{"id":1145,"date":"2024-07-07T23:06:34","date_gmt":"2024-07-07T16:06:34","guid":{"rendered":"https:\/\/fusion.id\/?page_id=1145"},"modified":"2024-07-12T11:15:13","modified_gmt":"2024-07-12T04:15:13","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/fusion.id\/?page_id=1145","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f9f9f9&#8243; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_2,1_2&#8243; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;e6504a1b-67eb-4b3d-b023-bcab277610b6&#8243; header_4_font=&#8221;Mukta|800||on|||||&#8221; header_4_text_color=&#8221;#6B6B6B&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;0.15em&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Solution<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;c16985e1-e0d6-4022-964d-e2bfc04fa633&#8243; text_text_color=&#8221;#000000&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;50px&#8221; header_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>Cyber Security<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;4c43b4b6-66bf-432d-959a-705bda24a650&#8243; text_font=&#8221;Mukta||||||||&#8221; text_text_color=&#8221;#383838&#8243; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.4em&#8221; header_3_text_color=&#8221;#6B6B6B&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Fusion offers a comprehensive suite of security solutions that address various aspects of IT security, from threat detection and vulnerability management to data protection and incident response\u200b<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_divider color=&#8221;#000000&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; position_origin_a=&#8221;center_left&#8221; width=&#8221;35%&#8221; custom_margin=&#8221;50px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; min_height=&#8221;40.4px&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Threat Detection and Response&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/security.png&#8221; image_icon_width=&#8221;30%&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; icon_alignment=&#8221;left&#8221; title_text=&#8221;security&#8221;]<\/p>\n<p>Robust threat detection and response capabilities. This ensures that potential threats are identified and mitigated promptly, reducing the risk of data breaches.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Vulnerability Management&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/023-search.png&#8221; image_icon_width=&#8221;30%&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; icon_alignment=&#8221;left&#8221; title_text=&#8221;023-search&#8221;]Proactive approach helps prioritize and remediate critical vulnerabilities, ensuring that IT environments remain secure.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Automated Security Operations&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/065-3d.png&#8221; image_icon_width=&#8221;30%&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; icon_alignment=&#8221;left&#8221; title_text=&#8221;065-3d&#8221;]Streamline security operations, automate tasks, and improve response times, allowing security teams to focus on strategic initiatives and enhance overall security.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Advanced Data Protection&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/070-network.png&#8221; image_icon_width=&#8221;30%&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; icon_alignment=&#8221;left&#8221; title_text=&#8221;070-network&#8221;]Data loss prevention and ransomware protection safeguard sensitive data by monitoring and controlling data flows, ensuring security from unauthorized access and threats[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_blend=&#8221;luminosity&#8221; custom_padding=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;e6504a1b-67eb-4b3d-b023-bcab277610b6&#8243; header_4_font=&#8221;Mukta|800||on|||||&#8221; header_4_text_align=&#8221;center&#8221; header_4_text_color=&#8221;#6B6B6B&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;0.15em&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Data Masking and Tokenization<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;b327cbe4-b1d5-4b66-ad37-40c8f2f061ba&#8221; text_text_color=&#8221;#000000&#8243; header_2_font=&#8221;Archivo|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;1.35em&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;off|desktop&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243; header_font=&#8221;Archivo||||||||&#8221;]<\/p>\n<h2>A comprehensive IT security solutions.<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb title=&#8221;Security Orchestration, Automation, and Response &#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/107-evaluation.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;72px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;107-evaluation&#8221;]<\/p>\n<p>Automates repetitive security tasks and integrates with other security tools to streamline incident response. This allows security teams to focus on more strategic activities by reducing the time spent on manual processes.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb title=&#8221;Vulnerability Management&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/055-protection.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;72px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;055-protection&#8221;]continuous visibility into vulnerabilities across an organization\u2019s IT environment. It helps prioritize remediation efforts based on risk, ensuring that the most critical vulnerabilities are addressed first. [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb title=&#8221;Dynamic Application Security Testing&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/033-engineer.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;72px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;033-engineer&#8221;]Securing web applications by identifying and mitigating vulnerabilities. It offers dynamic application security testing (DAST) to ensure that applications are secure against attacks, allowing development teams to find and fix security issues during the development lifecycle.[\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb title=&#8221;Data Behavior Analytics (DBA)&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/016-biometric-data.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;72px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;016-biometric-data&#8221;]DBA technology helps organizations understand how data moves and is used within their environment. This insight allows for the detection of unusual data activity that could indicate a security threat, such as data exfiltration or insider threats.[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb title=&#8221;Data Loss Prevention (DLP)&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/001-data-encryption.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;72px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;001-data-encryption&#8221;]Cyberhaven\u2019s DLP solution monitors data flows and enforces policies to prevent unauthorized data transfers. It helps ensure that sensitive information is protected from leaks and breaches, both from internal and external threats.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb title=&#8221;Next-Gen SIEM&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/043-eye-scanner.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;72px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;043-eye-scanner&#8221;]<\/p>\n<p>Next-generation Security Information and Event Management (SIEM) tool that offers advanced threat detection and response capabilities. It helps organizations quickly identify and mitigate security threats through comprehensive monitoring, user behavior analytics, and automated incident response.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb title=&#8221;Ransomware Protection&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/097-hacker-1.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;72px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;097-hacker-1&#8243;]Detect and stop ransomware attacks in their tracks. The solution identifies abnormal data encryption activities and prevents data loss by blocking the ransomware before it spreads.[\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb title=&#8221;Incident Response&#8221; image=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/07\/038-solution.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;72px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;341773a8-7d77-4626-b15c-f95399f25521&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Archivo|700|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; body_font=&#8221;Mukta||||||||&#8221; body_text_color=&#8221;#000000&#8243; background_layout=&#8221;dark&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;038-solution&#8221;]Quick and effective incident response by offering detailed visibility into data activities. This helps security teams understand the scope of an incident and respond effectively to minimize damage and recover from breaches.[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_blend=&#8221;luminosity&#8221; custom_padding=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;e6504a1b-67eb-4b3d-b023-bcab277610b6&#8243; header_4_font=&#8221;Mukta|800||on|||||&#8221; header_4_text_align=&#8221;center&#8221; header_4_text_color=&#8221;#6B6B6B&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;0.15em&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Something For Enterprise<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;b327cbe4-b1d5-4b66-ad37-40c8f2f061ba&#8221; text_text_color=&#8221;#000000&#8243; header_2_font=&#8221;Archivo|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;1.35em&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;off|desktop&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><strong>What Product Can We Do?<\/strong><\/h2>\n<ul>\n<li><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_3,1_3,1_3&#8243;][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_3&#8243;][et_pb_image src=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/06\/fd_rapid7_logo.jpg&#8221; title_text=&#8221;fd_rapid7_logo&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243; align=&#8221;center&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_3&#8243;][et_pb_image src=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/06\/fd_cybereason_logo.jpg&#8221; title_text=&#8221;fd_cybereason_logo&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243; align=&#8221;center&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_3&#8243;][et_pb_image src=&#8221;https:\/\/fusion.id\/wp-content\/uploads\/2024\/06\/fd_axonius_logo.jpg&#8221; title_text=&#8221;fd_axonius_logo&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243; align=&#8221;center&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SolutionCyber SecurityFusion offers a comprehensive suite of security solutions that address various aspects of IT security, from threat detection and vulnerability management to data protection and incident response\u200bRobust threat detection and response capabilities. This ensures that potential threats are identified and mitigated promptly, reducing the risk of data breaches.Proactive approach helps prioritize and remediate critical [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1145","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fusion.id\/index.php?rest_route=\/wp\/v2\/pages\/1145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fusion.id\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fusion.id\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fusion.id\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fusion.id\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1145"}],"version-history":[{"count":9,"href":"https:\/\/fusion.id\/index.php?rest_route=\/wp\/v2\/pages\/1145\/revisions"}],"predecessor-version":[{"id":1569,"href":"https:\/\/fusion.id\/index.php?rest_route=\/wp\/v2\/pages\/1145\/revisions\/1569"}],"wp:attachment":[{"href":"https:\/\/fusion.id\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}