{"id":9761,"date":"2025-05-26T00:40:27","date_gmt":"2025-05-26T00:40:27","guid":{"rendered":"http:\/\/79concepts.com\/mtech\/?page_id=9761"},"modified":"2025-06-02T23:10:34","modified_gmt":"2025-06-02T23:10:34","slug":"security-2","status":"publish","type":"page","link":"http:\/\/79concepts.com\/mtech\/security-2\/","title":{"rendered":"Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row kd_background_image_position=&#8221;vc_row-bg-position-top&#8221; css=&#8221;.vc_custom_1748220365062{padding-top: 40px !important;}&#8221;][vc_column][vc_row_inner kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"kd-photobox  \" ><div class=\"photobox-img\"><a href=\"http:\/\/79concepts.com\/mtech\/data-loss-protection\/\"  title=\"Data Loss Protection\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"684\" src=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Data-Protection-Loss.jpg\" class=\"attachment-full\" alt=\"\" title=\"Data Protection Loss\" srcset=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Data-Protection-Loss.jpg 1000w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Data-Protection-Loss-300x205.jpg 300w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Data-Protection-Loss-768x525.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/div><div class=\"phb-content text-left \">\n                  <h5 >Data Loss Protection (DLP)<\/h5>\n                  <p >Safeguard Your Sensitive Data with Infodata's Data Loss Protection Solutions. Infodata Professional Services offers comprehensive Data Loss Prevention (DLP) solutions to prevent.<\/p><div class=\"phb-btncontainer\">\n                        <a class=\"phb-simple-link button-action-link\" href=\"http:\/\/79concepts.com\/mtech\/data-loss-protection\/\"  title=\"Data Loss Protection\" >Read More<\/a>\n                    <\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"kd-photobox  \" ><div class=\"photobox-img\"><a href=\"http:\/\/79concepts.com\/mtech\/email-security\/\"  title=\"Email Security\"><img loading=\"lazy\" decoding=\"async\" width=\"1500\" height=\"1026\" src=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Email.jpg\" class=\"attachment-full\" alt=\"\" title=\"Email\" srcset=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Email.jpg 1500w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Email-300x205.jpg 300w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Email-1024x700.jpg 1024w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Email-768x525.jpg 768w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/><\/a><\/div><div class=\"phb-content text-left \">\n                  <h5 >Email Security<\/h5>\n                  <p >Email Security identifies threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks. Fortify Your organization's email communications....<\/p><div class=\"phb-btncontainer\">\n                        <a class=\"phb-simple-link button-action-link\" href=\"http:\/\/79concepts.com\/mtech\/email-security\/\"  title=\"Email Security\" >Read More<\/a>\n                    <\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"kd-photobox  \" ><div class=\"photobox-img\"><a href=\"http:\/\/79concepts.com\/mtech\/web-security\/\"  title=\"Web Security\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1752\" src=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-1-scaled.jpg\" class=\"attachment-full\" alt=\"\" title=\"web security\" srcset=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-1-scaled.jpg 2560w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-1-300x205.jpg 300w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-1-1024x701.jpg 1024w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-1-768x525.jpg 768w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-1-1536x1051.jpg 1536w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-1-2048x1401.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"phb-content text-left \">\n                  <h5 >Web Security<\/h5>\n                  <p >Web Security Cloud operates as a proxy server for HTTP and HTTPS traffic, as well as FTP over HTTP. Fortify Your Enterprise with Unparalleled Web Security Solutions. Infodata offers.....<\/p><div class=\"phb-btncontainer\">\n                        <a class=\"phb-simple-link button-action-link\" href=\"http:\/\/79concepts.com\/mtech\/web-security\/\"  title=\"Web Security\" >Read More<\/a>\n                    <\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][vc_empty_space][vc_row_inner kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"kd-photobox  \" ><div class=\"photobox-img\"><a href=\"http:\/\/79concepts.com\/mtech\/insider-threat\/\"  title=\"Insider Threat\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"800\" src=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security.jpg\" class=\"attachment-full\" alt=\"\" title=\"web-security\" srcset=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security.jpg 1200w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-300x200.jpg 300w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-1024x683.jpg 1024w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/web-security-768x512.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/div><div class=\"phb-content text-left \">\n                  <h5 >Insider Threat<\/h5>\n                  <p >Insider Threat is a User Activity Monitoring solution that provides deep collections for granular visibility of user activity and unmatched forensics. Safeguard Your Business from Insider....<\/p><div class=\"phb-btncontainer\">\n                        <a class=\"phb-simple-link button-action-link\" href=\"http:\/\/79concepts.com\/mtech\/insider-threat\/\"  title=\"Insider Threat\" >Read More<\/a>\n                    <\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"kd-photobox  \" ><div class=\"photobox-img\"><a href=\"http:\/\/79concepts.com\/mtech\/network-security\/\"  title=\"Network Security\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"800\" src=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Futuristic-Data-Center.jpg\" class=\"attachment-full\" alt=\"\" title=\"Futuristic-Data-Center\" srcset=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Futuristic-Data-Center.jpg 1200w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Futuristic-Data-Center-300x200.jpg 300w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Futuristic-Data-Center-1024x683.jpg 1024w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Futuristic-Data-Center-768x512.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/div><div class=\"phb-content text-left \">\n                  <h5 >Network Security<\/h5>\n                  <p >Next-generation firewalls block malicious attacks and prevents the theft of data and intellectual property while transforming infrastructure and increasing the efficiency of your operations...<\/p><div class=\"phb-btncontainer\">\n                        <a class=\"phb-simple-link button-action-link\" href=\"http:\/\/79concepts.com\/mtech\/network-security\/\"  title=\"Network Security\" >Read More<\/a>\n                    <\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"kd-photobox  \" ><div class=\"photobox-img\"><a href=\"http:\/\/79concepts.com\/mtech\/cloud-security\/\"  title=\"Cloud Security\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"800\" src=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/cloud-infrastructure.jpg\" class=\"attachment-full\" alt=\"\" title=\"cloud-infrastructure\" srcset=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/cloud-infrastructure.jpg 1200w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/cloud-infrastructure-300x200.jpg 300w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/cloud-infrastructure-1024x683.jpg 1024w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/cloud-infrastructure-768x512.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/div><div class=\"phb-content text-left \">\n                  <h5 >Cloud Security<\/h5>\n                  <p >Cloud Access Security Broker (CASB) automatically discovers cloud application use, analyzes the risks and enforces appropriate controls for SaaS and production applications. Safeguard Your......<\/p><div class=\"phb-btncontainer\">\n                        <a class=\"phb-simple-link button-action-link\" href=\"http:\/\/79concepts.com\/mtech\/cloud-security\/\"  title=\"Cloud Security\" >Read More<\/a>\n                    <\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][vc_empty_space][vc_row_inner kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"kd-photobox  \" ><div class=\"photobox-img\"><a href=\"http:\/\/79concepts.com\/mtech\/dynamic-data-protection\/\"  title=\"Dynamic Data Protection\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"684\" src=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/DDP.jpg\" class=\"attachment-full\" alt=\"\" title=\"DDP\" srcset=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/DDP.jpg 1000w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/DDP-300x205.jpg 300w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/DDP-768x525.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/div><div class=\"phb-content text-left \">\n                  <h5 >Dynamic Data Protection<\/h5>\n                  <p >Dynamic Data Protection gives your team the power to identify and investigate the entities that pose a potential risk to critical data and assets. Secure Your Data Dynamically, Infodata's Dynamic....<\/p><div class=\"phb-btncontainer\">\n                        <a class=\"phb-simple-link button-action-link\" href=\"http:\/\/79concepts.com\/mtech\/dynamic-data-protection\/\"  title=\"Dynamic Data Protection\" >Read More<\/a>\n                    <\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"kd-photobox  \" ><div class=\"photobox-img\"><a href=\"http:\/\/79concepts.com\/mtech\/governance-risk-and-compliance\/\"  title=\"Governance, Risk and Compliance\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Governance-Risk-and-Compliance-scaled.jpg\" class=\"attachment-full\" alt=\"\" title=\"Governance, Risk and Compliance\" srcset=\"http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Governance-Risk-and-Compliance-scaled.jpg 2560w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Governance-Risk-and-Compliance-300x200.jpg 300w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Governance-Risk-and-Compliance-1024x683.jpg 1024w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Governance-Risk-and-Compliance-768x512.jpg 768w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Governance-Risk-and-Compliance-1536x1024.jpg 1536w, http:\/\/79concepts.com\/mtech\/wp-content\/uploads\/2025\/05\/Governance-Risk-and-Compliance-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"phb-content text-left \">\n                  <h5 >Governance, Risk and Compliance<\/h5>\n                  <p >A comprehensive approach to managing your organization's data with focus on IT policies and frameworks, Risk Management and Mitigations, Compliance and regulations. Fortify Your...<\/p><div class=\"phb-btncontainer\">\n                        <a class=\"phb-simple-link button-action-link\" href=\"http:\/\/79concepts.com\/mtech\/governance-risk-and-compliance\/\"  title=\"Governance, Risk and Compliance\" >Read More<\/a>\n                    <\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row kd_background_image_position=&#8221;vc_row-bg-position-top&#8221; css=&#8221;.vc_custom_1748220365062{padding-top: 40px !important;}&#8221;][vc_column][vc_row_inner kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space][vc_row_inner kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space][vc_row_inner kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9761","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/79concepts.com\/mtech\/wp-json\/wp\/v2\/pages\/9761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/79concepts.com\/mtech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/79concepts.com\/mtech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/79concepts.com\/mtech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/79concepts.com\/mtech\/wp-json\/wp\/v2\/comments?post=9761"}],"version-history":[{"count":9,"href":"http:\/\/79concepts.com\/mtech\/wp-json\/wp\/v2\/pages\/9761\/revisions"}],"predecessor-version":[{"id":9912,"href":"http:\/\/79concepts.com\/mtech\/wp-json\/wp\/v2\/pages\/9761\/revisions\/9912"}],"wp:attachment":[{"href":"http:\/\/79concepts.com\/mtech\/wp-json\/wp\/v2\/media?parent=9761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}