{"id":270,"date":"2022-03-22T21:11:04","date_gmt":"2022-03-22T17:11:04","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=270"},"modified":"2022-05-24T20:29:18","modified_gmt":"2022-05-24T16:29:18","slug":"email-security","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/email-security\/","title":{"rendered":"Email Security"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1650908628986{padding-top: 30px !important;padding-bottom: 0px !important;}&#8221; el_class=&#8221;solutionstitle_page&#8221;][vc_column css=&#8221;.vc_custom_1647970872563{padding-top: 0px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1650908669446{padding-top: 25px !important;padding-bottom: 0px !important;}&#8221; el_class=&#8221;solutionstitle_page&#8221;][vc_column css_animation=&#8221;fadeInLeft&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1653409678663{padding-top: 0px !important;}&#8221;][vc_column_text]<\/p>\n<h2>Email Security<\/h2>\n<p>[\/vc_column_text][vc_column_text]Email Security &#8211; Email and web are the top two vectors for cyberattacks, serving collectively as the initiation point for 99% of successful breaches. We will be able to address the top two cyberattack vectors \u2013 email and web \u2013 with a single, fully integrated, 100% cloud security solution.<\/p>\n<p>There&#8217;s no doubt that protecting your organization against email-borne threats has become increasingly difficult and we understand that advanced email security can be complex. Luckily, there&#8217;s an email security market guide to help you easily understand the current email security landscape and how you can protect your organization.[\/vc_column_text][\/vc_column][vc_column css_animation=&#8221;fadeInRight&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/o9q_Jk-ctwE\" width=\"100%\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653409721797{padding-top: 25px !important;padding-bottom: 40px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;278&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_btn title=&#8221;View More&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fdemo.dedote.com%2Fcyberdisti%2Ftrustifi%2F&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;65&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_btn title=&#8221;View More&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fdemo.dedote.com%2Fcyberdisti%2Ftitanhq%2F&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;279&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_btn title=&#8221;View More&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fdemo.dedote.com%2Fcyberdisti%2Foninbox%2F&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;iconblocksolutions&#8221; css=&#8221;.vc_custom_1653409753357{padding-top: 35px !important;padding-bottom: 25px !important;background-color: #f4f4f4 !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;283&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Cyber Resilience for Email<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;284&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Awareness Training<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;285&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Email Security<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;287&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Web Security<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;288&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Cyber Security Training<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;289&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h3>Archive, E-Discovery &amp; Compliance<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1650908628986{padding-top: 30px !important;padding-bottom: 0px !important;}&#8221; el_class=&#8221;solutionstitle_page&#8221;][vc_column css=&#8221;.vc_custom_1647970872563{padding-top: 0px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1650908669446{padding-top: 25px !important;padding-bottom: 0px !important;}&#8221; el_class=&#8221;solutionstitle_page&#8221;][vc_column css_animation=&#8221;fadeInLeft&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1653409678663{padding-top: 0px !important;}&#8221;][vc_column_text] Email Security [\/vc_column_text][vc_column_text]Email Security &#8211; Email and web are&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-270","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=270"}],"version-history":[{"count":21,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/270\/revisions"}],"predecessor-version":[{"id":1229,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/270\/revisions\/1229"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}