{"id":320,"date":"2022-03-23T20:26:59","date_gmt":"2022-03-23T16:26:59","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=320"},"modified":"2022-05-24T20:12:24","modified_gmt":"2022-05-24T16:12:24","slug":"next-generation-firewall-utm","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/next-generation-firewall-utm\/","title":{"rendered":"Next Gen. Firewall &#038; UTM"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;slideInUp&#8221; css=&#8221;.vc_custom_1653408663529{padding-top: 10px !important;padding-bottom: 0px !important;}&#8221;][vc_column][vc_single_image image=&#8221;59&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1648052999960{padding-top: 0px !important;}&#8221;][vc_column][vc_column_text css_animation=&#8221;slideInLeft&#8221;]<\/p>\n<h3><strong>Why Next-Generation Firewalls?<\/strong><\/h3>\n<p>Hackers, viruses, ransomware, data theft, industrial espionage and even government sponsored attacks. The list of cyber threats that could put your business at risk goes on and on. Add to this all the new types of technologies such as the Cloud, BYOD, WiFi and other that is supposed to make your company more productive.[\/vc_column_text][vc_column_text css_animation=&#8221;slideInRight&#8221;]<\/p>\n<h3><strong>The Challenge<\/strong><\/h3>\n<p>What you need is a Next-Generation Firewall (NGFW), i.e. a security product designed for your challenges with the cloud, a mobile workforce, BYOD and skilled cyber criminals and that puts you in control at all times.[\/vc_column_text][vc_btn title=&#8221;View More&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; css_animation=&#8221;slideInUp&#8221; add_icon=&#8221;true&#8221; el_class=&#8221;buttonwebsite&#8221; link=&#8221;url:https%3A%2F%2Fdemo.dedote.com%2Fcyberdisti%2Fclavister%2F|title:CLAVISTER&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;slideInUp&#8221; css=&#8221;.vc_custom_1653408663529{padding-top: 10px !important;padding-bottom: 0px !important;}&#8221;][vc_column][vc_single_image image=&#8221;59&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1648052999960{padding-top: 0px !important;}&#8221;][vc_column][vc_column_text css_animation=&#8221;slideInLeft&#8221;] Why Next-Generation Firewalls? Hackers, viruses, ransomware, data theft, industrial espionage and even government sponsored attacks. The list&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-320","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":11,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/320\/revisions"}],"predecessor-version":[{"id":1226,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/320\/revisions\/1226"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}