily cause more problems than it solves, and may not even be 100% compatible with your existing equipment resulting in further downtime or delays whilst those problems are resolved.\nCyberSec, we believe in providing impartial advice and recommendations based on a solid understanding of your real business needs, and to that end we focus on solutions that offer real long-term advantages and benefits, rather than simply offering the cheapest product available to do the job.  Where possible we strive to give the client a range of solutions, always advising you of the pro&#8217;s and con&#8217;s of each, so that the correct decision can be made to provide the highest level of return on investment (RoI).\nBeing totally independent, we are also unique in that we do not favour any one particular companies products or services over another&#8230;except of course where it matters, in the quality and suitability of the product for the job in hand.  To achieve this goal, we have established many Partnerships with various manufacturers over the years, and have also forged close links with several Tier-1 distributors such as Ingram Micro and SIS which has now resulted in us being able to offer virtually any branded product, from almost any manufacturer with delivery guaranteed to your site the very next day &#8211; ask your current ITprovider if they can offer such a broad level of product knowledge, coupled with impartial advice based on your own business&#8217;s needs, and backed up with outstanding stock availability and delivery options.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>",
        "protected": false
    },
    "excerpt": {
        "rendered": "<p>Cybersecurity Solutions At CyberSec, we understand that cybersecurity components play a critical role in system and software safety. That\u2019s why we provide\u00a0extensive and scalable options you can rely on\u00a0to protect sensitive information and preserve work data. To secure your online and application activities, you need business cybersecurity solutions from CyberSec. With the rise of online [&hellip;]<\/p>",
        "protected": false
    },
    "author": 2,
    "featured_media": 0,
    "parent": 0,
    "menu_order": 0,
    "comment_status": "closed",
    "ping_status": "closed",
    "template": "",
    "meta": {
        "footnotes": ""
    },
    "class_list": [
        "post-2407",
        "page",
        "type-page",
        "status-publish",
        "hentry"
    ],
    "_links": {
        "self": [
            {
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/pages\/2407",
                "targetHints": {
                    "allow": [
                        "GET"
                    ]
                }
            }
        ],
        "collection": [
            {
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/pages"
            }
        ],
        "about": [
            {
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/types\/page"
            }
        ],
        "author": [
            {
                "embeddable": true,
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/users\/2"
            }
        ],
        "replies": [
            {
                "embeddable": true,
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/comments?post=2407"
            }
        ],
        "version-history": [
            {
                "count": 71,
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/pages\/2407\/revisions"
            }
        ],
        "predecessor-version": [
            {
                "id": 4214,
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/pages\/2407\/revisions\/4214"
            }
        ],
        "wp:attachment": [
            {
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/media?parent=2407"
            }
        ],
        "curies": [
            {
                "name": "wp",
                "href": "https:\/\/api.w.org\/{rel}",
                "templated": true
            }
        ]
    }
}