{"id":737,"date":"2025-10-13T07:47:55","date_gmt":"2025-10-13T07:47:55","guid":{"rendered":"https:\/\/demo.bravisthemes.com\/cyberguard\/?page_id=737"},"modified":"2025-10-13T07:47:55","modified_gmt":"2025-10-13T07:47:55","slug":"services-3","status":"publish","type":"page","link":"https:\/\/compsecurity.net\/COMPSEC\/services-3\/","title":{"rendered":"Services 3"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"737\" class=\"elementor elementor-737\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf280f2 e-flex e-con-boxed pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-parent \" data-id=\"bf280f2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\t\t\t<div class=\"e-con-inner\">\r\n\t\t<div class=\"elementor-element elementor-element-bd58481 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"bd58481\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-1fd0655 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"1fd0655\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-73592f7 elementor-widget elementor-widget-pxl_banner_box\" data-id=\"73592f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-73592f7-8641\" class=\"pxl-banner-box pxl-banner-box2 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner\">\r\n        <a class=\"pxl-inner-link\" href=\"http:\/\/compsecurity.net\/COMPSEC\/service\/network-security\/\"><\/a>\r\n                    <div class=\"pxl-item--img\">\r\n                <img fetchpriority=\"high\" decoding=\"async\" class=\"\" src=\"https:\/\/compsecurity.net\/COMPSEC\/wp-content\/uploads\/2025\/10\/service-img1.jpg\" width=\"1000\" height=\"1000\" alt=\"service-img1\" title=\"service-img1\" \/>            <\/div>\r\n                            <h3 class=\"pxl-item-title\">\r\n                Network Security            <\/h3>\r\n                            <div class=\"pxl-item-desc\">\r\n                Deploying firewalls and intrusion detection systems to safeguard networks.            <\/div>\r\n            <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-9408728 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"9408728\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-449f28b elementor-widget elementor-widget-pxl_banner_box\" data-id=\"449f28b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-449f28b-7574\" class=\"pxl-banner-box pxl-banner-box2 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner\">\r\n        <a class=\"pxl-inner-link\" href=\"http:\/\/compsecurity.net\/COMPSEC\/service\/data-encryption\/\"><\/a>\r\n                    <div class=\"pxl-item--img\">\r\n                <img decoding=\"async\" class=\"\" src=\"https:\/\/compsecurity.net\/COMPSEC\/wp-content\/uploads\/2025\/10\/img-contact1.jpg\" width=\"1000\" height=\"1000\" alt=\"img-contact1\" title=\"img-contact1\" \/>            <\/div>\r\n                            <h3 class=\"pxl-item-title\">\r\n                Data Encryption            <\/h3>\r\n                            <div class=\"pxl-item-desc\">\r\n                Encrypting sensitive data at rest and in transit using advanced encryption.            <\/div>\r\n            <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-210dc7a e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"210dc7a\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-a20cf18 elementor-widget elementor-widget-pxl_banner_box\" data-id=\"a20cf18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-a20cf18-3014\" class=\"pxl-banner-box pxl-banner-box2 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner\">\r\n        <a class=\"pxl-inner-link\" href=\"http:\/\/compsecurity.net\/COMPSEC\/service\/identity-access\/\"><\/a>\r\n                    <div class=\"pxl-item--img\">\r\n                <img decoding=\"async\" class=\"\" src=\"https:\/\/compsecurity.net\/COMPSEC\/wp-content\/uploads\/2025\/10\/service-img3.jpg\" width=\"1000\" height=\"1000\" alt=\"service-img3\" title=\"service-img3\" \/>            <\/div>\r\n                            <h3 class=\"pxl-item-title\">\r\n                Identity &amp; Access            <\/h3>\r\n                            <div class=\"pxl-item-desc\">\r\n                Managing user identities and access with MFA and detailed role-based control.            <\/div>\r\n            <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-6aab49f e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"6aab49f\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-cb4424b e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"cb4424b\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-ee70e9c elementor-widget elementor-widget-pxl_banner_box\" data-id=\"ee70e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-ee70e9c-2280\" class=\"pxl-banner-box pxl-banner-box2 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner\">\r\n        <a class=\"pxl-inner-link\" href=\"http:\/\/compsecurity.net\/COMPSEC\/service\/security-monitoring\/\"><\/a>\r\n                    <div class=\"pxl-item--img\">\r\n                <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/compsecurity.net\/COMPSEC\/wp-content\/uploads\/2025\/10\/service-img4.jpg\" width=\"1000\" height=\"1000\" alt=\"service-img4\" title=\"service-img4\" \/>            <\/div>\r\n                            <h3 class=\"pxl-item-title\">\r\n                Security Monitoring            <\/h3>\r\n                            <div class=\"pxl-item-desc\">\r\n                24\/7 monitoring with advanced SIEM systems for real-time detection.            <\/div>\r\n            <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-f490c4a e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"f490c4a\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-d150e8b elementor-widget elementor-widget-pxl_banner_box\" data-id=\"d150e8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-d150e8b-5940\" class=\"pxl-banner-box pxl-banner-box2 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner\">\r\n        <a class=\"pxl-inner-link\" href=\"http:\/\/compsecurity.net\/COMPSEC\/service\/backup-recovery\/\"><\/a>\r\n                    <div class=\"pxl-item--img\">\r\n                <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/compsecurity.net\/COMPSEC\/wp-content\/uploads\/2025\/10\/service-img5.jpg\" width=\"1000\" height=\"1000\" alt=\"service-img5\" title=\"service-img5\" \/>            <\/div>\r\n                            <h3 class=\"pxl-item-title\">\r\n                Backup &amp; Recovery            <\/h3>\r\n                            <div class=\"pxl-item-desc\">\r\n                Protecting critical data with secure backups and rapid recovery plans.            <\/div>\r\n            <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-df92e91 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"df92e91\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-0875acc elementor-widget elementor-widget-pxl_banner_box\" data-id=\"0875acc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-0875acc-8684\" class=\"pxl-banner-box pxl-banner-box2 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner\">\r\n        <a class=\"pxl-inner-link\" href=\"http:\/\/compsecurity.net\/COMPSEC\/service\/security-configuration\/\"><\/a>\r\n                    <div class=\"pxl-item--img\">\r\n                <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/compsecurity.net\/COMPSEC\/wp-content\/uploads\/2025\/10\/service-img6.jpg\" width=\"1000\" height=\"1000\" alt=\"service-img6\" title=\"service-img6\" \/>            <\/div>\r\n                            <h3 class=\"pxl-item-title\">\r\n                Security Configuration            <\/h3>\r\n                            <div class=\"pxl-item-desc\">\r\n                Hardening systems and applying secure configurations across all infrastructure.            <\/div>\r\n            <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-ae9ac51 e-con-full section-dark e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-parent \" data-id=\"ae9ac51\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\t\t<div class=\"elementor-element elementor-element-ccbe667 elementor-absolute elementor-hidden-mobile elementor-widget elementor-widget-pxl_image\" data-id=\"ccbe667\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"pxl_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_image-ccbe667-7774\" class=\"pxl-image-single  style-default wow zoomOut\" data-wow-delay=\"300ms\" >\r\n    <div class=\"pxl-item--inner \" data-wow-delay=\"120ms\">\r\n        \r\n                                <div class=\"pxl-item--image \" data-wow-delay=\"ms\" data-parallax-value=\"\">\r\n                                                    <img loading=\"lazy\" decoding=\"async\" class=\"no-lazyload \" src=\"https:\/\/compsecurity.net\/COMPSEC\/wp-content\/uploads\/2025\/10\/logo-big-white-576x576.png\" width=\"576\" height=\"576\" alt=\"logo-big-white\" title=\"logo-big-white\" \/>                                            <\/div>\r\n                                <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b86b89f e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"b86b89f\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-23b8c1e e-flex e-con-boxed pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"23b8c1e\" data-element_type=\"container\" data-e-type=\"container\">\t\t\t<div class=\"e-con-inner\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-665e4eb elementor-widget elementor-widget-pxl_text_editor\" data-id=\"665e4eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_text_editor-665e4eb-5094\" class=\"pxl-image-wg\" duration=\"1\">\n\t<div class=\"pxl-text-editor\">\n\t\t<div class=\"pxl-item--inner wow fadeInRight\" data-wow-delay=\"300ms\">\n\t\t\tNeed 24\/7 Protection From Cyber Attacks?\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1914a elementor-widget elementor-widget-pxl_button\" data-id=\"7c1914a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl-pxl_button-7c1914a-9928\" class=\"pxl-button pxl-atc-link wow fadeInLeft\" data-wow-delay=\"300ms\">\r\n    <a href=\"http:\/\/compsecurity.net\/COMPSEC\/appointment\/\" class=\"btn pxl-icon-active btn-default wow fadeInLeft pxl-icon--left\" data-wow-delay=\"300ms\" data-onepage-offset=\"\">\r\n        \r\n                \r\n        <span class=\"pxl--btn-text\" data-text=\"Start For Free\">\r\n            Start For Free        <\/span>\r\n        \r\n                    <span class=\"pxl--text-wrap\">\r\n                <span class=\"pxl--btn-text1\">Start For Free<\/span>\r\n                <span class=\"pxl--btn-text2\">Start For Free<\/span>\r\n            <\/span>\r\n         \r\n\r\n    <\/a>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Network Security Deploying firewalls and intrusion detection systems to safeguard networks. Data Encryption Encrypting sensitive data at rest and in transit using advanced encryption. Identity &amp; Access Managing user identities and access with MFA and detailed role-based control. Security Monitoring 24\/7 monitoring with advanced SIEM systems for real-time detection. Backup &amp; Recovery Protecting critical data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-737","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/compsecurity.net\/COMPSEC\/wp-json\/wp\/v2\/pages\/737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compsecurity.net\/COMPSEC\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/compsecurity.net\/COMPSEC\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/compsecurity.net\/COMPSEC\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/compsecurity.net\/COMPSEC\/wp-json\/wp\/v2\/comments?post=737"}],"version-history":[{"count":0,"href":"https:\/\/compsecurity.net\/COMPSEC\/wp-json\/wp\/v2\/pages\/737\/revisions"}],"wp:attachment":[{"href":"https:\/\/compsecurity.net\/COMPSEC\/wp-json\/wp\/v2\/media?parent=737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}