{"id":304,"date":"2022-03-22T22:14:57","date_gmt":"2022-03-22T18:14:57","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=304"},"modified":"2022-06-01T09:04:35","modified_gmt":"2022-06-01T05:04:35","slug":"managed-security-services","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/managed-security-services\/","title":{"rendered":"MANAGED SERVICES"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1654058655901{padding-bottom: 30px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4 class=\"mt-5\">GUARDING YOUR CRITICAL ASSETS WITH A ROBUST SECURITY MONITORING SYSTEM<\/h4>\n<p>CyberDisti Managed Security Services ensures continuous monitoring of your security posture while preventing, detecting, analyzing, and responding to cyber security incidents with the aid of people, process and technology.[\/vc_column_text][vc_column_text]<strong>Features &amp; Benefits<\/strong><\/p>\n<ul>\n<li>Security professionals with extensive knowledge on SOC, MSS &amp; SIEM<\/li>\n<li>Multi-lingual resources<\/li>\n<li>Configured to remotely access event logs residing at customer premise<\/li>\n<li>Tested &amp; proven SOC processes based on ISO &amp; ITIL best practices<\/li>\n<li>Structured incident response framework<\/li>\n<li>Various delivery models &#8211; Remote, On-site &amp; Hybrid<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;87&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1654058664374{padding-top: 20px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Services&#8221; font_container=&#8221;tag:h4|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Security Assessment<\/li>\n<li>On-going Security Awareness enhancements<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>24&#215;7 Security Monitoring<\/li>\n<li>Early Detection<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Device Management (On-site\/Remote)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Incident Response<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_btn title=&#8221;View More&#8221; link=&#8221;url:https%3A%2F%2Fdemo.dedote.com%2Fcyberdisti%2Fcdc-on%2F|title:CDC-ON&#8221; css=&#8221;.vc_custom_1654058859915{padding-top: 30px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1654058664374{padding-top: 20px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;VULNERABILITY ASSESSMENT &amp; PENETRATION TESTING&#8221; font_container=&#8221;tag:h3|font_size:28px|text_align:left|line_height:38px&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1654059059320{border-bottom-width: 1px !important;padding-bottom: 5px !important;border-bottom-color: #ededed !important;border-bottom-style: solid !important;}&#8221;][vc_empty_space height=&#8221;15px&#8221;][vc_custom_heading text=&#8221;UNDERSTANDING VAPT AND THE BENEFITS FOR YOUR BUSINESS&#8221; font_container=&#8221;tag:h5|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_row_inner][vc_column_inner][vc_column_text]Vulnerability Assessment and Penetration Testing (VAPT) describes a broad range of security testing services designed to identify and help address cyber security exposures.<br \/>\nIn order to ensure that you choose the right type of assessment for your organization\u2019s needs, it\u2019s important to understand VAPT services and the differences between them. The diverse nature of VAPT assessments means that they can vary significantly in depth, breadth, scope and price.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_custom_heading text=&#8221;TYPES OF VAPT&#8221; font_container=&#8221;tag:h5|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_single_image image=&#8221;1297&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_custom_heading text=&#8221;WEB APPLICATION VAPT&#8221; font_container=&#8221;tag:h5|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]We test for vulnerabilities or security holes in corporate websites and web applications which leaves the website open to exploitation in order to strengthen the security of your web platform, web services and\/or related APIs.<\/p>\n<p><strong>What would be covered?<\/strong><br \/>\nThe testing approaches change as per each website depending on their functionalities and features. However, the common testing approach covers:[\/vc_column_text][vc_single_image image=&#8221;1298&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_custom_heading text=&#8221;MOBILE APPLICATION VAPT&#8221; font_container=&#8221;tag:h5|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Mobile application penetration testing aims on the evaluation of a mobile app\u2019s security posture. Its procedure includes the application\u2019s active analysis for any technical flaws, vulnerabilities, or weakness of both Android and IOS applications.<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1301 alignright\" src=\"https:\/\/demo.dedote.com\/cyberdisti\/wp-content\/uploads\/2022\/06\/vat2-300x171.jpg\" alt=\"\" width=\"300\" height=\"171\" srcset=\"https:\/\/demo.dedote.com\/cyberdisti\/wp-content\/uploads\/2022\/06\/vat2-300x171.jpg 300w, https:\/\/demo.dedote.com\/cyberdisti\/wp-content\/uploads\/2022\/06\/vat2.jpg 485w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>What would be covered?<\/strong><br \/>\nIt Covers the static and dynamic testing of mobile app including, PDA security assessment and source code testing.[\/vc_column_text][vc_single_image image=&#8221;1299&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_custom_heading text=&#8221;NETWORK VAPT&#8221; font_container=&#8221;tag:h5|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The objective of network VAPT is to identify all potential loopholes within your network security system and show the potential impact of those threats and loopholes by exploiting them. We deliver accurate and timely results for your organization&#8217;s IT department.<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1302 alignright\" src=\"https:\/\/demo.dedote.com\/cyberdisti\/wp-content\/uploads\/2022\/06\/vat3-300x95.jpg\" alt=\"\" width=\"300\" height=\"95\" srcset=\"https:\/\/demo.dedote.com\/cyberdisti\/wp-content\/uploads\/2022\/06\/vat3-300x95.jpg 300w, https:\/\/demo.dedote.com\/cyberdisti\/wp-content\/uploads\/2022\/06\/vat3-768x244.jpg 768w, https:\/\/demo.dedote.com\/cyberdisti\/wp-content\/uploads\/2022\/06\/vat3.jpg 870w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>What would be covered?<\/strong><br \/>\nNetwork VAPT reviews network strengths against common attacks, Security assessment of network devices and network devices penetration testing.<\/p>\n<p><strong>What are the types of Network VAPT?<\/strong><br \/>\n<strong>Internal VAPT-<\/strong> Scanning and exploitation of Internal Networks (Using VPN, RDP or via Live Test)<br \/>\n<strong>External VAPT-<\/strong> Scanning and exploitation of Public Networks (Public Ips)<br \/>\n<strong>NB:<\/strong> Network VAPT can be done by exploiting or confirming the vulnerability without harming or crashing the network.[\/vc_column_text][vc_single_image image=&#8221;1300&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1654058655901{padding-bottom: 30px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text] GUARDING YOUR CRITICAL ASSETS WITH A ROBUST SECURITY MONITORING SYSTEM CyberDisti Managed Security Services ensures continuous monitoring of your security posture while preventing, detecting, analyzing,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-304","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":9,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/304\/revisions"}],"predecessor-version":[{"id":1303,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/304\/revisions\/1303"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}