{"id":1233,"date":"2021-11-27T13:53:14","date_gmt":"2021-11-27T13:53:14","guid":{"rendered":"http:\/\/www.cyberdna.com.au\/cyber-automation\/?page_id=1233"},"modified":"2021-12-03T16:43:19","modified_gmt":"2021-12-03T16:43:19","slug":"managed-threat-protection-and-response","status":"publish","type":"page","link":"http:\/\/www.cyberdna.com.au\/cyber-automation\/managed-threat-protection-and-response\/","title":{"rendered":"Managed Threat Protection and Response"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-dfa78bf1260af8bed13208d1399ce24c\">\n.avia-section.av-av_section-dfa78bf1260af8bed13208d1399ce24c .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Threat-Protection-and-Response-Hero.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-av_section-dfa78bf1260af8bed13208d1399ce24c .av-section-color-overlay{\nopacity:0.4;\nbackground-color:#474747;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-av_section-dfa78bf1260af8bed13208d1399ce24c main_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  av-minimum-height av-minimum-height-20  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='20'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><a href='#next-section' title='' class='scroll-down-link ' aria-hidden='true' data-av_icon='\ue877' data-av_iconfont='entypo-fontello'><\/a><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1233'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_fifth-516b7eac7a9c6cd1b746245801c7486c av_one_fifth  avia-builder-el-1  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-av_three_fifth-f73a11ccd29996a2a11249d534554c23 av_three_fifth  avia-builder-el-2  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-49b2369a5231b235db0cd55aa444c255\">\n#top .av-special-heading.av-av_heading-49b2369a5231b235db0cd55aa444c255{\npadding-bottom:10px;\ncolor:#ffffff;\nfont-size:60px;\n}\n.av-special-heading.av-av_heading-49b2369a5231b235db0cd55aa444c255 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-49b2369a5231b235db0cd55aa444c255 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-3  el_before_av_hr  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Managed Threat Protection and Response<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-b90e2e68e8ea02287379d33e91bdedea\">\n#top .hr.av-av_hr-b90e2e68e8ea02287379d33e91bdedea{\nmargin-top:40px;\nmargin-bottom:40px;\n}\n.hr.av-av_hr-b90e2e68e8ea02287379d33e91bdedea .hr-inner{\nwidth:50px;\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='hr av-av_hr-b90e2e68e8ea02287379d33e91bdedea hr-custom  avia-builder-el-4  el_after_av_heading  avia-builder-el-last  hr-center hr-icon-no '><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><div class='flex_column av-av_one_fifth-f73a11ccd29996a2a11249d534554c23 av_one_fifth  avia-builder-el-5  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-c57ab61673851e3f626556a41b4e5c15\">\n.avia-section.av-av_section-c57ab61673851e3f626556a41b4e5c15{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-av_section-c57ab61673851e3f626556a41b4e5c15 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-6  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1233'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_full-a93934ecd89fbb8a9566d39e89cd3725 av_one_full  avia-builder-el-7  avia-builder-el-no-sibling  first flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-9b9530c8535a36616b405b20289ad5c5\">\n.av_textblock_section.av-av_textblock-9b9530c8535a36616b405b20289ad5c5 .avia_textblock{\ncolor:#3b4a73;\nfont-size:18px;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-9b9530c8535a36616b405b20289ad5c5 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p style=\"text-align: center;\">An organization\u2019s attack surface is much wider than its endpoints. We continuously monitor all users\u2019 logging in and out, internal and external traffic, and process execution on hosts and network traffics, to provide a real-time contextual visibility into the entire environment\u2019s activities.<\/p>\n<p style=\"text-align: center;\">We built and natively integrated the full-scope of technologies to prevent and detect attack vectors that target users, files, the network and hosts including: <strong>EDR<\/strong>, network analytics, SIEM, <strong>Deception<\/strong>, <strong>FIM<\/strong>, Vulnerability Assessment, <strong>Network Detection<\/strong> and Response, Dark web monitoring, <strong>Cloud protection<\/strong> and <strong>source code<\/strong> repository scanning. We built this robust security protection stack across all attack stages.<br \/>\nIn addition, our <strong>cyber awareness<\/strong> campaigns will train and assess and enhance your staff\u2019s <strong>security awareness<\/strong> level.<\/p>\n<p style=\"text-align: center;\">While we built the shield to protect your organization, our incident response team would respond to any incident in a 24\/7 basis.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-ddd73e2fe09087c8ea863684c2d4efb0\">\n.avia-section.av-av_section-ddd73e2fe09087c8ea863684c2d4efb0{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-av_section-ddd73e2fe09087c8ea863684c2d4efb0 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-9  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1233'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_fifth-1ca22399d877b927d873af939ca1b3bf sc-av_two_fifth av-equal-height-column-flextable'><div class='flex_column av-av_two_fifth-1ca22399d877b927d873af939ca1b3bf av_two_fifth  avia-builder-el-10  el_before_av_three_fifth  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-ddba3061efa28e64f6cab456ea212c67\">\n#top .av-special-heading.av-av_heading-ddba3061efa28e64f6cab456ea212c67{\npadding-bottom:10px;\nfont-size:25px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-ddba3061efa28e64f6cab456ea212c67 av-special-heading-h3 blockquote modern-quote  avia-builder-el-11  el_before_av_textblock  avia-builder-el-first  av-thin-font av-inherit-size '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Managed Breach Protection<strong><\/h3><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><\/strong><\/strong><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82\">\n.av_textblock_section.av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p><strong>DNAShield<\/strong> is designed to continuously protect your business with all <strong>security tools<\/strong> and services you need, and without any worry about in-house skills. In addition, this consolidated capability will save you a substantial amount of investment in various cyber detection and protection tools while minimizes your risks and time to detect of incidents. We proactively hunt for threats and discover vulnerabilities. This proactive approach to security minimizes the risks and ensures of your business advanced protection.<\/p>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-av_three_fifth-192480a742f8565193fe31d731cb7b39 av_three_fifth  avia-builder-el-13  el_after_av_two_fifth  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_image-f284cab557add1e65fe4863cc3f3036c\">\n.avia-image-container.av-av_image-f284cab557add1e65fe4863cc3f3036c .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-av_image-f284cab557add1e65fe4863cc3f3036c av-styling- avia-align-center  avia-builder-el-14  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1237 avia-img-lazy-loading-not-1237 avia_image' src=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Manage-Breach-Protection.png\" alt='Manage Breach Protection' title='Manage Breach Protection'  height=\"522\" width=\"987\"  itemprop=\"thumbnailUrl\" srcset=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Manage-Breach-Protection.png 987w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Manage-Breach-Protection-300x159.png 300w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Manage-Breach-Protection-768x406.png 768w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Manage-Breach-Protection-710x375.png 710w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Manage-Breach-Protection-705x373.png 705w\" sizes=\"(max-width: 987px) 100vw, 987px\" \/><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-cbf17c4b859871451ba4aade0c17081b\">\n.avia-section.av-av_section-cbf17c4b859871451ba4aade0c17081b{\nmargin-top:0px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-av_section-cbf17c4b859871451ba4aade0c17081b main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-15  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1233'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_full-a93934ecd89fbb8a9566d39e89cd3725 av_one_full  avia-builder-el-16  avia-builder-el-no-sibling  first flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-441f1f8d6fa3a7b7bb03ab50fa3f15d4\">\n#top .av-special-heading.av-av_heading-441f1f8d6fa3a7b7bb03ab50fa3f15d4{\npadding-bottom:10px;\nfont-size:36px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-441f1f8d6fa3a7b7bb03ab50fa3f15d4 av-special-heading-h3 blockquote modern-quote modern-centered  avia-builder-el-17  avia-builder-el-no-sibling  av-thin-font av-inherit-size '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Machine Accelerated Threat Hunting<strong><\/h3><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><\/strong><\/strong><\/p><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-ddd73e2fe09087c8ea863684c2d4efb0\">\n.avia-section.av-av_section-ddd73e2fe09087c8ea863684c2d4efb0{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-av_section-ddd73e2fe09087c8ea863684c2d4efb0 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-18  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1233'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_third-afdd3a200de05e8021e2d16c2ebbf0c1 sc-av_two_third av-mobile-columns-flex av-columns-reverse av-equal-height-column-flextable'><div class='flex_column av-av_two_third-afdd3a200de05e8021e2d16c2ebbf0c1 av_two_third  avia-builder-el-19  el_before_av_one_third  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82\">\n.av_textblock_section.av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p><strong>Intelligence Driven Threat Hunting<\/strong>: Disparate third-party data sets are converted into actionable threat intelligence to identify malicious actors lurking on your network.<\/p>\n<p><strong>Analytics Driven Hunting<\/strong>: Tailored algorithms, ML and statistical data is merged and analysed to identify potential risks that cannot be detected through conventional security products.<\/p>\n<p><strong>Adversary TTP Driven Hunting<\/strong>: Our expert analysts spend a considerable amount of time in understanding adversaries\u2019 tactics, techniques and procedures by analysing indicators of compromise, combined with adversarial intelligence.<\/p>\n<p><strong>Live Hunt<\/strong>: Superior telemetry integrated with high-fidelity threat intelligence hunts for threats across endpoints that have evaded security protocols.<\/p>\n<p><strong>Retrospect Hunt<\/strong>: The use of latest threat detection technologies enables retrospective threat hunting that helps search for threats by going through rich meta data and retrospective analysis.<\/p>\n<p>Our AI platform, and expert human analysts monitor and detect any anomalies and threats, and respond to them in a timely manner, on a 24\/7 basis. You will have access to all the data through your self-managed dashboard to monitor any activities, and will receive detailed and executive reports frequently.<\/p>\n<p><strong>DNAVision<\/strong>, enhances your cyber capabilities in the cloud, while includes assurance through penetration testing and source code repository monitoring. It also proactively monitors Dark Web and will deploy Deception capabilities to ensure we have a complete visibility and can stay ahead of attackers at all time.<\/p>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-av_one_third-192480a742f8565193fe31d731cb7b39 av_one_third  avia-builder-el-21  el_after_av_two_third  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_image-6a777d1a3f0134f5f6b14da04078893e\">\n.avia-image-container.av-av_image-6a777d1a3f0134f5f6b14da04078893e .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-av_image-6a777d1a3f0134f5f6b14da04078893e av-styling- avia-align-center  avia-builder-el-22  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1244 avia-img-lazy-loading-not-1244 avia_image' src=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Women.jpg\" alt='Women' title='Women'  height=\"315\" width=\"474\"  itemprop=\"thumbnailUrl\" srcset=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Women.jpg 474w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Women-300x199.jpg 300w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-ddd73e2fe09087c8ea863684c2d4efb0\">\n.avia-section.av-av_section-ddd73e2fe09087c8ea863684c2d4efb0{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_6'  class='avia-section av-av_section-ddd73e2fe09087c8ea863684c2d4efb0 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-23  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1233'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_full-d0c07d23042f66ee2247ea198caadced av_one_full  avia-builder-el-24  avia-builder-el-no-sibling  first flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_image-c42da25365530622c8d71500f5867ca0\">\n.avia-image-container.av-av_image-c42da25365530622c8d71500f5867ca0 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-av_image-c42da25365530622c8d71500f5867ca0 av-styling- avia-align-center  avia-builder-el-25  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1254 avia-img-lazy-loading-not-1254 avia_image' src=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/DNAvision.png\" alt='DNAvision' title='DNAvision'  height=\"622\" width=\"788\"  itemprop=\"thumbnailUrl\" srcset=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/DNAvision.png 788w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/DNAvision-300x237.png 300w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/DNAvision-768x606.png 768w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/DNAvision-705x556.png 705w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/div><\/div><\/div><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-ddd73e2fe09087c8ea863684c2d4efb0\">\n.avia-section.av-av_section-ddd73e2fe09087c8ea863684c2d4efb0{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_7'  class='avia-section av-av_section-ddd73e2fe09087c8ea863684c2d4efb0 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-26  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1233'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_one_fourth-1ca22399d877b927d873af939ca1b3bf sc-av_one_fourth av-equal-height-column-flextable'><div class='flex_column av-av_one_fourth-1ca22399d877b927d873af939ca1b3bf av_one_fourth  avia-builder-el-27  el_before_av_three_fourth  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-b06f26d0326b534da3c6b614a122f586\">\n#top .av-special-heading.av-av_heading-b06f26d0326b534da3c6b614a122f586{\npadding-bottom:10px;\nfont-size:25px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-b06f26d0326b534da3c6b614a122f586 av-special-heading-h3 blockquote modern-quote  avia-builder-el-28  el_before_av_textblock  avia-builder-el-first  av-thin-font av-inherit-size '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Cyber Defense Effectiveness Assessment <strong><\/h3><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><\/strong><\/strong><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82\">\n.av_textblock_section.av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-3182871b3e8521a4a255c7b0c74b4c82 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p>Our vulnerability assessment and penetration services will provide you with a complete and realistic view of your current cyber defence mechanism\u2019s effectiveness. By examining your <strong>attack surfaces<\/strong> and <strong>attack vectors<\/strong>, across your infrastructure, cloud environments or applications, you will discover the current gaps, misconfigurations, or trust relations. The outcome of our VAPT assessments would assist in your remediation process, to apply the provided solutions in minimization of the identified risks.<\/p>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-av_three_fourth-192480a742f8565193fe31d731cb7b39 av_three_fourth  avia-builder-el-30  el_after_av_one_fourth  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_image-1b8c3f0639ff48f7208568c339083e89\">\n.avia-image-container.av-av_image-1b8c3f0639ff48f7208568c339083e89 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-av_image-1b8c3f0639ff48f7208568c339083e89 av-styling- avia-align-center  avia-builder-el-31  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1255 avia-img-lazy-loading-not-1255 avia_image' src=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment.png\" alt='Effective Assessment' title='Effective Assessment'  height=\"1116\" width=\"2118\"  itemprop=\"thumbnailUrl\" srcset=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment.png 2118w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment-300x158.png 300w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment-1030x543.png 1030w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment-768x405.png 768w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment-1536x809.png 1536w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment-2048x1079.png 2048w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment-1500x790.png 1500w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment-710x375.png 710w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Effective-Assessment-705x371.png 705w\" sizes=\"(max-width: 2118px) 100vw, 2118px\" \/><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-f7a622a192eb4e7c4953e9c0865ff204\">\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204{\nmargin-top:20px;\nmargin-bottom:0px;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/pexels-eduardo-dutra-2115217.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-section-color-overlay{\nopacity:0.5;\nbackground-color:#ffffff;\n}\n<\/style>\n<div id='av_section_8'  class='avia-section av-av_section-f7a622a192eb4e7c4953e9c0865ff204 main_color avia-section-default avia-no-border-styling  avia-builder-el-32  el_after_av_section  avia-builder-el-last  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  container_wrap fullsize'  data-section-bg-repeat='stretch'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1233'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_full-516b7eac7a9c6cd1b746245801c7486c av_one_full  avia-builder-el-33  avia-builder-el-no-sibling  first flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-8677320905dc9bdec3e6c88e4c576590\">\n#top .av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590{\npadding-bottom:10px;\ncolor:#000000;\nfont-size:40px;\n}\n.av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590 .special-heading-inner-border{\nborder-color:#000000;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-8677320905dc9bdec3e6c88e4c576590 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-34  el_before_av_button  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Get in touch with us and receive more information on how it can help you<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n<div  class='avia-button-wrap avia-button-center  avia-builder-el-35  el_after_av_heading  avia-builder-el-last ' ><a href='http:\/\/www.cyberdna.com.au\/cyber-automation\/contact\/'  class='avia-button av-av_button-4869be09c2e71144d3515a4d55b0849a avia-icon_select-no avia-size-large avia-position-center avia-color-theme-color ' ><span class='avia_iconbox_title' >Contact<\/span><\/a><\/div><\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1233"}],"collection":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/comments?post=1233"}],"version-history":[{"count":39,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1233\/revisions"}],"predecessor-version":[{"id":1464,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1233\/revisions\/1464"}],"wp:attachment":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/media?parent=1233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}