{"id":12053,"date":"2019-10-02T14:49:40","date_gmt":"2019-10-02T11:49:40","guid":{"rendered":"https:\/\/datanets.ro\/technologies-and-solutions\/security-infrastructure-as-a-datanet-service\/"},"modified":"2020-05-08T18:50:44","modified_gmt":"2020-05-08T15:50:44","slug":"security-infrastructure-as-a-service-from-datanet","status":"publish","type":"page","link":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/","title":{"rendered":"Security infrastructure as a service from Datanet"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12053\" class=\"elementor elementor-12053 elementor-11682\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26dc9ea elementor-section-height-min-height elementor-section-items-bottom elementor-section-content-bottom elementor-section-boxed elementor-section-height-default\" data-id=\"26dc9ea\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44cfa08\" data-id=\"44cfa08\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf12855 elementor-widget elementor-widget-heading\" data-id=\"cf12855\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-large\">IT SECURITY INFRASTRUCTURE AS A SERVICE FROM DATANET<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-baca134 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"baca134\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0cf80a6\" data-id=\"0cf80a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-401cebe elementor-widget elementor-widget-spacer\" data-id=\"401cebe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f780ea elementor-widget elementor-widget-text-editor\" data-id=\"1f780ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>IT SECURITY INFRASTRUCTURE AS A SERVICE &#8211; \u201eSecurity IaaS\u201d<\/strong><\/h4><p>As cyber attacks have become more sophisticated, so have the security means developed to respond to their complexity. Cyber attackers now have a wide range of threats that force and sometimes outweigh traditional security methods. This evolution is now causing more and more companies to change the way they allocate budgets, gradually giving up the purchase of specific and independent security products in favor of access to specialized teams of highly qualified engineers in analyzing and fixing IT security breaches and adopting a coherent integrated and automated product architecture for detecting, limiting and then mitigating cyber attacks.<\/p><p><span style=\"font-size: 11.5pt;\">With the help of the IT infrastructure solutions provided as a service by Datanet (Infrastructure as a Service &#8211; &#8220;IaaS&#8221;), these two objectives are achieved. <\/span><\/p><p><span style=\"font-size: 15px;\">Thus, you acquire :<\/span><\/p><p><span style=\"font-size: 15px;\">&#8211; a set of the <strong>latest technological products <\/strong>used exclusively by your company, integrated within a security architecture that protects your entire IT system, as well as<\/span><\/p><p style=\"font-size: 15px; font-style: normal; font-weight: 400;\"><span style=\"font-size: 15px;\">&#8211; <strong>access to a team of cyber security experts<\/strong> to configure, monitor and update these products.<\/span><\/p><p><span style=\"font-size: 11.5pt;\">With the help of these services, your company optimally uses a modern, integrated and updated architecture of computer security, maintained by a team of experts. This objective is reached at a much lower cost than in the case of providing the IT security with the internal resources of in-house IT specialists, set up and trained within the available budget and frequently overloaded with works.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-06b2728\" data-id=\"06b2728\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-befab9c elementor-widget elementor-widget-spacer\" data-id=\"befab9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0043406 elementor-widget elementor-widget-menu-anchor\" data-id=\"0043406\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"contactus\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-545a69d elementor-widget elementor-widget-heading\" data-id=\"545a69d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">MORE DETAILS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2517719 elementor-widget elementor-widget-void-section-cf7\" data-id=\"2517719\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"void-section-cf7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"void-cf7-form-widget-wrapper elementor-shortcode void-cf7-0\" data-void-cf7-contact-form-id=\"1804\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1804-o1\" lang=\"ro-RO\" dir=\"ltr\" data-wpcf7-id=\"1804\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/12053#wpcf7-f1804-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formular de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1804\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"ro_RO\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1804-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required caseta\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"telefon\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel caseta\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone Number\" value=\"\" type=\"tel\" name=\"telefon\" \/><\/span> <\/label>\n<\/p>\n<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email caseta\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea caseta\" aria-invalid=\"false\" placeholder=\"Describe your request\" name=\"your-message\"><\/textarea><\/span> <\/label><br \/>\n<span id=\"keepitsimple\" class=\"wpcf7-form-control-wrap website-wrap\" style=\"display:none !important; visibility:hidden !important;\"><input id=\"wpcf7-69d63297bd97a-field\"  class=\"wpcf7-form-control wpcf7-text\" type=\"text\" name=\"website\" value=\"\" size=\"40\" tabindex=\"-1\" autocomplete=\"new-password\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"acordtermenisiconditii\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acordtermenisiconditii\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I have read and agree with the <a href=\"https:\/\/datanets.ro\/en\/terms-and-conditions\/\">Terms and Conditions<\/a> and the <a href=\"https:\/\/datanets.ro\/politica-de-prelucrare-datelor-cu-caracter-personal\/\">Privacy policy<\/a><\/label><\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div> \t\t\t<script>\r\n \t\t\t        var theform = document.querySelector('.void-cf7-0');\r\n\t\t\t\t\t\ttheform.addEventListener( 'wpcf7mailsent', function( event ) {\r\n\t\t\t\t\t    location = 'https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/';\r\n\t\t\t\t\t}, false );\r\n\t\t\t<\/script>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8dd3db8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8dd3db8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d3bd2c2\" data-id=\"d3bd2c2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-494701c elementor-widget elementor-widget-spacer\" data-id=\"494701c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30c1e08 elementor-widget elementor-widget-text-editor\" data-id=\"30c1e08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><span style=\"color: #58585a;\"><strong>THE BENEFITS OF DATANET\u2019S INFORMATION SECURITY INFRASTRUCTURE<\/strong><\/span><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eafb1ac elementor-widget elementor-widget-spacer\" data-id=\"eafb1ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a47098 elementor-tabs-view-vertical elementor-widget elementor-widget-tabs\" data-id=\"5a47098\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-9461\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-9461\" aria-expanded=\"false\">Improving Risk Management<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-9462\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9462\" aria-expanded=\"false\">Better cost control<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-9463\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9463\" aria-expanded=\"false\">High availability, increased efficiency and productivity <\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-9464\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9464\" aria-expanded=\"false\">Predictable IT services and business continuity<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-9461\" aria-expanded=\"false\">Improving Risk Management<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-9461\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-9461\" tabindex=\"0\" hidden=\"false\"><p style=\"margin: 0cm; margin-bottom: .0001pt;\">IT Security Infrastructure Solutions as a Service provided by Datanet:<\/p><p>&#8211; consist\u00a0of <strong>Cisco Systems and F5 products<\/strong>, a market leaders in IT security, and apply the latest commercially available technology<span style=\"font-size: 15px; font-style: normal; font-weight: 400;\">,<\/span><\/p><p>&#8211; are designed, configured, integrated and regularly updated by a team of IT security experts,<\/p><p style=\"margin: 0cm; margin-bottom: .0001pt;\">These allow your company to adopt <strong>best practices for IT security<\/strong> and, as a result, <strong>minimize the risk of loss due to cyber attacks<\/strong>. At the same time, our IaaS solutions help you maintain compliance with legal IT security requirements for the processing of personal data.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9462\" aria-expanded=\"false\">Better cost control<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-9462\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-9462\" tabindex=\"0\" hidden=\"hidden\"><p>The usual cost components of an IT department, such as personnel, training, equipment and maintenance costs are taken over by Datanet and replaced with a <strong>fixed monthly fee for the company.<\/strong><\/p><p>Thus the budgeting process is simplified and <strong>the company does not have to bear the full price of hiring, paying, organizing and permanently training a team of IT security experts<\/strong>.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9463\" aria-expanded=\"false\">High availability, increased efficiency and productivity <\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-9463\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-9463\" tabindex=\"0\" hidden=\"hidden\"><p>A system created to maintain a high level of IT security involves multiple technologies and requires them to be fully operational and integrated to achieve the expected level of protection.<\/p><p>Datanet\u2019s team <strong>intervenes quickly in case of a product failure within the computer security system<\/strong>, thus minimizing any degradation or interruption of the IaaS service.<\/p><p>By using Infrastucture as a Service provided by Datanet, you have <strong>access to a team of experts<\/strong> to configure, monitor and update IT security products, <strong>at a fraction of the total cost of this team<\/strong>. In addition, the <strong>design, implementation, operation and maintenance services are optimized, <\/strong>with the efficiency obtained by maintaining an installed base of security products much greater than the IT security system of a single client.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-9464\" aria-expanded=\"false\">Predictable IT services and business continuity<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-9464\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-9464\" tabindex=\"0\" hidden=\"hidden\"><p>IT departments will always encounter financing, technical, security and operational challenges. On the other hand, the demands of highly qualified personnel are constantly increasing.<\/p><p><strong><span style=\"font-size: 15px;\">Datanet provides you with continuous access to a team of motivated IT experts, regularly trained for new products, versions and technologies.\u00a0<\/span><\/strong><\/p><p><span style=\"font-size: 15px;\">You thus have a <strong>higher predictability of IT services<\/strong> and you benefit from reduced operational risk.<\/span><\/p><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d58f80 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d58f80\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b4d4a7\" data-id=\"4b4d4a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5bd80af elementor-widget elementor-widget-spacer\" data-id=\"5bd80af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0260642 elementor-widget elementor-widget-heading\" data-id=\"0260642\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h1><span style=\"color: #58585a\"><strong>OUR OFFER<\/strong><\/span><\/h1><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f149495 elementor-widget elementor-widget-spacer\" data-id=\"f149495\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47aa2d6 elementor-widget elementor-widget-text-editor\" data-id=\"47aa2d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Datanet&#8217;s Infrastructure as a Service (&#8220;IaaS&#8221;) solutions include <strong>initial design, installation, commissioning as well as technical support, on-demand reconfigurations, updates and ongoing monitoring<\/strong>. Thus, you benefit from comprehensive high quality services regarding the use of a modern and efficient IT security solution. You can choose the level of IT security that suits your business needs, opting for one of the options below.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad6d9e3 elementor-widget elementor-widget-spacer\" data-id=\"ad6d9e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bba168a elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"bba168a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3767284\" data-id=\"3767284\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3263fb7 elementor-widget elementor-widget-text-editor\" data-id=\"3263fb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table width=\"287\"><tbody><tr><td style=\"text-align: center;\" width=\"287\"><h1><span style=\"color: #0f0f0f;\"><strong>BASIC SECURITY <\/strong>PACKAGE<\/span><\/h1><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\">Cisco\u00a0<a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firewalls\/index.html\">Next Generation Firewall<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ngips\/index.html\">Intrusion Prevention System &#8211;<br \/>Cisco IPS<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/index.html\">Advanced Malware Protection &#8211;<br \/>Cisco AMP<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/anyconnect-secure-mobility-client\/index.html\">Secure Mobility Client &#8211;<br \/>Cisco\u00a0 AnyConnnect Plus<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/learn-umbrella.cisco.com\/datasheets\/umbrella-professional\">DNS Security &#8211;<br \/>Cisco Umbrella Professional<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-security\/index.html#\">* Cisco Email security<\/a><\/span><\/td><\/tr><\/tbody><\/table><p><span style=\"color: #ffffff;\">* This product is optional and not included in the price offer<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5720024 elementor-widget elementor-widget-spacer\" data-id=\"5720024\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b4b0874\" data-id=\"b4b0874\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b385d0a elementor-widget elementor-widget-text-editor\" data-id=\"b385d0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table width=\"287\"><tbody><tr><td style=\"text-align: center;\" width=\"287\"><h1><span style=\"color: #0f0f0f;\"><strong>ADVANCED SECURITY <\/strong>PACKAGE<\/span><\/h1><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firewalls\/index.html\">Cisco\u00a0Next Generation Firewall<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ngips\/index.html\">Intrusion Prevention System \u2013 Cisco IPS<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/index.html\">Advanced Malware Protection Plus &#8211; Cisco AMP\u00a0 and Cisco AMP for endpoints<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/anyconnect-secure-mobility-client\/index.html\">Secure Mobility Client Plus &#8211;<\/a><\/span><br \/><span style=\"color: #ffffff;\">Cisco AnyConnect Apex<\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/learn-umbrella.cisco.com\/datasheets\/umbrella-insights\">DNS Security Plus &#8211;<br \/>Cisco Umbrella Insights<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\">Mobile Device Management \u2013 <a style=\"color: #ffffff;\" href=\"https:\/\/meraki.cisco.com\/products\/systems-manager\">Meraki Systems Manager Enterprise<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-security\/index.html#\">* Cisco Email security<\/a><\/span><\/td><\/tr><tr><td style=\"text-align: center;\"><span style=\"color: #ffffff;\">*Adaptive Multi-Factor Authentication \u2013 <a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-multi-factor-authentication.html\">Cisco Duo<\/a><\/span><\/td><\/tr><\/tbody><\/table><p><span style=\"color: #ffffff;\">* This product is optional and not included in the price offer.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28ca7a5 elementor-widget elementor-widget-spacer\" data-id=\"28ca7a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f70976d\" data-id=\"f70976d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bcece4c elementor-widget elementor-widget-text-editor\" data-id=\"bcece4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table width=\"287\">\n<tbody>\n<tr>\n<td width=\"287\">\n<h1 style=\"text-align: center;\"><span style=\"color: #0f0f0f;\"><strong>PREMIUM SECURITY <\/strong>PACKAGE<\/span><\/h1>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\"><span style=\"color: #333333;\"><strong>Includes all products related to the Advanced Security Package<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/identity-services-engine\/index.html\">Simplified identity management &#8211;\nCisco Identity Services Engine (ISE)<\/a><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\"><span style=\"color: #ffffff;\">Advanced Web Applications Firewall &#8211; <a style=\"color: #ffffff;\" href=\"https:\/\/www.f5.com\/products\/security\/advanced-waf\">F5 WAF<\/a><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\"><span style=\"color: #ffffff;\">Incident analysis and reporting service<\/span>\n<span style=\"color: #ffffff;\">with Security Operations Center (SOC) <\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ba44d8 elementor-widget elementor-widget-spacer\" data-id=\"8ba44d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6d90b6b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d90b6b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0e29edd\" data-id=\"0e29edd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7da6583 elementor-widget elementor-widget-text-editor\" data-id=\"7da6583\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">Datanet\u2019s <strong>\u201cBasic Security\u201d<\/strong> package is dedicated to all companies that want to deploy a standard cybersecurity architecture, thus ensuring an essential protection of IT applications and data traffic. This service includes managing and combating known and \u201czero day attacks\u201d computer threats, providing you with ongoing protection for your IT systems that allows you to focus on the main goals of your business.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce2cdd7 elementor-widget elementor-widget-spacer\" data-id=\"ce2cdd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ebf648b\" data-id=\"ebf648b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-07a38c4 elementor-widget elementor-widget-text-editor\" data-id=\"07a38c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">Datanet\u2019s <b>\u201cAdvanced Security<\/b>\u201d package is recommended to all companies that need a complex IT security architecture, containing the latest data protection technologies and applications critical to the smooth running of the business. Benefiting from a team of certified specialists at the highest level, we provide continuous specialized technical support to maintain the integrity of your company\u2019s security environment.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c1a2bc elementor-widget elementor-widget-spacer\" data-id=\"0c1a2bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ce96638\" data-id=\"ce96638\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec87b25 elementor-widget elementor-widget-text-editor\" data-id=\"ec87b25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">Datanet <b>&#8220;Premium Security\u201d<\/b> package provides a comprehensive security architecture and the professional services for its administration, ensuring end-to-end security for complex networks and business-critical IT systems. You also benefit of extended visibility on potential threats and malicious behaviors with our SOC service, helping you to better prevent cyber-attacks and to fight against security breaches.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65c67c2 elementor-widget elementor-widget-spacer\" data-id=\"65c67c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f501822 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f501822\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b92c8ad\" data-id=\"b92c8ad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42c59e1 elementor-widget elementor-widget-spacer\" data-id=\"42c59e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27f615b elementor-widget elementor-widget-heading\" data-id=\"27f615b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h1><span style=\"color: #58585a\"><strong>DESCRIPTION OF THE SECURITY OPERATIONS CENTER (SOC) SERVICES PROVIDED BY SOITRON<\/strong><\/span><\/h1><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3809fab elementor-widget elementor-widget-spacer\" data-id=\"3809fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31595c5 elementor-widget elementor-widget-text-editor\" data-id=\"31595c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Soitron <strong>SOC<\/strong> provides <strong>infrastructure monitoring<\/strong>, <strong>security monitoring<\/strong> and <strong>threat intelligence<\/strong>.<\/p><p>We monitor and analyse events 24h\/24h or 8 hours\/day for 5 days\/week, according to the customer contract. If the customer requests a switch from 8&#215;5 to 24&#215;7 coverage, we are able to handle it.<\/p><p>For security monitoring we collect logs from security appliances, such as firewalls, IDS\/IPS systems, web security appliances, email security appliances, web application firewalls, access logs from servers, through syslog, netflow (ipfix) and eStreamer protocols. We receive security and infrastructure events as well as threat intelligence info and analyse them. After we identify a relevant security incident, we notify the customer.<\/p><p>The <strong>security incident notifications<\/strong> sent to the customer contain the following types of information: <strong>Classification<\/strong> (Priority) \/ <strong>Categorisation of incident<\/strong>, <strong>Analysis information<\/strong>, <strong>Recommendations<\/strong> and <strong>Details<\/strong>.<\/p><p>Our <strong>standard SLA<\/strong> is the following:<\/p><p style=\"padding-left: 40px;\"><strong>Security incident<\/strong><\/p><ul><li style=\"list-style-type: none;\"><ul><li><strong>Priority 1 &#8211; 2 hours.<\/strong><\/li><li><strong>Priority 2 &#8211; 4 hours. <\/strong><\/li><li><strong>Priority 3 &#8211; 8 hours.<\/strong><\/li><\/ul><\/li><\/ul><p style=\"padding-left: 40px;\"><strong>Categories of Security Incidents<\/strong> (Enisa taxonomy used by CSIRT\/SOCs around the world):<\/p><ul><li style=\"list-style-type: none;\"><ul><li><strong>Abusive content<\/strong> &#8211; spam, harmful speech, child\/sexual\/violence;<\/li><li><strong>Malicious Code<\/strong> &#8211; Virus, Worm, Trojan, Spyware, Dialler, Rootkit;<\/li><li><strong>Information gathering<\/strong> &#8211; Scanning, Sniffing, Social Engineering;<\/li><li><strong>Intrusion attempts<\/strong> &#8211; Exploiting known vulnerabilities, Login attempts, New attack signature;<\/li><li><strong>Intrusions<\/strong> &#8211; privileged account compromise, Unprivileged account compromise, Application compromise, Bot;<\/li><li><strong>Availability<\/strong> &#8211; DoS, DDoS, Sabotage, Outage;<\/li><li><strong>Information content security<\/strong> &#8211; Unauthorized access to information \/ modification of information;<\/li><li><strong>Fraud<\/strong> &#8211; Unauthorized use of resources, Copyright, Masquerade, Phishing;<\/li><li><strong>Vulnerable<\/strong> &#8211; Open for abuse;<\/li><li><strong>Other<\/strong> &#8211; All incidents which do not fit in one of the given categories.<\/li><\/ul><\/li><\/ul><p style=\"padding-left: 40px;\"><strong>Infrastructure incident<br \/><\/strong><\/p><ul><li style=\"list-style-type: none;\"><ul><li><strong>Priority 1 &#8211; 30 min.<\/strong><\/li><li><strong>Priority 2 &#8211; 1 hour.<\/strong><\/li><li><strong>Priority 3 &#8211; 2 hours.<\/strong><\/li><li><strong>Priority 4 &#8211; 4 hours<\/strong>.<\/li><\/ul><\/li><\/ul><p>Categories depend on type of devices and monitored parameters.<\/p><p><strong>Threat intelligence<\/strong> (New vulnerabilities and relevant security information) it depends on CVSS score :<\/p><ul><li><strong>Priority 1 &#8211; Critical CVSSv3 &#8211; 24 hours.<\/strong><\/li><li><strong>Priority 2 &#8211; High CVSSv3 &#8211; 7 days.<\/strong><\/li><li><strong>Priority 3 &#8211; Medium &#8211; other security information &#8211; 31 days<\/strong>.<\/li><\/ul><p>Optionally, <strong>we can block attackers<\/strong> if customer requests this service component, <strong>by integrating our blocker modules with customer appliances<\/strong> (firewalls\/webproxy etc).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-11df531 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11df531\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f2df8af\" data-id=\"f2df8af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-641a848 elementor-widget elementor-widget-spacer\" data-id=\"641a848\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d28a9d elementor-widget elementor-widget-heading\" data-id=\"0d28a9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h1><span style=\"color: #ffff\"><strong>WHY CHOOSE DATANET SYSTEMS AS A SECURITY INFRASTRUCTURE SERVICE PROVIDER?<\/strong><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69297d2 elementor-widget elementor-widget-spacer\" data-id=\"69297d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99a123d elementor-widget elementor-widget-spacer\" data-id=\"99a123d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c058969 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c058969\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b2d5e0a\" data-id=\"b2d5e0a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4bfba22 elementor-widget elementor-widget-text-editor\" data-id=\"4bfba22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: left;\"><span style=\"color: #ef3e5d;\"><strong>Cost predictability<\/strong><\/span><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ea6c913\" data-id=\"ea6c913\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bc7c5b elementor-widget elementor-widget-text-editor\" data-id=\"7bc7c5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #333333;\">By choosing the security infrastructure solutions provided by Datanet, you can benefit from a <b>predictable cost and service model<\/b>.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9fccf39 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9fccf39\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b3ef5c0\" data-id=\"b3ef5c0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5fcc12e elementor-widget elementor-widget-text-editor\" data-id=\"5fcc12e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: left;\"><span style=\"color: #ef3e5d;\"><strong>Business continuity<\/strong><\/span><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1dcf25e\" data-id=\"1dcf25e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63a7444 elementor-widget elementor-widget-text-editor\" data-id=\"63a7444\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"color: #333333;\">Our company effectively provides you with an  <b>IT service that facilitates your uninterrupted activity<\/b>.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-96f5c14 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"96f5c14\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4552950\" data-id=\"4552950\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c2ce73 elementor-widget elementor-widget-text-editor\" data-id=\"4c2ce73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: left;\"><span style=\"color: #ef3e5d;\"><strong>Resource optimization<\/strong><\/span><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-42be389\" data-id=\"42be389\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e1fb70 elementor-widget elementor-widget-text-editor\" data-id=\"8e1fb70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"color: #333333;\">By choosing Datanet Systems services, you will be able to <b>focus your company&#8217;s resources on its strategic directions<\/b>.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3e1cb97 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e1cb97\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7fc53a9\" data-id=\"7fc53a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdd095f elementor-widget elementor-widget-text-editor\" data-id=\"bdd095f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: left;\"><span style=\"color: #ef3e5d;\"><strong>Lower risks due to the permanent access to a team of experts<\/strong><\/span><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bd15a6f\" data-id=\"bd15a6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fc10b3 elementor-widget elementor-widget-text-editor\" data-id=\"9fc10b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"color: #333333;\">By outsourcing the security services, you have <b>permanent access to a team of IT security experts, at much lower costs than those needed to build and maintain an in-house team<\/b>.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e5d1c0f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e5d1c0f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6b5b2f1\" data-id=\"6b5b2f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a83b9e elementor-widget elementor-widget-text-editor\" data-id=\"7a83b9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: left;\"><span style=\"color: #ef3e5d;\"><strong>Premium security products<\/strong><\/span><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-60790ae\" data-id=\"60790ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d90810 elementor-widget elementor-widget-text-editor\" data-id=\"9d90810\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"color: #333333;\">As part of Datanet\u2019s IaaS solution, you will receive<b> premium IT security products from a market leader &#8211; Cisco Systems &#8211; integrated into a complete solution and regularly updated by a team of experts certified by the manufacturer<\/b>.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd44940 elementor-widget elementor-widget-spacer\" data-id=\"fd44940\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f2b3aa6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f2b3aa6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a67c3d9\" data-id=\"a67c3d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1c94f2 elementor-widget elementor-widget-text-editor\" data-id=\"c1c94f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<hr \/><p style=\"padding-left: 40px;\"><b style=\"color: #ffffff; font-size: 18px; font-style: inherit;\">\u00a0<\/b><\/p><h2 style=\"text-align: left; padding-left: 40px;\"><span style=\"color: #ffffff;\"><b style=\"font-size: 18px; font-style: inherit;\">If you wish to receive a price offer for the services presented above, please contact us at <span style=\"color: #993366;\"><a style=\"color: #993366;\" href=\"mailto:sales@datanets.ro\"><span style=\"color: #00ccff;\">sales@datanets.ro<\/span><\/a> <\/span>or fill out the <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"#contactus\">form above.<\/a><\/span><\/b><\/span><\/h2><h2>\u00a0<\/h2><h2 style=\"text-align: left; padding-left: 40px;\"><span style=\"color: #ffffff;\"><b style=\"font-size: 18px; font-style: inherit;\">If you would like read more information about our IT security solutions provided as a service and the <em>Infrastucture as a Service<\/em> packages provided by Datanet, please fill out the form below to download our brochure.\u00a0<\/b><\/span><span style=\"color: #ffffff;\"><b style=\"font-size: 18px; font-style: inherit;\">\u00a0<\/b><\/span><b style=\"font-style: inherit; color: #ffffff; font-size: 18px;\">\u00a0<\/b><\/h2><p style=\"padding-left: 30px;\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26c4b48 elementor-widget elementor-widget-spacer\" data-id=\"26c4b48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-59b9ae8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"59b9ae8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a30003\" data-id=\"0a30003\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-579fd95 elementor-widget elementor-widget-spacer\" data-id=\"579fd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-975dca7 elementor-widget elementor-widget-void-section-cf7\" data-id=\"975dca7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"void-section-cf7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"void-cf7-form-widget-wrapper elementor-shortcode void-cf7-1\" data-void-cf7-contact-form-id=\"12061\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f12061-o2\" lang=\"ro-RO\" dir=\"ltr\" data-wpcf7-id=\"12061\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/12053#wpcf7-f12061-o2\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formular de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"12061\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"ro_RO\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f12061-o2\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<table style=\"border:none;\">\n\t<tr>\n\t\t<td style=\"border:none;\">\n\t\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n\t\t\t<\/p>\n\t\t<\/td>\n\t\t<td style=\"border:none;\">\n\t\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Company\" value=\"\" type=\"text\" name=\"company\" \/><\/span> <\/label>\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n\t<tr>\n\t\t<td style=\"border:none;\">\n\t\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"position\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Position\" value=\"\" type=\"text\" name=\"position\" \/><\/span> <\/label>\n\t\t\t<\/p>\n\t\t<\/td>\n\t\t<td style=\"border:none;\">\n\t\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n\t<tr>\n\t\t<td style=\"border:none;\">\n\t\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"telefon\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"telefon\" \/><\/span> <\/label>\n\t\t\t<\/p>\n\t\t<\/td>\n\t\t<td style=\"border:none;\">\n\t\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"solution\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Desired solution\" value=\"\" type=\"text\" name=\"solution\" \/><\/span> <\/label>\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n<\/table>\n<p><span id=\"keepitsimple\" class=\"wpcf7-form-control-wrap website-wrap\" style=\"display:none !important; visibility:hidden !important;\"><input id=\"wpcf7-69d63297c61bd-field\"  class=\"wpcf7-form-control wpcf7-text\" type=\"text\" name=\"website\" value=\"\" size=\"40\" tabindex=\"-1\" autocomplete=\"new-password\" \/><\/span><br \/>\n<b>I agree to be contacted for further information<\/b><span class=\"wpcf7-form-control-wrap\" data-name=\"acord_info_suplimentare\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first\"><input type=\"radio\" name=\"acord_info_suplimentare\" value=\"Yes\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Yes<\/span><\/span><span class=\"wpcf7-list-item last\"><input type=\"radio\" name=\"acord_info_suplimentare\" value=\"No\" \/><span class=\"wpcf7-list-item-label\">No<\/span><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"newsletter-agreed\"><span class=\"wpcf7-form-control wpcf7-checkbox\"><span class=\"wpcf7-list-item first last\"><input type=\"checkbox\" name=\"newsletter-agreed[]\" value=\"I agree to be informed by email about the news in Datanet Systems&#039; portfolio.\" \/><span class=\"wpcf7-list-item-label\">I agree to be informed by email about the news in Datanet Systems&#039; portfolio.<\/span><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"acordtermenisiconditii\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acordtermenisiconditii\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I have read and agree with the <a href=\"https:\/\/datanets.ro\/en\/terms-and-conditions\/\">Terms and Conditions<\/a> and the <a href=\"https:\/\/datanets.ro\/politica-de-prelucrare-datelor-cu-caracter-personal\/\">Privacy policy<\/a><\/label><\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Download Brochure\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div> \t\t\t<script>\r\n \t\t\t        var theform = document.querySelector('.void-cf7-1');\r\n\t\t\t\t\t\ttheform.addEventListener( 'wpcf7mailsent', function( event ) {\r\n\t\t\t\t\t    location = 'https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/';\r\n\t\t\t\t\t}, false );\r\n\t\t\t<\/script>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-308ccbc elementor-widget elementor-widget-spacer\" data-id=\"308ccbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT SECURITY INFRASTRUCTURE AS A SERVICE FROM DATANET IT SECURITY INFRASTRUCTURE AS A SERVICE &#8211; \u201eSecurity IaaS\u201d As cyber attacks have become more sophisticated, so have the security means developed to respond to their complexity. Cyber attackers now have a wide range of threats that force and sometimes outweigh traditional security methods. This evolution is &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/\"> <span class=\"screen-reader-text\">Security infrastructure as a service from Datanet<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":10,"featured_media":12128,"parent":7598,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"class_list":["post-12053","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security infrastructure as a service from Datanet &#8211; Datanet Systems<\/title>\n<meta name=\"description\" content=\"The security infrastructure as a Datanet service allows you to choose the right level of IT security for your business needs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security infrastructure as a service from Datanet &#8211; Datanet Systems\" \/>\n<meta property=\"og:description\" content=\"The security infrastructure as a Datanet service allows you to choose the right level of IT security for your business needs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-08T15:50:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2019\/10\/Untitled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1690\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/security-infrastructure-as-a-service-from-datanet\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/security-infrastructure-as-a-service-from-datanet\\\/\",\"name\":\"Security infrastructure as a service from Datanet &#8211; Datanet Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/security-infrastructure-as-a-service-from-datanet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/security-infrastructure-as-a-service-from-datanet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Untitled.png\",\"datePublished\":\"2019-10-02T11:49:40+00:00\",\"dateModified\":\"2020-05-08T15:50:44+00:00\",\"description\":\"The security infrastructure as a Datanet service allows you to choose the right level of IT security for your business needs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/security-infrastructure-as-a-service-from-datanet\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/security-infrastructure-as-a-service-from-datanet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/security-infrastructure-as-a-service-from-datanet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Untitled.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Untitled.png\",\"width\":1690,\"height\":454,\"caption\":\"infrastructura de securitate\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/security-infrastructure-as-a-service-from-datanet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Integration Services\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/it-integration-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security infrastructure as a service from Datanet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security infrastructure as a service from Datanet &#8211; Datanet Systems","description":"The security infrastructure as a Datanet service allows you to choose the right level of IT security for your business needs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/","og_locale":"en_US","og_type":"article","og_title":"Security infrastructure as a service from Datanet &#8211; Datanet Systems","og_description":"The security infrastructure as a Datanet service allows you to choose the right level of IT security for your business needs.","og_url":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_modified_time":"2020-05-08T15:50:44+00:00","og_image":[{"width":1690,"height":454,"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2019\/10\/Untitled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/","url":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/","name":"Security infrastructure as a service from Datanet &#8211; Datanet Systems","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2019\/10\/Untitled.png","datePublished":"2019-10-02T11:49:40+00:00","dateModified":"2020-05-08T15:50:44+00:00","description":"The security infrastructure as a Datanet service allows you to choose the right level of IT security for your business needs.","breadcrumb":{"@id":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2019\/10\/Untitled.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2019\/10\/Untitled.png","width":1690,"height":454,"caption":"infrastructura de securitate"},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"IT Integration Services","item":"https:\/\/datanets.ro\/en\/it-integration-services\/"},{"@type":"ListItem","position":3,"name":"Security infrastructure as a service from Datanet"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]}]}},"_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/pages\/12053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=12053"}],"version-history":[{"count":78,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/pages\/12053\/revisions"}],"predecessor-version":[{"id":15202,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/pages\/12053\/revisions\/15202"}],"up":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/pages\/7598"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/12128"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=12053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}