{"id":80694,"date":"2022-11-07T10:45:32","date_gmt":"2022-11-07T09:45:32","guid":{"rendered":"https:\/\/www.v-valley.com\/soluzioni-cyber-security\/"},"modified":"2022-11-21T17:39:04","modified_gmt":"2022-11-21T16:39:04","slug":"cyber-security-solutions","status":"publish","type":"page","link":"https:\/\/www.v-valley.com\/en\/cyber-security-solutions\/","title":{"rendered":"Cyber \u200b\u200bsecurity solutions"},"content":{"rendered":"\n<h2>\n\t\tV-VALLEY PRODUCTS FOR CYBER SECURITY\n\t<\/h2>\n\t<p>V-Valley works in synergy with the best players in the Cyber Security market, with a view to offering a customised solution tailored to our customers&#8217; specific requirements to prevent any possible cyber threat. These solutions address multiple needs such as: protection of entry points to the corporate network, perimeter protection, Identity &#038; Access Management (IAM), Email Security, advanced managed security services, threat detection and incident management, multi-factor authentication, SASE architectures, encryption.<\/p>\n\t<p>Application Security<\/p>\n\t<p>Cloud Protection <\/p>\n\t<p>Data Protection<\/p>\n\t<p>MDR &#8211; Maged Detention &#038; Response<\/p>\n\t<p>Email Protection<\/p>\n\t<p>EDR &#8211; Extended Detection and Response<\/p>\n\t<p>File server security<\/p>\n\t<p>File Storage Protection<\/p>\n\t<p>Fraud Management<\/p>\n\t<p>Hybryd Cloud Protection<\/p>\n\t<p>Identity and access management<\/p>\n\t<p>Infrastructure management<\/p>\n\t<p>Mobile Protection<\/p>\n\t<p>Multi Factor Authentication<\/p>\n\t<p>Network Protection<\/p>\n\t<p>Secure file Tranfert<\/p>\n\t<p>Security Management<\/p>\n\t<p>SIEM (Security Integration and Event Management)<\/p>\n\t<p>Wifi Protection<\/p>\n\t<p>Wifi Security<\/p>\n\t<p>Workload Protection<\/p>\n\t<p>Incident &amp; Response Collaboration<\/p>\n\t<p>Switch<\/p>\n\t<p>Firewall<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>V-VALLEY PRODUCTS FOR CYBER SECURITY V-Valley works in synergy with the best players in the Cyber Security market, with a view to offering a customised solution tailored to our customers&#8217; specific requirements to prevent any possible cyber threat. These solutions address multiple needs such as: protection of entry points to the corporate network, perimeter protection, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/template-simple.php","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-80694","1":"page","2":"type-page","3":"status-publish","5":"entry"},"acf":[],"_links":{"self":[{"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/pages\/80694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/comments?post=80694"}],"version-history":[{"count":0,"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/pages\/80694\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/media?parent=80694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}