{"id":3179,"date":"2020-10-15T12:29:30","date_gmt":"2020-10-15T12:29:30","guid":{"rendered":"https:\/\/www.e-computech.com\/?page_id=3179"},"modified":"2020-10-15T12:29:30","modified_gmt":"2020-10-15T12:29:30","slug":"security","status":"publish","type":"page","link":"https:\/\/www.e-computech.com\/solutions\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<div id=\"pl-3179\"  class=\"panel-layout\" ><div id=\"pg-3179-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-3179-0\" data-stretch-type=\"full\" ><div id=\"pgc-3179-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3179-0-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"0\" ><div id=\"pl-w5f885355d78e2\"  class=\"panel-layout\" ><div id=\"pg-w5f885355d78e2-0\"  class=\"panel-grid panel-has-style\" ><div class=\"hero-container siteorigin-panels-stretch panel-row-style panel-row-style-for-w5f885355d78e2-0\" data-stretch-type=\"full\" ><div id=\"pgc-w5f885355d78e2-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w5f885355d78e2-0-0-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"textwidget\"><h1><span class=\"TextRun  BCX0 SCXO267113657\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun  BCX0 SCXO267113657\">Security<\/span><\/span><\/h1>\n<p><span class=\"TextRun SCXO173352173 BCX0\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun SCXO173352173 BCX0\">Security-driven networking for an hyperconnected world.<\/span><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-3179-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3179-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3179-1-0-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"1\" ><div class=\"textwidget\"><h2 style=\"text-align: center;\"><span class=\"TextRun SCXO99097046 BCX0\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXO99097046 BCX0\">\u00a0Focus on 3 areas to unlock value<\/span><\/span><span class=\"EOP SCXO99097046 BCX0\">\u00a0<\/span><\/h2>\n<\/div><\/div><\/div><\/div><div id=\"pg-3179-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3179-2-0\"  class=\"panel-grid-cell\" ><div class=\"card-shadow panel-cell-style panel-cell-style-for-3179-2-0\" ><div id=\"panel-3179-2-0-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"2\" ><div class=\"textwidget\"><p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/10\/Manage-the-cost-of-attacks-1.jpg\" alt=\"\" width=\"520\" height=\"210\" class=\"alignnone size-full wp-image-3222\" \/><\/p>\n<div class=\"three-area-content\">\n<div class=\"three-area-text\">\n<h3 style=\"text-align:center;\">Manage the cost of discovering attacks<\/h3>\n<p style=\"text-align:center;\">Use automation (including AI and machine learning) and advanced analytics to really keep your costs down.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-3179-2-1\"  class=\"panel-grid-cell\" ><div class=\"card-shadow panel-cell-style panel-cell-style-for-3179-2-1\" ><div id=\"panel-3179-2-1-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"3\" ><div class=\"textwidget\"><p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/10\/Educate-and-test-your-people2.jpg\" alt=\"\" width=\"520\" height=\"210\" class=\"alignnone size-full wp-image-3226\" \/><\/p>\n<div class=\"three-area-content\">\n<div class=\"three-area-text\">\n<h3 style=\"text-align:center;\">Educate and test your people<\/h3>\n<p style=\"text-align:center;\">Prioritize training for all employees, to detect and potentially prevent breaches.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-3179-2-2\"  class=\"panel-grid-cell\" ><div class=\"card-shadow panel-cell-style panel-cell-style-for-3179-2-2\" ><div id=\"panel-3179-2-2-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"4\" ><div class=\"textwidget\"><p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/10\/Manage-attacks.jpg\" alt=\"\" width=\"520\" height=\"210\" class=\"alignnone size-full wp-image-3220\" \/><\/p>\n<div class=\"three-area-content\">\n<div class=\"three-area-text\">\n<h3 style=\"text-align:center;\">Focus on information loss<\/h3>\n<p style=\"text-align:center;\">Focus investments on limiting information loss and preventing resulting business disruption.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-3179-3\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3179-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3179-3-0-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"5\" ><div class=\"textwidget\"><hr>\n<\/div><\/div><\/div><\/div><div id=\"pg-3179-4\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3179-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3179-4-0-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"6\" ><div class=\"textwidget\"><h2 style=\"text-align: center;\"><span class=\"TextRun SCXO221996398 BCX0\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXO221996398 BCX0\">Solutions<\/span><\/span><\/h2>\n<\/div><\/div><\/div><\/div><div id=\"pg-3179-5\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3179-5-0\"  class=\"panel-grid-cell\" ><div class=\"card-shadow panel-cell-style panel-cell-style-for-3179-5-0\" ><div id=\"panel-3179-5-0-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"7\" ><div class=\"textwidget\"><p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/10\/Fortinet-Security-Fabric.jpg\" alt=\"\" width=\"525\" height=\"254\" class=\"alignnone size-full wp-image-3214\" \/><\/p>\n<div class=\"solutions-area-content\">\n<div class=\"solutions-area-text\">\n<h3>Fortinet Security Fabric<\/h3>\n<p>Computech's security services helps you navigate and managed today's complicated environment.<\/p>\n<\/div>\n<div class=\"three-area-read-more\">\n<p class=\"sow-more-text\">Learn more<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-3179-5-1\"  class=\"panel-grid-cell\" ><div class=\"card-shadow panel-cell-style panel-cell-style-for-3179-5-1\" ><div id=\"panel-3179-5-1-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"8\" ><div class=\"textwidget\"><p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/10\/Security-and-Compliance.jpg\" alt=\"\" width=\"525\" height=\"254\" class=\"alignnone size-full wp-image-3216\" \/><\/p>\n<div class=\"solutions-area-content\">\n<div class=\"solutions-area-text\">\n<h3>Security and Compliance<\/h3>\n<p>Computech Security and Compliance solutions provide a holistic approach to securing your cloud platforms and network.<\/p>\n<\/div>\n<div class=\"three-area-read-more\">\n<p class=\"sow-more-text\">Learn more<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-3179-5-2\"  class=\"panel-grid-cell\" ><div class=\"card-shadow panel-cell-style panel-cell-style-for-3179-5-2\" ><div id=\"panel-3179-5-2-0\" class=\"so-panel widget widget_black-studio-tinymce widget_black_studio_tinymce panel-first-child panel-last-child\" data-index=\"9\" ><div class=\"textwidget\"><p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/10\/Secure-Remote-Work.jpg\" alt=\"\" width=\"525\" height=\"254\" class=\"alignnone size-full wp-image-3218\" \/><\/p>\n<div class=\"solutions-area-content\">\n<div class=\"solutions-area-text\">\n<h3>Secure Remote Work<\/h3>\n<p>Maintain business continuity through integrated secure teleworker solutions.<\/p>\n<\/div>\n<div class=\"three-area-read-more\">\n<p class=\"sow-more-text\">Learn more<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u00a0Focus on 3 areas to unlock value\u00a0<\/p>\n","protected":false},"author":1,"featured_media":2237,"parent":3822,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3179","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security - Computech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.e-computech.com\/solutions\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security - Computech\" \/>\n<meta property=\"og:description\" content=\"\u00a0Focus on 3 areas to unlock value\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.e-computech.com\/solutions\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Computech\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/06\/Modern-WorkPlace.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.e-computech.com\/solutions\/security\/\",\"url\":\"https:\/\/www.e-computech.com\/solutions\/security\/\",\"name\":\"Security - Computech\",\"isPartOf\":{\"@id\":\"https:\/\/www.e-computech.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.e-computech.com\/solutions\/security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.e-computech.com\/solutions\/security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/06\/Modern-WorkPlace.jpg\",\"datePublished\":\"2020-10-15T12:29:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.e-computech.com\/solutions\/security\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.e-computech.com\/solutions\/security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.e-computech.com\/solutions\/security\/#primaryimage\",\"url\":\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/06\/Modern-WorkPlace.jpg\",\"contentUrl\":\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/06\/Modern-WorkPlace.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.e-computech.com\/solutions\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.e-computech.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/www.e-computech.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.e-computech.com\/#website\",\"url\":\"https:\/\/www.e-computech.com\/\",\"name\":\"Computech\",\"description\":\"Welcome to Computech\",\"publisher\":{\"@id\":\"https:\/\/www.e-computech.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.e-computech.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.e-computech.com\/#organization\",\"name\":\"Computech\",\"url\":\"https:\/\/www.e-computech.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.e-computech.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2022\/05\/Computech_Logo01.png\",\"contentUrl\":\"https:\/\/www.e-computech.com\/wp-content\/uploads\/2022\/05\/Computech_Logo01.png\",\"width\":145,\"height\":29,\"caption\":\"Computech\"},\"image\":{\"@id\":\"https:\/\/www.e-computech.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security - Computech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.e-computech.com\/solutions\/security\/","og_locale":"en_US","og_type":"article","og_title":"Security - Computech","og_description":"\u00a0Focus on 3 areas to unlock value\u00a0","og_url":"https:\/\/www.e-computech.com\/solutions\/security\/","og_site_name":"Computech","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/06\/Modern-WorkPlace.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.e-computech.com\/solutions\/security\/","url":"https:\/\/www.e-computech.com\/solutions\/security\/","name":"Security - Computech","isPartOf":{"@id":"https:\/\/www.e-computech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.e-computech.com\/solutions\/security\/#primaryimage"},"image":{"@id":"https:\/\/www.e-computech.com\/solutions\/security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/06\/Modern-WorkPlace.jpg","datePublished":"2020-10-15T12:29:30+00:00","breadcrumb":{"@id":"https:\/\/www.e-computech.com\/solutions\/security\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.e-computech.com\/solutions\/security\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.e-computech.com\/solutions\/security\/#primaryimage","url":"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/06\/Modern-WorkPlace.jpg","contentUrl":"https:\/\/www.e-computech.com\/wp-content\/uploads\/2020\/06\/Modern-WorkPlace.jpg","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/www.e-computech.com\/solutions\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.e-computech.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.e-computech.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/www.e-computech.com\/#website","url":"https:\/\/www.e-computech.com\/","name":"Computech","description":"Welcome to Computech","publisher":{"@id":"https:\/\/www.e-computech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.e-computech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.e-computech.com\/#organization","name":"Computech","url":"https:\/\/www.e-computech.com\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.e-computech.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.e-computech.com\/wp-content\/uploads\/2022\/05\/Computech_Logo01.png","contentUrl":"https:\/\/www.e-computech.com\/wp-content\/uploads\/2022\/05\/Computech_Logo01.png","width":145,"height":29,"caption":"Computech"},"image":{"@id":"https:\/\/www.e-computech.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/pages\/3179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/comments?post=3179"}],"version-history":[{"count":0,"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/pages\/3179\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/pages\/3822"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/media\/2237"}],"wp:attachment":[{"href":"https:\/\/www.e-computech.com\/wp-json\/wp\/v2\/media?parent=3179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}