{"id":7071,"date":"2022-09-02T15:09:29","date_gmt":"2022-09-02T12:09:29","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7071"},"modified":"2023-09-03T13:01:47","modified_gmt":"2023-09-03T10:01:47","slug":"services","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/services","title":{"rendered":"Cybersecurity services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7071\" class=\"elementor elementor-7071 elementor-8130\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca00d56 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca00d56\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ffdf0ac ot-flex-column-vertical\" data-id=\"ffdf0ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-75221f9 elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"75221f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c1b831a ot-flex-column-vertical\" data-id=\"c1b831a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b26fd1 elementor-widget elementor-widget-iheading\" data-id=\"1b26fd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Cybersecurity services<\/span>\r\n\t        <h3 class=\"main-heading\">Managed cybersecurity services<\/h3>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-615e33b ot-column-items-center ot-flex-column-vertical\" data-id=\"615e33b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83ec4ab elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-ibutton\" data-id=\"83ec4ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/cyberone.bg\/en\/quote\" class=\"octf-btn octf-btn-primary\">Get a Quote<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-64da2ad elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"64da2ad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-73d21de ot-flex-column-vertical\" data-id=\"73d21de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ae4cd7 elementor-widget elementor-widget-iiconbox1\" data-id=\"2ae4cd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-data\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/penetration-tests\">Penetration tests<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Penetration tests simulate real scenarios of malicious attacks against web applications and systems, as well as internal and public network infrastructure.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-752de03 elementor-widget elementor-widget-iiconbox1\" data-id=\"752de03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-best\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/waf-software\">Web Application Firewall<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>WAF protects your web applications by filtering, monitoring and blocking malicious HTTP\/S traffic. It does this by adhering to a set of rules that help determine what traffic is malicious and what traffic is safe.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d54703 elementor-widget elementor-widget-iiconbox1\" data-id=\"1d54703\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-process\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/dns-filtering-gateway\">DNS Filtering Gateway<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>The service allows comprehensive filtering of DNS traffic according to predefined rules and configuration. Ability to monitor and trace DNS history, as well as create multiple policies and groups.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-58b6f2a ot-flex-column-vertical\" data-id=\"58b6f2a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ba093c elementor-widget elementor-widget-iiconbox1\" data-id=\"2ba093c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-tablet\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/endpoint-protection\">Endpoint protection<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>A cloud-based system that provides complete security with comprehensive visibility of computers and servers, as well as flawless protection against multiple threats.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e24bd09 elementor-widget elementor-widget-iiconbox1\" data-id=\"e24bd09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-report\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/siem-software\">SIEM Software<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>A SIEM is a security solution that enables real-time monitoring of various cybersecurity logs sent by multiple different IT systems, computers, and servers that can be correlated and processed in real-time.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-80b173f elementor-hidden-tablet ot-flex-column-vertical\" data-id=\"80b173f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-357b31a elementor-widget elementor-widget-iiconbox1\" data-id=\"357b31a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/vulnerability-assessment\">Vulnerability Assessment<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>The service provides automated testing for all available public vulnerabilities, both in web applications and systems, IT services and network devices.\n\n<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c55c8f elementor-widget elementor-widget-iiconbox1\" data-id=\"9c55c8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-data-1\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/email-security-gateway\">Security Email Gateway<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Cloud-based service that allows complete filtering of incoming and outgoing traffic from your email server. Guaranteed blocking of all spam, malicious and dangerous emails. It can also act as a DLP solution.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a5c6849 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5c6849\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be0593f ot-flex-column-vertical\" data-id=\"be0593f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9c482ac elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"9c482ac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2add393 ot-flex-column-vertical\" data-id=\"2add393\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-252a392 elementor-widget elementor-widget-iheading\" data-id=\"252a392\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Consulting services for your business<\/span>\r\n\t        <h3 class=\"main-heading\">Trusted expertise from our experts<\/h3>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-54b5e6b ot-column-items-center ot-flex-column-vertical\" data-id=\"54b5e6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfef199 elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-ibutton\" data-id=\"bfef199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/cyberone.bg\/quote\/consulting\" class=\"octf-btn octf-btn-primary\">Get a Quote<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4173f53 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"4173f53\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d3729e0 ot-flex-column-vertical\" data-id=\"d3729e0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d626848 elementor-widget elementor-widget-iiconbox1\" data-id=\"d626848\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-chalkboard-teacher\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/security-awareness-trainings\">Security Awareness Training<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>The purpose of such cyber security training is mainly to improve the digital culture of your employees as well as to make them understand what are the dangers in the digital world that they need to defend against.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-469f2e8 elementor-widget elementor-widget-iiconbox1\" data-id=\"469f2e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"far fa-file-archive\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/information-security-policies\">Information Security Policies<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Security should be a concern for every employee in an organization, not just IT professionals and top managers. One effective way to educate employees about the importance of security is through cybersecurity policies that explain each employee's responsibilities for protecting IT systems and data.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-05ee072 ot-flex-column-vertical\" data-id=\"05ee072\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c5c1e3 elementor-widget elementor-widget-iiconbox1\" data-id=\"5c5c1e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-network-wired\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/data-breach-investigation\">Data Breach Investigation<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>The service offers a comprehensive approach to security incident investigation. If so, our team can help your business by identifying the source of unauthorized access and providing the best approach to risk management.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b14210 elementor-widget elementor-widget-iiconbox1\" data-id=\"1b14210\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"far fa-money-bill-alt\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/ransomware-breach\">Ransomware incidents<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>The service offers complete help and support in case of a ransomware attack against your organization. Our specialists will try to recover as much information as possible, and additionally can be a communication point with the threat actors. All forensic and remediation activities are included.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4707596 elementor-hidden-tablet ot-flex-column-vertical\" data-id=\"4707596\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-021f15d elementor-widget elementor-widget-iiconbox1\" data-id=\"021f15d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"far fa-comments\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/en\/services\/ciso-as-a-service\">CISO as a Service<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>A CISOaaS service involves outsourcing security management responsibilities to an external provider. By hiring a vCISO to remotely manage its security, a company automatically gains access to staff and resources that it normally does not and cannot have.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73be24f ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73be24f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-127b13e ot-flex-column-vertical\" data-id=\"127b13e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca0ae35 elementor-widget elementor-widget-heading\" data-id=\"ca0ae35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\/\/ Need some additional services?<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed367a6 elementor-widget elementor-widget-heading\" data-id=\"ed367a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTACT US<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f08a21a elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"f08a21a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/cyberone.bg\/contacts\" class=\"octf-btn octf-btn-primary\">Contacts<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ Cybersecurity services Managed cybersecurity services Get a Quote Penetration tests Penetration tests simulate real scenarios of malicious attacks against web applications and systems, as well as internal and public network infrastructure. Web Application Firewall WAF protects your web applications by filtering, monitoring and blocking malicious HTTP\/S traffic. It does this by adhering to a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7071","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7071"}],"version-history":[{"count":15,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7071\/revisions"}],"predecessor-version":[{"id":8401,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7071\/revisions\/8401"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}