{"id":2542,"date":"2023-07-11T09:39:41","date_gmt":"2023-07-11T09:39:41","guid":{"rendered":"http:\/\/goagiletechnologies.com\/?page_id=2542"},"modified":"2024-09-18T21:55:31","modified_gmt":"2024-09-18T21:55:31","slug":"cyber-security-governance","status":"publish","type":"page","link":"https:\/\/goagiletechnologies.com\/ar\/cyber-security-governance\/","title":{"rendered":"\u062d\u0648\u0643\u0645\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"tm-row wpb_row vc_row-fluid vc_custom_1726696509877 vc_row-has-fill tm-zindex-0 tm-bgimage-position-center_center tm-bg tm-bgimage-yes\">\n\n\t\t\t<div class=\"tm-row-wrapper-bg-layer tm-bg-layer\"><\/div><!-- ThemetechMount custom DIV added -->\n\t\t\n\t <div class=\"vc_row container\"> \t\n\t\t\n\n<div class=\"wpb_column tm-column vc_column_container vc_col-sm-6 tm-zindex-0\">\n\t<div class=\"vc_column-inner\">\n\t\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h1 style=\"text-align:left;font-size:60px;line-height:1.1;\" class=\"tm-custom-heading\" >\u062d\u0648\u0643\u0645\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a<\/h1>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\n\n<div class=\"wpb_column tm-column vc_column_container vc_col-sm-6 tm-zindex-0\">\n\t<div class=\"vc_column-inner\">\n\t\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\t\t\n\t <\/div> <\/div>\n\n\n<div class=\"vc_row-full-width vc_clearfix\"><\/div>\n\n\n\n\n\n\n\n\n<div class=\"tm-row wpb_row vc_row-fluid tm-zindex-0 vc_row container tm-bgimage-position-center_center\">\n\n\t\t\n\t\t\n\t\t\n\n<div class=\"wpb_column tm-column vc_column_container vc_col-sm-12 tm-zindex-0\">\n\t<div class=\"vc_column-inner\">\n\t\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h2 style=\"color: #1e73be;text-align: left\" class=\"vc_custom_heading\" >IT INFRASTRUCTURE MANAGEMENT COMPANY<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We can help to protect and secure your data and files by setting up user access controls and recommending an appropriate firewall solution to protect internally stored information. The size of the company often determines the level of security needed, and this will be taken into account when TeleNoc professional team evaluates your network architecture and security needs. Some of the services are mentioned.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\t\t\n\t<\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"Cyber Security Governance IT INFRASTRUCTURE MANAGEMENT COMPANY We can help to protect and secure your data and files by setting up user access controls and recommending an appropriate firewall solution to protect internally stored information. The size of the company often determines the level of security needed, and this will be taken into account when &hellip; <a href=\"https:\/\/goagiletechnologies.com\/ar\/cyber-security-governance\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">\u062d\u0648\u0643\u0645\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a<\/span><\/a>","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-2542","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/2542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/comments?post=2542"}],"version-history":[{"count":3,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/2542\/revisions"}],"predecessor-version":[{"id":4185,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/2542\/revisions\/4185"}],"wp:attachment":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/media?parent=2542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}