{"id":899,"date":"2022-05-03T17:45:08","date_gmt":"2022-05-03T13:45:08","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=899"},"modified":"2022-05-25T20:36:51","modified_gmt":"2022-05-25T16:36:51","slug":"cdc-on","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/cdc-on\/","title":{"rendered":"CDC-On"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653496589653{padding-top: 40px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<h4><span style=\"color: #800000;\">Provide <strong>24\/7<\/strong> comprehensive, integrated, contextual cybersecurity and breach prevention for large enterprises and small and medium businesses&#8217; IT, OT and IoT environments.<\/span><\/h4>\n<p style=\"text-align: left;\"><span style=\"font-size: 26px; font-weight: bold;\">Why Turn <\/span><strong style=\"font-size: 26px;\">CDC-On?<\/strong><\/p>\n<p style=\"text-align: left;\"><span style=\"font-size: 18px; font-weight: bold;\">THE RIGHT AMOUNT OF COMPREHENSIVE, INTEGRATED CYBERSECURITY<\/span><\/p>\n<div class=\"col-lg-9 \">\n<p style=\"text-align: left;\">CDC-On is a comprehensive, contextual Cybersecurity platform that integrates and aggregates: SOC, NOC, governance, compliance, security audit, SIEM, log management, incident management, critical asset identification, vulnerability management, internal, external, network, wireless penetration testing, intrusion detection and End-point detection and response (EDR), security orchestration and automation (SOAR), user behavioural analytics, (UEBA) security event correlation and triaging, eye on the glass monitoring, threat intelligence (TI), incident response (IR), ransomeware, antivirus, firewalls, IDS, IPS, IAM security, business continuity, BCP DR, security strategy, policies, procedures, GRC, managed CISO, SOC, SIEM, cloud security, AWS, Azure, Red team, blue team assessment, compromise assessment, digital forensics, malware analysis, source code review, application security assessment, mobile application security, smart and embedded systems security, data leak prevention (DLP), GDPR, security program and strategy, security software development, wireless, VoIP, VPN, advanced persistent threats (APT) and Darknet monitoring.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"collapse8One\" class=\"collapse show\">\n<div>\n<p style=\"text-align: left;\" align=\"left\"><strong>Sectors:<\/strong> IT, Government, Defense and Aerospace, Law enforcement, Automotive, Transportation, Life sciences, Banking &amp; Financials, Insurance, Manufacturing, Telecom, Energy, Transit and Rail security, Aviation and Shipping Cybersecurity<\/p>\n<p style=\"text-align: left;\" align=\"left\"><strong>Compliance and regulatory standards:<\/strong> NIST ISF, SANS, PCI DSS, ISO 27001, ISO 62443, GLA, SOX, FISMA, HIPAA, GDPR, NESA, SAMA<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_single_image image=&#8221;895&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; link=&#8221;https:\/\/www.cdc-on.us\/home&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653496608217{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_btn title=&#8221;View Details&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fwww.cdc-on.us%2Fhome|title:Managed%20SOC%20and%20NOC|target:_blank&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653496589653{padding-top: 40px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_column_text] Provide 24\/7 comprehensive, integrated, contextual cybersecurity and breach prevention for large enterprises and small and medium businesses&#8217; IT, OT and IoT environments. Why&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-899","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=899"}],"version-history":[{"count":8,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/899\/revisions"}],"predecessor-version":[{"id":1265,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/899\/revisions\/1265"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}