{
    "id": 1814,
    "date": "2021-04-07T20:03:54",
    "date_gmt": "2021-04-07T20:03:54",
    "guid": {
        "rendered": "https:\/\/acetechnology.com\/?page_id=1814"
    },
    "modified": "2021-05-21T21:06:34",
    "modified_gmt": "2021-05-21T21:06:34",
    "slug": "network-security",
    "status": "publish",
    "type": "page",
    "link": "https:\/\/acetechnology.com\/en\/network-security\/",
    "title": {
        "rendered": "Network Security"
    },
    "content": {
        "rendered": "<div class=\"wpb-content-wrapper\"><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center; color: white; font-size: 18px; line-height: 2;\">A comprehensive security analysis \/ audit of the current state of your network enables our team to recommend highly effective security measures based on our Firewall, DMZ, and Virtual Private Network (VPN) soultions: all proven, fully-tested, and efficiently implemented.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><!-- Row Backgrounds --><div class=\"upb_color\" data-bg-override=\"0\" data-bg-color=\"#1e73be\" data-fadeout=\"\" data-fadeout-percentage=\"30\" data-parallax-content=\"\" data-parallax-content-sense=\"30\" data-row-effect-mobile-disable=\"true\" data-img-parallax-mobile-disable=\"true\" data-rtl=\"false\"  data-custom-vc-row=\"\"  data-vc=\"7.9\"  data-is_old_vc=\"\"  data-theme-support=\"\"   data-overlay=\"false\" data-overlay-color=\"\" data-overlay-pattern=\"\" data-overlay-pattern-opacity=\"\" data-overlay-pattern-size=\"\"    ><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h1 style=\"color: black; text-align: left; font-size: 40px;\">Security Assessment<\/h1>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"color: #454545; font-size: 18px; line-height: 2; text-align: left;\">Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff. This is where Ace Technology comes in; our security assessment will provide you with the proper information needed to effectively protect your staff, assests, and reputation.<br \/>\nAce Technology\u2019s security assessment concentrates on 3 major areas:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_animate_when_almost_visible wpb_fadeInRight fadeInRight wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"smile_icon_list_wrap ult_info_list_container ult-adjust-bottom-margin\"><ul class=\"smile_icon_list left circle with_bg\"><li class=\"icon_list_item\" style=\" font-size:60px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:20px;border-width:1px;border-style:none;background:#1e73be;color:#ffffff;border-color:#333333;\"><i class=\"Defaults-chevron-right\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-8469\" style=\"font-size:20px;\"><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-8469 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><h3 class=\"custom-bullet-title\" style=\"color: #454545; text-align: left;\">Discovery<\/h3>\n<p style=\"text-align: left; color: #555555;\">Mapping and discovering the network from both sides of the firewall, including IP ranges, ports, services, topology, and so forth.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border: none !important;\"><\/div><\/li><li class=\"icon_list_item\" style=\" font-size:60px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:20px;border-width:1px;border-style:none;background:#1e73be;color:#ffffff;border-color:#333333;\"><i class=\"Defaults-chevron-right\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-6500\" style=\"font-size:20px;\"><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-6500 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><h3 class=\"custom-bullet-title\" style=\"color: #454545; text-align: left;\">Penetration<\/h3>\n<p style=\"text-align: left; color: #555555;\">Via ethical hacking, we attempt to compromise network security and penetrate as far as possible to identify your true security posture.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border: none !important;\"><\/div><\/li><li class=\"icon_list_item\" style=\" font-size:60px;\"><div class=\"icon_list_icon\" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:20px;border-width:1px;border-style:none;background:#1e73be;color:#ffffff;border-color:#333333;\"><i class=\"Defaults-chevron-right\" ><\/i><\/div><div class=\"icon_description\" id=\"Info-list-wrap-3848\" style=\"font-size:20px;\"><div class=\"icon_description_text ult-responsive\"  data-ultimate-target='#Info-list-wrap-3848 .icon_description_text'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"desktop:18px;\"}'  style=\"\"><h3 class=\"custom-bullet-title\" style=\"color: #454545; text-align: left;\">Documentation<\/h3>\n<p style=\"text-align: left; color: #555555;\">Our reports include an executive summary, a procedural report, as well as an IT best practices checklist.<\/p>\n<\/div><\/div><div class=\"icon_list_connector\"  style=\"border: none !important;\"><\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div>\n<\/div>",
        "protected": false
    },
    "excerpt": {
        "rendered": "<p class=\"card-text\"> [&#8230;]<\/p>\n<p class=\"m-0\"><a class=\"btn btn-outline-secondary btn-read-more\" href=\"https:\/\/acetechnology.com\/en\/network-security\/\">Read More<\/a><\/p>",
        "protected": false
    },
    "author": 1,
    "featured_media": 0,
    "parent": 0,
    "menu_order": 0,
    "comment_status": "closed",
    "ping_status": "closed",
    "template": "",
    "meta": {
        "footnotes": ""
    },
    "class_list": [
        "post-1814",
        "page",
        "type-page",
        "status-publish",
        "hentry"
    ],
    "yoast_head": "<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network Security | Ace Technology Inc.<\/title>\n<meta name=\"description\" content=\"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acetechnology.com\/en\/network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security | Ace Technology Inc.\" \/>\n<meta property=\"og:description\" content=\"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acetechnology.com\/en\/network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Ace Technology Inc.\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-21T21:06:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/acetechnology.com\/network-security\/\",\"url\":\"https:\/\/acetechnology.com\/network-security\/\",\"name\":\"Network Security | Ace Technology Inc.\",\"isPartOf\":{\"@id\":\"https:\/\/acetechnology.com\/fr\/#website\"},\"datePublished\":\"2021-04-07T20:03:54+00:00\",\"dateModified\":\"2021-05-21T21:06:34+00:00\",\"description\":\"Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.\",\"breadcrumb\":{\"@id\":\"https:\/\/acetechnology.com\/network-security\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/acetechnology.com\/network-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/acetechnology.com\/network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/acetechnology.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/acetechnology.com\/fr\/#website\",\"url\":\"https:\/\/acetechnology.com\/fr\/\",\"name\":\"Ace Technology Inc.\",\"description\":\"Enterprise Network Solutions, Services and Telecommunications\",\"publisher\":{\"@id\":\"https:\/\/acetechnology.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/acetechnology.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/acetechnology.com\/fr\/#organization\",\"name\":\"Ace Technology Inc.\",\"url\":\"https:\/\/acetechnology.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/acetechnology.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/acetechnology.com\/wp-content\/uploads\/2021\/03\/AceTechnology_Logo2_80px.png\",\"contentUrl\":\"https:\/\/acetechnology.com\/wp-content\/uploads\/2021\/03\/AceTechnology_Logo2_80px.png\",\"width\":218,\"height\":80,\"caption\":\"Ace Technology Inc.\"},\"image\":{\"@id\":\"https:\/\/acetechnology.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/ca.linkedin.com\/company\/ace-technology-inc-\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->",
    "yoast_head_json": {
        "title": "Network Security | Ace Technology Inc.",
        "description": "Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.",
        "robots": {
            "index": "index",
            "follow": "follow",
            "max-snippet": "max-snippet:-1",
            "max-image-preview": "max-image-preview:large",
            "max-video-preview": "max-video-preview:-1"
        },
        "canonical": "https:\/\/acetechnology.com\/en\/network-security\/",
        "og_locale": "en_US",
        "og_type": "article",
        "og_title": "Network Security | Ace Technology Inc.",
        "og_description": "Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.",
        "og_url": "https:\/\/acetechnology.com\/en\/network-security\/",
        "og_site_name": "Ace Technology Inc.",
        "article_modified_time": "2021-05-21T21:06:34+00:00",
        "twitter_card": "summary_large_image",
        "schema": {
            "@context": "https:\/\/schema.org",
            "@graph": [
                {
                    "@type": "WebPage",
                    "@id": "https:\/\/acetechnology.com\/network-security\/",
                    "url": "https:\/\/acetechnology.com\/network-security\/",
                    "name": "Network Security | Ace Technology Inc.",
                    "isPartOf": {
                        "@id": "https:\/\/acetechnology.com\/fr\/#website"
                    },
                    "datePublished": "2021-04-07T20:03:54+00:00",
                    "dateModified": "2021-05-21T21:06:34+00:00",
                    "description": "Security threats and attacks mean downtime and unwanted expense for your organization. Keeping up with the latest vulnerabilities requires time and effort on behalf of you and your staff.",
                    "breadcrumb": {
                        "@id": "https:\/\/acetechnology.com\/network-security\/#breadcrumb"
                    },
                    "inLanguage": "en-CA",
                    "potentialAction": [
                        {
                            "@type": "ReadAction",
                            "target": [
                                "https:\/\/acetechnology.com\/network-security\/"
                            ]
                        }
                    ]
                },
                {
                    "@type": "BreadcrumbList",
                    "@id": "https:\/\/acetechnology.com\/network-security\/#breadcrumb",
                    "itemListElement": [
                        {
                            "@type": "ListItem",
                            "position": 1,
                            "name": "Home",
                            "item": "https:\/\/acetechnology.com\/en\/"
                        },
                        {
                            "@type": "ListItem",
                            "position": 2,
                            "name": "Network Security"
                        }
                    ]
                },
                {
                    "@type": "WebSite",
                    "@id": "https:\/\/acetechnology.com\/fr\/#website",
                    "url": "https:\/\/acetechnology.com\/fr\/",
                    "name": "Ace Technology Inc.",
                    "description": "Enterprise Network Solutions, Services and Telecommunications",
                    "publisher": {
                        "@id": "https:\/\/acetechnology.com\/fr\/#organization"
                    },
                    "potentialAction": [
                        {
                            "@type": "SearchAction",
                            "target": {
                                "@type": "EntryPoint",
                                "urlTemplate": "https:\/\/acetechnology.com\/fr\/?s={search_term_string}"
                            },
                            "query-input": {
                                "@type": "PropertyValueSpecification",
                                "valueRequired": true,
                                "valueName": "search_term_string"
                            }
                        }
                    ],
                    "inLanguage": "en-CA"
                },
                {
                    "@type": "Organization",
                    "@id": "https:\/\/acetechnology.com\/fr\/#organization",
                    "name": "Ace Technology Inc.",
                    "url": "https:\/\/acetechnology.com\/fr\/",
                    "logo": {
                        "@type": "ImageObject",
                        "inLanguage": "en-CA",
                        "@id": "https:\/\/acetechnology.com\/fr\/#\/schema\/logo\/image\/",
                        "url": "https:\/\/acetechnology.com\/wp-content\/uploads\/2021\/03\/AceTechnology_Logo2_80px.png",
                        "contentUrl": "https:\/\/acetechnology.com\/wp-content\/uploads\/2021\/03\/AceTechnology_Logo2_80px.png",
                        "width": 218,
                        "height": 80,
                        "caption": "Ace Technology Inc."
                    },
                    "image": {
                        "@id": "https:\/\/acetechnology.com\/fr\/#\/schema\/logo\/image\/"
                    },
                    "sameAs": [
                        "https:\/\/ca.linkedin.com\/company\/ace-technology-inc-"
                    ]
                }
            ]
        }
    },
    "_links": {
        "self": [
            {
                "href": "https:\/\/acetechnology.com\/en\/wp-json\/wp\/v2\/pages\/1814",
                "targetHints": {
                    "allow": [
                        "GET"
                    ]
                }
            }
        ],
        "collection": [
            {
                "href": "https:\/\/acetechnology.com\/en\/wp-json\/wp\/v2\/pages"
            }
        ],
        "about": [
            {
                "href": "https:\/\/acetechnology.com\/en\/wp-json\/wp\/v2\/types\/page"
            }
        ],
        "author": [
            {
                "embeddable": true,
                "href": "https:\/\/acetechnology.com\/en\/wp-json\/wp\/v2\/users\/1"
            }
        ],
        "replies": [
            {
                "embeddable": true,
                "href": "https:\/\/acetechnology.com\/en\/wp-json\/wp\/v2\/comments?post=1814"
            }
        ],
        "version-history": [
            {
                "count": 20,
                "href": "https:\/\/acetechnology.com\/en\/wp-json\/wp\/v2\/pages\/1814\/revisions"
            }
        ],
        "predecessor-version": [
            {
                "id": 3399,
                "href": "https:\/\/acetechnology.com\/en\/wp-json\/wp\/v2\/pages\/1814\/revisions\/3399"
            }
        ],
        "wp:attachment": [
            {
                "href": "https:\/\/acetechnology.com\/en\/wp-json\/wp\/v2\/media?parent=1814"
            }
        ],
        "curies": [
            {
                "name": "wp",
                "href": "https:\/\/api.w.org\/{rel}",
                "templated": true
            }
        ]
    }
}