{"id":42,"date":"2024-07-29T13:10:23","date_gmt":"2024-07-29T13:10:23","guid":{"rendered":"https:\/\/cloudn8v.com\/?page_id=42"},"modified":"2024-07-29T13:17:28","modified_gmt":"2024-07-29T13:17:28","slug":"managed-services","status":"publish","type":"page","link":"https:\/\/cloudn8v.com\/index.php\/managed-services\/","title":{"rendered":"Managed Services"},"content":{"rendered":"\n<div class=\"wp-block-group our-services has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-261e2046 wp-block-group-is-layout-constrained\" style=\"background-color:#171d27;margin-top:0px;margin-bottom:0px\">\n<div style=\"height:58px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group our-services-small-heading has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-65b7d1bb wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center has-white-color has-primary-background-color has-text-color has-background has-link-color has-jost-font-family has-small-font-size wp-elements-e113dcce6b73aadd677ecca40a8c11a6\" style=\"padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--20);padding-left:var(--wp--preset--spacing--30);font-style:normal;font-weight:600;text-transform:uppercase\">our services<\/h3>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-white-color has-text-color has-link-color has-extra-large-font-size wp-elements-0da34217ed763c8c80d7676230e36695\">Our Managed Service Offering<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column service-box wow swing has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ffffff17;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/service1.png\" alt=\"\" class=\"wp-image-370\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group readmore-group is-nowrap is-layout-flex wp-container-core-group-is-layout-cd9ab148 wp-block-group-is-layout-flex\">\n<p class=\"service-readmore has-white-color has-text-color has-link-color has-small-font-size wp-elements-cbb891386a51f1138731557895289c86\" style=\"font-style:normal;font-weight:700;text-transform:capitalize\"><a href=\"#\">Read More<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/icon.png\" alt=\"\" class=\"wp-image-364\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-bb4d73dcf0d91293c5eafa99c093c498\">Security Operations Center<\/h4>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-a00f361d397600dc3e1de788aeddb504\" style=\"color:#78808f\">Our certified, 24\/7 available, SOC respond to incidence, triage impacted assets and execute DR runbooks should the need arise.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column service-box wow swing has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ffffff17;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/service2.png\" alt=\"\" class=\"wp-image-371\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group readmore-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<p class=\"service-readmore has-white-color has-text-color has-link-color has-small-font-size wp-elements-cbb891386a51f1138731557895289c86\" style=\"font-style:normal;font-weight:700;text-transform:capitalize\"><a href=\"#\">Read More<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/icon.png\" alt=\"\" class=\"wp-image-364\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-56d2ee40e5e291fd0df9cdeb9a2bc015\">Data Protection<\/h4>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-dde4e1137613025ed50caf9ec3a6680f\" style=\"color:#78808f\">We deploy cutting edge, machine learning tooling to prevent data theft, loss or perimeter breach.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column service-box wow swing has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ffffff17;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/service3.png\" alt=\"\" class=\"wp-image-372\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group readmore-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<p class=\"service-readmore has-white-color has-text-color has-link-color has-small-font-size wp-elements-5fe276c1b9f2234986c2a2729579869c\" style=\"font-style:normal;font-weight:700;text-transform:capitalize\"><a href=\"https:\/\/cloudn8v.com\/index.php\/cyber-security\/\" data-type=\"page\" data-id=\"43\">Read More<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/icon.png\" alt=\"\" class=\"wp-image-364\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-e084c53a5a4fe2fb1d2d003519432216\">Cyber Security<\/h4>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-0493e2b7d6c4b5460a7f5bcee2ca6c9d\" style=\"color:#78808f\">A zero trust architecture results in a reduced attack surface area. Let us assist you preventing your next incident.  <\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column service-box wow swing has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ffffff17;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/service4.png\" alt=\"\" class=\"wp-image-386\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group readmore-group is-nowrap is-layout-flex wp-container-core-group-is-layout-cd9ab148 wp-block-group-is-layout-flex\">\n<p class=\"service-readmore has-white-color has-text-color has-link-color has-small-font-size wp-elements-cbb891386a51f1138731557895289c86\" style=\"font-style:normal;font-weight:700;text-transform:capitalize\"><a href=\"#\">Read More<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/icon.png\" alt=\"\" class=\"wp-image-364\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-63751e870600518c15338b58cfae1863\">Pen-testing<\/h4>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-0f8d286530538ccce32efd21f2fa7374\" style=\"color:#78808f\">Know your security posture score weighted against popular security benchmarks (CIS, NIST, ISO).<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column service-box wow swing has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ffffff17;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/service5.png\" alt=\"\" class=\"wp-image-387\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group readmore-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<p class=\"service-readmore has-white-color has-text-color has-link-color has-small-font-size wp-elements-cbb891386a51f1138731557895289c86\" style=\"font-style:normal;font-weight:700;text-transform:capitalize\"><a href=\"#\">Read More<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/icon.png\" alt=\"\" class=\"wp-image-364\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-d93140457e405298a66e8bba40c62b75\">AV &amp; Endpoint Protection<\/h4>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-e28ca0f32f0bdfa88a4608b567441ef7\" style=\"color:#78808f\">Plug into our discounted licensing model for all your Anti-Virus, end-point protection and EDR needs.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column service-box wow swing has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ffffff17;padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/service6.png\" alt=\"\" class=\"wp-image-375\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group readmore-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<p class=\"service-readmore has-white-color has-text-color has-link-color has-small-font-size wp-elements-cbb891386a51f1138731557895289c86\" style=\"font-style:normal;font-weight:700;text-transform:capitalize\"><a href=\"#\">Read More<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cloudn8v.com\/wp-content\/themes\/cyber-security-blocks\/images\/icon.png\" alt=\"\" class=\"wp-image-364\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-b33dc19f98bb162d72f458591768d8fa\">Load Testing<\/h4>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-0d2cb5968cccff16c9c9800e24c8b6f9\" style=\"color:#78808f\">Know your application bottlenecks and what failure looks like from the customers perspective.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:28px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-font-size has-source-sans-3-font-family has-jost-font-family has-extra-small-font-size\" style=\"font-style:normal;font-weight:600;text-transform:capitalize\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/cloudn8v.com\/index.php\/contact-us\/\" style=\"border-radius:5px;background:linear-gradient(86deg,rgb(46,201,220) 0%,rgb(16,166,192) 100%)\">Book a meeting now<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:49px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>our services Our Managed Service Offering Read More Security Operations Center Our certified, 24\/7 available, SOC respond to incidence, triage impacted assets and execute DR runbooks should the need arise. Read More Data Protection We deploy cutting edge, machine learning tooling to prevent data theft, loss or perimeter breach. Read More Cyber Security A zero [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cloudn8v.com\/index.php\/wp-json\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudn8v.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cloudn8v.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cloudn8v.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudn8v.com\/index.php\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":4,"href":"https:\/\/cloudn8v.com\/index.php\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/cloudn8v.com\/index.php\/wp-json\/wp\/v2\/pages\/42\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/cloudn8v.com\/index.php\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}