{"id":520,"date":"2024-02-07T19:15:26","date_gmt":"2024-02-07T19:15:26","guid":{"rendered":"https:\/\/cybervision247.com\/cybersecurite\/"},"modified":"2024-02-20T18:29:03","modified_gmt":"2024-02-20T18:29:03","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/cybervision247.com\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div id='revolutionslider_1'  class='avia-layerslider avia-revolutionslider main_color avia-shadow  avia-builder-el-0  el_before_av_section  avia-builder-el-first   container_wrap fullsize'  >\n\t\t\t<!-- START cybersecurite REVOLUTION SLIDER 6.6.20 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_6_1_wrapper\" data-source=\"gallery\" style=\"visibility:hidden;background:transparent;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_6_1\" style=\"\" data-version=\"6.6.20\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-11\" data-title=\"Slide\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/cybervision247.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"cybersecurite_banner1-7_cv247\" width=\"1920\" height=\"1108\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/cybersecurite_banner1-7_cv247.jpg\" data-parallax=\"off\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-6-slide-11-layer-0\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-color=\"#cdeeff\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:626px,626px,626px,300px;y:m;yo:-280px,-280px,-280px,-81px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:29,29,29,18;l:38,38,38,24;fw:700;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:133px,133px,133px,89px;h:45px,45px,45px,68px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"st:1290;sR:1290;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:7410;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:14;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>React \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-6-slide-11-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:131px,131px,131px,32px;y:m;yo:-80px,-80px,-80px,-18px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:51,51,51,20;l:62,62,62,24;fw:700;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:725px,725px,725px,261px;h:149px,149px,149px,68px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"x:0,0,0,0px;y:0,0,0,0px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"x:0,0,0,0px;y:0,0,0,0px;st:1710;sR:1710;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:6990;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:7;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>Advanced<br \/>\ncybersecurity solutions \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-6-slide-11-layer-2\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-color=\"#cdeeff\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:132px,132px,132px,32px;y:m;yo:100px,100px,100px,33px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:25,25,25,17;l:30,30,30,21;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:546px,546px,546px,267px;h:200px,200px,200px,auto;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"x:0,0,0,0px;y:0,0,0,0px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"x:0,0,0,0px;y:0,0,0,0px;st:1690;sR:1690;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:7010;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>Protect your digital future \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-6-slide-11-layer-4\" \n\t\t\t\t\t\t\t\tdata-type=\"image\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:595px,595px,595px,278px;yo:155px,155px,155px,48px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:20,20,20,4;l:0,0,0,6;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:23px,23px,23px,15px;h:23px,23px,23px,15px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"st:1290;sR:1290;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:7410;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:13;\"\n\t\t\t\t\t\t\t><img decoding=\"async\" src=\"\/\/cybervision247.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" class=\"tp-rs-img rs-lazyload\" width=\"\" height=\"\" data-lazyload=\"\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/crochet.svg\" data-no-retina> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-6-slide-11-layer-5\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-color=\"#cdeeff\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:166px,166px,166px,53px;y:m;yo:-280px,-280px,-280px,-98px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:29,29,29,18;l:38,38,38,24;fw:700;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:133px,133px,133px,100px;h:45px,45px,45px,38px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"st:640;sR:640;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:8060;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:10;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>Protect \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-6-slide-11-layer-6\" \n\t\t\t\t\t\t\t\tdata-type=\"image\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:135px,135px,135px,33px;yo:155px,155px,155px,48px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:20,20,20,4;l:0,0,0,6;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:23px,23px,23px,15px;h:23px,23px,23px,15px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"st:630;sR:630;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:8070;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:9;\"\n\t\t\t\t\t\t\t><img decoding=\"async\" src=\"\/\/cybervision247.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" class=\"tp-rs-img rs-lazyload\" width=\"\" height=\"\" data-lazyload=\"\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/crochet.svg\" data-no-retina> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-6-slide-11-layer-7\" \n\t\t\t\t\t\t\t\tdata-type=\"image\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:365px,365px,365px,154px;yo:155px,155px,155px,48px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:20,20,20,4;l:0,0,0,6;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:23px,23px,23px,15px;h:23px,23px,23px,15px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"st:950;sR:950;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:7750;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:11;\"\n\t\t\t\t\t\t\t><img decoding=\"async\" src=\"\/\/cybervision247.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" class=\"tp-rs-img rs-lazyload\" width=\"\" height=\"\" data-lazyload=\"\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/crochet.svg\" data-no-retina> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-6-slide-11-layer-8\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-color=\"#cdeeff\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"xo:396px,396px,396px,176px;y:m;yo:-280px,-280px,-280px,-99px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:29,29,29,18;l:38,38,38,24;fw:700;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:133px,133px,133px,94px;h:45px,45px,45px,35px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"st:950;sR:950;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:7750;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:12;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>Detect  \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_6_1',rl:[1240,1240,1240,480],el:[900,900,900,320],gw:[1920,1920,1920,480],gh:[900,900,900,320],type:'standard',justify:'',layout:'fullwidth',mh:\"0\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider61\"]!==undefined) {window.RS_MODULES.modules[\"revslider61\"].once = false;window.revapi6 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n<\/div>\n<div id='av_section_1'  class='avia-section av-6gn6t-330236b0d0394cbebf9a937fa8f30820 alternate_color avia-section-large avia-no-border-styling  avia-builder-el-1  el_after_av_revolutionslider  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-520'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-whjha-91e4f2fa12ff999f3047527f6dab591b av_one_fourth  avia-builder-el-2  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><\/div><div  class='flex_column av-gyzk5-0dab21482dc70181a82f48509615f395 av_one_half  avia-builder-el-3  el_after_av_one_fourth  el_before_av_one_fourth  flex_column_div  '     ><section  class='av_textblock_section av-aqjb9-6a7edb082ad9f77da6ef20f9eeda56b3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\">Why should your company invest in a cybersecurity department?<\/h2>\n<\/div><\/section><\/div><div  class='flex_column av-gkcg6-a05bad1f654bfe7fcbf0de6f09b616e9 av_one_fourth  avia-builder-el-5  el_after_av_one_half  el_before_av_one_fifth  flex_column_div  '     ><\/div><div  class='flex_column av-5iqid-329cdc1ddfa63eb7ac7edcb6a20e0609 av_one_fifth  avia-builder-el-6  el_after_av_one_fourth  el_before_av_three_fifth  first flex_column_div  column-top-margin'     ><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1du4x9-68ae29c95f9741323a53738eda889d29\">\n.flex_column.av-1du4x9-68ae29c95f9741323a53738eda889d29{\nborder-radius:50px 50px 50px 50px;\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-1du4x9-68ae29c95f9741323a53738eda889d29{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-1du4x9-68ae29c95f9741323a53738eda889d29 av_three_fifth  avia-builder-el-7  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-1bgid1-e8f1bb704ce7e318bf1420e8645c5857 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center;\">In today&#8217;s digital age, the expertise of a team like CyberVision 24\/7 is crucial to keeping your business running smoothly.<\/p>\n<p style=\"text-align: center;\">Our personalized IT security solutions provide comprehensive, continuous, and adaptive protection against today&#8217;s complex threats.<\/p>\n<p style=\"text-align: center;\">At CyberVision24\/7, we don&#8217;t just secure your IT network. We guarantee the peace of mind and operational continuity of your business through proactive innovation and sustainable, scalable protection.<\/p>\n<\/div><\/section><\/div><div  class='flex_column av-14tdkd-f6176cd4204fc7e78a119c722fba36e6 av_one_fifth  avia-builder-el-9  el_after_av_three_fifth  el_before_av_hr  flex_column_div  column-top-margin'     ><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-w4aqd-68e96fd3bc8e1fbebaf1b67446bb0366\">\n#top .hr.hr-invisible.av-w4aqd-68e96fd3bc8e1fbebaf1b67446bb0366{\nmargin-top:-50px;\nheight:1px;\n}\n<\/style>\n<div  class='hr av-w4aqd-68e96fd3bc8e1fbebaf1b67446bb0366 hr-invisible  avia-builder-el-10  el_after_av_one_fifth  avia-builder-el-last  av-desktop-hide av-medium-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8pt5i-bb1b560028abed695267792fc850eceb\">\n.avia-section.av-8pt5i-bb1b560028abed695267792fc850eceb{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/apropos_banner3_cv247.jpg);\nbackground-position:50% 0%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-8pt5i-bb1b560028abed695267792fc850eceb footer_color avia-section-large avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  data-section-bg-repeat='no-repeat'><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-520'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-b9tni-d60292d5f2707830e62c9471e6a46d7f av_one_full  avia-builder-el-12  el_before_av_one_full  avia-builder-el-first  first flex_column_div  '     ><section  class='av_textblock_section av-lsc0fhsp-d4d36be130e33c717a4b39461d3661ef '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-217 size-full\" src=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/logo_3_cv274.svg\" alt=\"\" width=\"300\" height=\"70\" \/><\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfe91-83d7098ada21881e3fd77c012d8126a0\">\n\n@media only screen and (min-width: 990px){ \n.flex_column.av-lfe91-83d7098ada21881e3fd77c012d8126a0{\npadding:0 80px 0 80px;\n}\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-lfe91-83d7098ada21881e3fd77c012d8126a0{\npadding:0 0 0 0;\n}\n}\n<\/style>\n<div  class='flex_column av-lfe91-83d7098ada21881e3fd77c012d8126a0 av_one_full  avia-builder-el-14  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-hs1ut-c49d7e611feb81c06f2129358ca5da9f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\"><span style=\"color: #ffffff;\">360-degree protection for your company&#8217;s IT environment.<\/span><\/h2>\n<\/div><\/section><\/div><div class='flex_column_table av-2t51cl-922247236d064ef1b11535eb7c0181c9 sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2t51cl-922247236d064ef1b11535eb7c0181c9\">\n.flex_column.av-2t51cl-922247236d064ef1b11535eb7c0181c9{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-2t51cl-922247236d064ef1b11535eb7c0181c9{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-2t51cl-922247236d064ef1b11535eb7c0181c9 av_one_full  avia-builder-el-16  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><section  class='av_textblock_section av-2m20sl-eecad1429bbf3b87965d10568a5f46b0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\"><strong>PENETRATION TESTING<\/strong><br \/>\nOur penetration tests assess the strength of your IT system in the face of attack. We simulate realistic attacks to pinpoint vulnerabilities and provide you with tailored recommendations for strengthening your infrastructure.<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div class='flex_column_table av-8az89p-2bad595245c9fec078ec4318fb1a780e sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8az89p-2bad595245c9fec078ec4318fb1a780e\">\n.flex_column.av-8az89p-2bad595245c9fec078ec4318fb1a780e{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-8az89p-2bad595245c9fec078ec4318fb1a780e{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-8az89p-2bad595245c9fec078ec4318fb1a780e av_one_full  avia-builder-el-18  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><section  class='av_textblock_section av-8701y5-5f443decd51117c0ff95795834651541 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\"><strong>VULNERABILITY IDENTIFICATION AND REMEDIATION<\/strong><br \/>\nVulnerability management is crucial to protecting your devices from threats. Our security experts evaluate your endpoints, detect weaknesses, and support you in reinforcing your infrastructure.<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div class='flex_column_table av-81wqet-b3f37b8bc8686aeb8102ac78d3005939 sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-81wqet-b3f37b8bc8686aeb8102ac78d3005939\">\n.flex_column.av-81wqet-b3f37b8bc8686aeb8102ac78d3005939{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-81wqet-b3f37b8bc8686aeb8102ac78d3005939{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-81wqet-b3f37b8bc8686aeb8102ac78d3005939 av_one_full  avia-builder-el-20  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><section  class='av_textblock_section av-79b6d9-e70d1b2a30c95215875ec748a3a5075a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\"><strong>CYBERSECURITY TRAINING<\/strong><br \/>\nOur training courses help build your team&#8217;s cybersecurity skills so they can prevent potential attacks. Customized training sessions are offered to educate your employees on security best practices, helping them to safeguard your company&#8217;s critical data.<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div class='flex_column_table av-1defc5-402c8bfdf9973a9905c4482d50dac69f sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1defc5-402c8bfdf9973a9905c4482d50dac69f\">\n.flex_column.av-1defc5-402c8bfdf9973a9905c4482d50dac69f{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-1defc5-402c8bfdf9973a9905c4482d50dac69f{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-1defc5-402c8bfdf9973a9905c4482d50dac69f av_one_full  avia-builder-el-22  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><section  class='av_textblock_section av-19emn1-867c3cdc04722db75f66c961860063a7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\"><strong> 24\/7 MONITORING <\/strong><br \/>\nOur team is always on hand to monitor your systems with tools such as SOC, SIEM, EDR, EPP, anti-ransomware, and more. You can rest assured that we&#8217;re always ready to tackle any threat.<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div class='flex_column_table av-11j7ph-627f63101cda84d943f9088e2a29d369 sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-11j7ph-627f63101cda84d943f9088e2a29d369\">\n.flex_column.av-11j7ph-627f63101cda84d943f9088e2a29d369{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-11j7ph-627f63101cda84d943f9088e2a29d369{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-11j7ph-627f63101cda84d943f9088e2a29d369 av_one_full  avia-builder-el-24  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><section  class='av_textblock_section av-vter9-c7b997b40e2d49dfe4cd5826825c2ab9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\"><strong>MICROSOFT 365 SECURITY AUDIT <\/strong><br \/>\nThe Microsoft 365 audit allows you to optimize and secure your Microsoft 365 environment through a thorough verification of its structure and security.<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div class='flex_column_table av-5bp6bh-445edd83d4e9651470e9840205fd3fdb sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5bp6bh-445edd83d4e9651470e9840205fd3fdb\">\n.flex_column.av-5bp6bh-445edd83d4e9651470e9840205fd3fdb{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-5bp6bh-445edd83d4e9651470e9840205fd3fdb{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-5bp6bh-445edd83d4e9651470e9840205fd3fdb av_one_full  avia-builder-el-26  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><section  class='av_textblock_section av-3lgo51-f53821745a047d9c78c0ac25979a8e50 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\"><strong>COMPLIANCE<\/strong><br \/>\nWe&#8217;ve assembled a range of practical tools to ensure your business remains compliant with industry standards and legislation (PCI DSS, CIS, CIS_8.0, GDPR IV, HIPAA).<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div class='flex_column_table av-r3f5p-a94ed369e874366e8358dec518112cd8 sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-r3f5p-a94ed369e874366e8358dec518112cd8\">\n.flex_column.av-r3f5p-a94ed369e874366e8358dec518112cd8{\nborder-radius:30px 30px 30px 30px;\npadding:50px 50px 50px 50px;\nbackground-color:#122f4e;\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-r3f5p-a94ed369e874366e8358dec518112cd8{\npadding:20px 20px 20px 20px;\n}\n}\n<\/style>\n<div  class='flex_column av-r3f5p-a94ed369e874366e8358dec518112cd8 av_one_full  avia-builder-el-28  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><section  class='av_textblock_section av-jheyl-06fe02572ce24cade97afc7056e297be '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\"><strong> CUSTOMIZED REPORTING <\/strong><br \/>\nWe also offer solutions and services to protect physical spaces against unauthorized activity and intrusion. Surveillance cameras, intruder alarms, and access control: choose reliable monitoring for your commercial spaces.<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div class='flex_column_table av-cp5r1-867db88fb6c6ba756b2ee0474951a90a sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-cp5r1-867db88fb6c6ba756b2ee0474951a90a\">\n.flex_column.av-cp5r1-867db88fb6c6ba756b2ee0474951a90a{\nborder-radius:30px 30px 30px 30px;\n}\n<\/style>\n<div  class='flex_column av-cp5r1-867db88fb6c6ba756b2ee0474951a90a av_one_full  avia-builder-el-30  el_after_av_one_full  avia-builder-el-last  first flex_column_table_cell av-equal-height-column av-align-middle av-animated-generic left-to-right  column-top-margin'     ><div  class='avia-button-wrap av-8iob9-de138285977e135accfee6ae756d84b8-wrap avia_animated_button av-animated-when-visible-95 pop-up avia-button-center  avia-builder-el-31  avia-builder-el-no-sibling '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8iob9-de138285977e135accfee6ae756d84b8\">\n#top #wrap_all .avia-button.av-8iob9-de138285977e135accfee6ae756d84b8{\nbackground-color:#e42d1b;\nborder-color:#e42d1b;\ncolor:#ffffff;\nborder-radius:10px 10px 10px 10px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-8iob9-de138285977e135accfee6ae756d84b8:hover{\nbackground-color:#000a1d;\ncolor:white;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all.avia-button.av-8iob9-de138285977e135accfee6ae756d84b8:hover .avia_button_background{\nborder-radius:10px 10px 10px 10px;\n}\n<\/style>\n<a href='https:\/\/cybervision247.com\/en\/cybersecurity\/'  class='avia-button av-8iob9-de138285977e135accfee6ae756d84b8 avia-icon_select-no avia-size-medium avia-position-center'  ><span class='avia_iconbox_title' >Talk to one of our experts<\/span><\/a><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<\/p>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m0p4e-eea9341e1f8359f8e865281f6163623f\">\n.avia-section.av-m0p4e-eea9341e1f8359f8e865281f6163623f .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/apropos_banner4_cv247.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-m0p4e-eea9341e1f8359f8e865281f6163623f footer_color avia-section-huge avia-no-border-styling  avia-builder-el-32  el_after_av_section  avia-builder-el-last  av-parallax-section avia-bg-style-parallax av-minimum-height av-minimum-height-50 av-height-50  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_pc='50' data-av_min_height_opt='50'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner footer_color avia-full-stretch'><\/div><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-520'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-g3jie-b2ff29d7735d9cd49b5542d61a81d564\">\n\n@media only screen and (min-width: 990px){ \n.flex_column.av-g3jie-b2ff29d7735d9cd49b5542d61a81d564{\npadding:0 0 0 50px;\n}\n}\n<\/style>\n<div  class='flex_column av-g3jie-b2ff29d7735d9cd49b5542d61a81d564 av_one_half  avia-builder-el-33  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><section  class='av_textblock_section av-1a9za-8dfc46a7cffb1ea3272e77fdbf509adb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: left;\">Intrusion surveillance and security<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsc0v72f-743a97a365041ec0ddcfa1947ce1454a\">\n#top .hr.hr-invisible.av-lsc0v72f-743a97a365041ec0ddcfa1947ce1454a{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-lsc0v72f-743a97a365041ec0ddcfa1947ce1454a hr-invisible  avia-builder-el-35  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lsc0wxc4-df7ef49004c5a1641a49b95f5951814b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: left;\">We also offer solutions and services to protect physical spaces against unauthorized activity and intrusion. Surveillance cameras, intruder alarms, access control: choose reliable surveillance for your commercial spaces.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7t586-878fbb1eda38610389d382477187d4e3\">\n#top .hr.hr-invisible.av-7t586-878fbb1eda38610389d382477187d4e3{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-7t586-878fbb1eda38610389d382477187d4e3 hr-invisible  avia-builder-el-37  el_after_av_textblock  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  class='avia-button-wrap av-lsc0rw60-e527578702b237e3f3677fcef35435b3-wrap avia_animated_button av-animated-when-visible-95 pop-up avia-button-left  avia-builder-el-38  el_after_av_hr  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsc0rw60-e527578702b237e3f3677fcef35435b3\">\n#top #wrap_all .avia-button.av-lsc0rw60-e527578702b237e3f3677fcef35435b3{\nbackground-color:#e42d1b;\nborder-color:#e42d1b;\ncolor:#ffffff;\nborder-radius:10px 10px 10px 10px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lsc0rw60-e527578702b237e3f3677fcef35435b3:hover{\nbackground-color:#000a1d;\ncolor:white;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all.avia-button.av-lsc0rw60-e527578702b237e3f3677fcef35435b3:hover .avia_button_background{\nborder-radius:10px 10px 10px 10px;\n}\n<\/style>\n<a href='https:\/\/cybervision247.com\/en\/cybersecurity\/'  class='avia-button av-lsc0rw60-e527578702b237e3f3677fcef35435b3 avia-icon_select-no avia-size-medium avia-position-left'  ><span class='avia_iconbox_title' >Learn more<\/span><\/a><\/div><\/p><\/div><div  class='flex_column av-aqhny-336d2a06c306a7ef7cd63f010b5659a8 av_one_half  avia-builder-el-39  el_after_av_one_half  avia-builder-el-last  flex_column_div  '     ><\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":404,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity | CyberVision 24\/7<\/title>\n<meta name=\"description\" content=\"CV 24\/7 offers advanced security solutions ton protect your digital future throught proactive innovation and sustainable, scalable protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybervision247.com\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity | CyberVision 24\/7\" \/>\n<meta property=\"og:description\" content=\"CV 24\/7 offers advanced security solutions ton protect your digital future throught proactive innovation and sustainable, scalable protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybervision247.com\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybervision 24\/7\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T18:29:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/cybersecurite_banner1-7_cv247.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1108\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybervision247.com\/en\/cybersecurity\/\",\"url\":\"https:\/\/cybervision247.com\/en\/cybersecurity\/\",\"name\":\"Cybersecurity | CyberVision 24\/7\",\"isPartOf\":{\"@id\":\"https:\/\/cybervision247.com\/#website\"},\"datePublished\":\"2024-02-07T19:15:26+00:00\",\"dateModified\":\"2024-02-20T18:29:03+00:00\",\"description\":\"CV 24\/7 offers advanced security solutions ton protect your digital future throught proactive innovation and sustainable, scalable protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/cybervision247.com\/en\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybervision247.com\/en\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybervision247.com\/en\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/cybervision247.com\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybervision247.com\/#website\",\"url\":\"https:\/\/cybervision247.com\/\",\"name\":\"Cybervision 24\/7\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybervision247.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity | CyberVision 24\/7","description":"CV 24\/7 offers advanced security solutions ton protect your digital future throught proactive innovation and sustainable, scalable protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybervision247.com\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity | CyberVision 24\/7","og_description":"CV 24\/7 offers advanced security solutions ton protect your digital future throught proactive innovation and sustainable, scalable protection.","og_url":"https:\/\/cybervision247.com\/en\/cybersecurity\/","og_site_name":"Cybervision 24\/7","article_modified_time":"2024-02-20T18:29:03+00:00","og_image":[{"width":1920,"height":1108,"url":"https:\/\/cybervision247.com\/wp-content\/uploads\/2024\/02\/cybersecurite_banner1-7_cv247.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybervision247.com\/en\/cybersecurity\/","url":"https:\/\/cybervision247.com\/en\/cybersecurity\/","name":"Cybersecurity | CyberVision 24\/7","isPartOf":{"@id":"https:\/\/cybervision247.com\/#website"},"datePublished":"2024-02-07T19:15:26+00:00","dateModified":"2024-02-20T18:29:03+00:00","description":"CV 24\/7 offers advanced security solutions ton protect your digital future throught proactive innovation and sustainable, scalable protection.","breadcrumb":{"@id":"https:\/\/cybervision247.com\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybervision247.com\/en\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cybervision247.com\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cybervision247.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/cybervision247.com\/#website","url":"https:\/\/cybervision247.com\/","name":"Cybervision 24\/7","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybervision247.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/pages\/520"}],"collection":[{"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/comments?post=520"}],"version-history":[{"count":3,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/pages\/520\/revisions"}],"predecessor-version":[{"id":592,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/pages\/520\/revisions\/592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/media\/404"}],"wp:attachment":[{"href":"https:\/\/cybervision247.com\/en\/wp-json\/wp\/v2\/media?parent=520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}