{"id":702,"date":"2023-02-28T08:41:05","date_gmt":"2023-02-28T08:41:05","guid":{"rendered":"https:\/\/sr-firm.org\/?page_id=702"},"modified":"2025-03-18T14:01:49","modified_gmt":"2025-03-18T14:01:49","slug":"cyber-security-2","status":"publish","type":"page","link":"https:\/\/sr-firm.org\/?page_id=702","title":{"rendered":"CYBER &#038; SECURITY"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"702\" class=\"elementor elementor-702\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2935b8e elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"53571\" data-id=\"2935b8e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cad8ef2\" data-eae-slider=\"15891\" data-id=\"cad8ef2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41a5768 elementor-widget elementor-widget-heading\" data-id=\"41a5768\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CYBER &amp; SECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-53b94b2 elementor-hidden-desktop elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"11512\" data-id=\"53b94b2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2211199\" data-eae-slider=\"30618\" data-id=\"2211199\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66dad22 elementor-widget elementor-widget-heading\" data-id=\"66dad22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CYBER &amp; SECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-22f37e4 elementor-hidden-desktop elementor-hidden-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"64076\" data-id=\"22f37e4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-725b171\" data-eae-slider=\"82843\" data-id=\"725b171\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1073148 elementor-widget elementor-widget-heading\" data-id=\"1073148\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CYBER &amp; SECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-be777fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"49691\" data-id=\"be777fe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd121ec\" data-eae-slider=\"82094\" data-id=\"fd121ec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bb4a91 elementor-widget elementor-widget-text-editor\" data-id=\"8bb4a91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our success stems from our emphasis on people. We bring together specialists from the Israeli intelligence community, leveraging their vast experience to safeguard our clients&#8217; assets. With a demonstrated history of achievement, you can be confident in our unwavering dedication to your triumph.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4fe99d elementor-widget elementor-widget-text-editor\" data-id=\"f4fe99d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our expertise spans a broad spectrum of cybersecurity services, including integration, regulatory and compliance, cloud, and MSSP &#8211; Managed Security Service Provider.<\/p><p>Our goal is to minimize and manage risk, guaranteeing optimal levels of preparedness for all of our clients. We have provided top-tier managed security services to hundreds of customers in various industry sectors worldwide.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-0cca034 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"7720\" data-id=\"0cca034\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2def05e\" data-eae-slider=\"53336\" data-id=\"2def05e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0382dbe elementor-widget elementor-widget-heading\" data-id=\"0382dbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OUR EXPERTISE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-ff9efc4 elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"14545\" data-id=\"ff9efc4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-18a8805\" data-eae-slider=\"43345\" data-id=\"18a8805\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a56fcf2 elementor-widget elementor-widget-eael-interactive-circle\" data-id=\"a56fcf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-interactive-circle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div id=\"eael-interactive-circle-a56fcf2\" class=\"eael-interactive-circle\" data-tabid=\"a56fcf2\">\n\t\t\t                <div class=\"eael-circle-wrapper eael-interactive-circle-preset-1 eael-interactive-circle-event-click eael-circle-responsive-view\" data-appearance=\"eael-interactive-circle-animation-0\" data-autoplay=\"0\" data-autoplay-interval=\"2000\">\n                    <div class=\"eael-circle-info\" data-items=\"5\">\n                        <div class=\"eael-circle-inner\">\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-853abd1\">\n                                    <div aria-controls=\"eael-interactive-1\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-1\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-people-arrows\"><\/i><span class=\"eael-circle-btn-txt\">IRT<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-1\" aria-labelledby=\"eael-circle-item-1\" class=\"eael-circle-btn-content eael-circle-item-1 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">INCIDENT RESPONCE TEAM (IRT)<\/span><\/p><p>With our 24\/7 support, we promptly and effectively respond to information security events. Our area of expertise includes malware analysis and forensics, utilizing cutting-edge tools, and collaborating with law firms and PR agencies when necessary.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-ec26ff9\">\n                                    <div aria-controls=\"eael-interactive-2\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-2\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-praying-hands\"><\/i><span class=\"eael-circle-btn-txt\">MSS<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-2\" aria-labelledby=\"eael-circle-item-2\" class=\"eael-circle-btn-content eael-circle-item-2 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">MANAGED SECURITY SERVICES<\/span><\/p><p>We deliver outsourced oversight and administration of security devices and systems both on-site and off-site, in addition to local and remote handling of security threats.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-7580ca3\">\n                                    <div aria-controls=\"eael-interactive-3\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-3\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-archway\"><\/i><span class=\"eael-circle-btn-txt\">REGULATORY<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-3\" aria-labelledby=\"eael-circle-item-3\" class=\"eael-circle-btn-content eael-circle-item-3 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">REGULATORY &amp; COMPLIANCE CONSULTING<\/span><\/p><p>We aid clients in acquiring certifications for various international standards and International Organization for Standardization (ISO).<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-acce1a6\">\n                                    <div aria-controls=\"eael-interactive-4\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-4\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-user-lock\"><\/i><span class=\"eael-circle-btn-txt\">SECURITY INTEGRATION<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-4\" aria-labelledby=\"eael-circle-item-4\" class=\"eael-circle-btn-content eael-circle-item-4 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">SECURITY INTEGRATION<\/span><\/p><p>Providing professional services for cyber security and analytics, we offer identity and access management, PKI (Public Key Infrastructure), intrusion detection &amp; prevention systems, Security Information and Event Management (SIEM), Security Operations Centers (SOC), anti-malware, vulnerability detection and data loss prevention, forensics discovery and threatscape analysis<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-104f148\">\n                                    <div aria-controls=\"eael-interactive-5\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-5\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-lock\"><\/i><span class=\"eael-circle-btn-txt\">ISC<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-5\" aria-labelledby=\"eael-circle-item-5\" class=\"eael-circle-btn-content eael-circle-item-5 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">INFORMATION SECURITY CONSULTING<\/span><\/p><p>Our consulting aims to improve organizational security and prepare for response and recovery from any threat, as quickly as possible. We cover SDLC, GRC, customized risk assessment, penetration testing and business workflow, and third party and key stakeholder evaluations.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\n        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-f87a3da elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"70292\" data-id=\"f87a3da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-593a0be\" data-eae-slider=\"69446\" data-id=\"593a0be\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e7fcac8 elementor-widget elementor-widget-eael-interactive-circle\" data-id=\"e7fcac8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-interactive-circle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div id=\"eael-interactive-circle-e7fcac8\" class=\"eael-interactive-circle\" data-tabid=\"e7fcac8\">\n\t\t\t                <div class=\"eael-circle-wrapper eael-interactive-circle-preset-1 eael-interactive-circle-event-click eael-circle-responsive-view\" data-appearance=\"eael-interactive-circle-animation-0\" data-autoplay=\"0\" data-autoplay-interval=\"2000\">\n                    <div class=\"eael-circle-info\" data-items=\"5\">\n                        <div class=\"eael-circle-inner\">\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-853abd1\">\n                                    <div aria-controls=\"eael-interactive-1\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-1\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-people-arrows\"><\/i><span class=\"eael-circle-btn-txt\">IRT<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-1\" aria-labelledby=\"eael-circle-item-1\" class=\"eael-circle-btn-content eael-circle-item-1 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">INCIDENT RESPONCE TEAM (IRT)<\/span><\/p><p>With our 24\/7 support, we promptly and effectively respond to information security events. Our area of expertise includes malware analysis and forensics, utilizing cutting-edge tools, and collaborating with law firms and PR agencies when necessary.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-ec26ff9\">\n                                    <div aria-controls=\"eael-interactive-2\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-2\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-praying-hands\"><\/i><span class=\"eael-circle-btn-txt\">MSS<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-2\" aria-labelledby=\"eael-circle-item-2\" class=\"eael-circle-btn-content eael-circle-item-2 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">MANAGED SECURITY SERVICES<\/span><\/p><p>We deliver outsourced oversight and administration of security devices and systems both on-site and off-site, in addition to local and remote handling of security threats.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-7580ca3\">\n                                    <div aria-controls=\"eael-interactive-3\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-3\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-archway\"><\/i><span class=\"eael-circle-btn-txt\">REGULATORY<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-3\" aria-labelledby=\"eael-circle-item-3\" class=\"eael-circle-btn-content eael-circle-item-3 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">REGULATORY &amp; COMPLIANCE CONSULTING<\/span><\/p><p>We aid clients in acquiring certifications for various international standards and International Organization for Standardization (ISO).<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-acce1a6\">\n                                    <div aria-controls=\"eael-interactive-4\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-4\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-user-lock\"><\/i><span class=\"eael-circle-btn-txt\">SECURITY INTEGRATION<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-4\" aria-labelledby=\"eael-circle-item-4\" class=\"eael-circle-btn-content eael-circle-item-4 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">SECURITY INTEGRATION<\/span><\/p><p>Providing professional services for cyber security and analytics, we offer identity and access management, PKI (Public Key Infrastructure), intrusion detection &amp; prevention systems, Security Information and Event Management (SIEM), Security Operations Centers (SOC), anti-malware, vulnerability detection and data loss prevention, forensics discovery and threatscape analysis<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-104f148\">\n                                    <div aria-controls=\"eael-interactive-5\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-5\">\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-lock\"><\/i><span class=\"eael-circle-btn-txt\">ISC<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n                                        \n                                    <\/div>\n                                    <div id=\"eael-interactive-5\" aria-labelledby=\"eael-circle-item-5\" class=\"eael-circle-btn-content eael-circle-item-5 \">\n                                        <div class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline\">INFORMATION SECURITY CONSULTING<\/span><\/p><p>Our consulting aims to improve organizational security and prepare for response and recovery from any threat, as quickly as possible. We cover SDLC, GRC, customized risk assessment, penetration testing and business workflow, and third party and key stakeholder evaluations.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\n\t\t\t\t\t\t\t\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\n        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-90bc786 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"87363\" data-id=\"90bc786\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cb920ec\" data-eae-slider=\"44792\" data-id=\"cb920ec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da1dab0 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"da1dab0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/sr-firm.org\/?page_id=168\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Services <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CYBER &#038; SECURITY CYBER &#038; SECURITY CYBER &#038; SECURITY Our success stems from our emphasis on people. We bring together specialists from the Israeli intelligence community, leveraging their vast experience to safeguard our clients&#8217; assets. With a demonstrated history of achievement, you can be confident in our unwavering dedication to your triumph. Our expertise spans [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-702","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/sr-firm.org\/index.php?rest_route=\/wp\/v2\/pages\/702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sr-firm.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sr-firm.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sr-firm.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sr-firm.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=702"}],"version-history":[{"count":34,"href":"https:\/\/sr-firm.org\/index.php?rest_route=\/wp\/v2\/pages\/702\/revisions"}],"predecessor-version":[{"id":2949,"href":"https:\/\/sr-firm.org\/index.php?rest_route=\/wp\/v2\/pages\/702\/revisions\/2949"}],"wp:attachment":[{"href":"https:\/\/sr-firm.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}