{"id":6271,"date":"2023-08-13T23:39:19","date_gmt":"2023-08-13T23:39:19","guid":{"rendered":"https:\/\/mik.innovativesolution.co.ke\/?page_id=6271"},"modified":"2023-08-16T16:49:11","modified_gmt":"2023-08-16T16:49:11","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/frequency.co.ke\/?page_id=6271","title":{"rendered":"Cyber security"},"content":{"rendered":"<section class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1531818488553{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 95px !important;padding-bottom: 80px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1531818384661{margin-top: 0px !important;margin-bottom: 40px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;SERVER SECURITY&#8221; font_container=&#8221;tag:h6|font_size:16px|text_align:left|color:%23181616|line_height:26px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;top-to-bottom&#8221; el_class=&#8221;font-weight-medium&#8221; css=&#8221;.vc_custom_1692203997097{margin-top: 0px !important;margin-bottom: 10px !important;}&#8221;][vc_custom_heading text=&#8221;Cyber security&#8221; font_container=&#8221;tag:h1|font_size:35px|text_align:left|color:%23181616|line_height:46px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;top-to-bottom&#8221; el_class=&#8221;font-weight-bold&#8221; css=&#8221;.vc_custom_1692204447022{margin-top: 0px !important;margin-bottom: 25px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1692204457551{margin-top: 0px !important;margin-bottom: 35px !important;}&#8221;]In today&#8217;s interconnected world, where data is the backbone of your business, it is critical to protect your valuable assets from malicious attacks. Our experts are on hand to effectively defend your business from threats and provide you with the highest level of security.[\/vc_column_text][vc_column_text css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1692204463951{margin-top: 0px !important;margin-bottom: 35px !important;}&#8221;]With our state-of-the-art intrusion detection technology, we detect suspicious activity in real time and respond immediately to thwart potential attacks. Our intelligent firewall solution (hardware or software solutions) ensures the protection of your networks by blocking unwanted traffic and shielding your digital space. We understand that every customer has unique requirements, so we offer customized security solutions that are perfectly tailored to your business needs.[\/vc_column_text][vc_column_text css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1692204470175{margin-top: 0px !important;margin-bottom: 35px !important;}&#8221;]We offer hardware-based firewall solutions. We perform port analysis to best match their firewall to their needs. We check your firewall configuration for vulnerabilities and fix them.[\/vc_column_text]\r<!-- radiantthemes-custom-button -->\r<div class=\"radiantthemes-custom-button hover-style-five rt443553470  wpb_animate_when_almost_visible wpb_fadeIn fadeIn display-inline-block\"  data-button-direction=\"center\" data-button-fullwidth=\"false\"  data-button-icon-position=\"right\"><a style=\" color: #ffffff; line-height: 26px; font-size: 15px;\" class=\"radiantthemes-custom-button-main  vc_custom_1692204111051\" href=\"https:\/\/mik.innovativesolution.co.ke\/contact-us-version-1\/\"  title=\"Contact Us\" target=\"_self\"><div class=\"placeholder\">Contact Us<i class=\"\"><\/i><\/div><\/a><\/div>\r<!-- radiantthemes-custom-button -->\r[\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1531818391315{margin-top: 0px !important;margin-bottom: 40px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_single_image image=&#8221;6409&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1692204521255{margin-top: 0px !important;margin-bottom: 0px !important;}&#8221;][\/vc_column][\/vc_row]\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1531818488553{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 95px !important;padding-bottom: 80px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1531818384661{margin-top: 0px !important;margin-bottom: 40px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;SERVER SECURITY&#8221; font_container=&#8221;tag:h6|font_size:16px|text_align:left|color:%23181616|line_height:26px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;top-to-bottom&#8221; el_class=&#8221;font-weight-medium&#8221; css=&#8221;.vc_custom_1692203997097{margin-top: 0px !important;margin-bottom: 10px !important;}&#8221;][vc_custom_heading text=&#8221;Cyber security&#8221; font_container=&#8221;tag:h1|font_size:35px|text_align:left|color:%23181616|line_height:46px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;top-to-bottom&#8221; el_class=&#8221;font-weight-bold&#8221; css=&#8221;.vc_custom_1692204447022{margin-top: 0px !important;margin-bottom: 25px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1692204457551{margin-top: 0px !important;margin-bottom: 35px !important;}&#8221;]In today&#8217;s interconnected [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6271","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/6271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/frequency.co.ke\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6271"}],"version-history":[{"count":3,"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/6271\/revisions"}],"predecessor-version":[{"id":6410,"href":"https:\/\/frequency.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/6271\/revisions\/6410"}],"wp:attachment":[{"href":"https:\/\/frequency.co.ke\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}