{"version":"1.0","provider_name":"Analytical Solutions","provider_url":"http:\/\/www.analyticalsolutions.biz\/Technology","author_name":"Analytical","author_url":"http:\/\/www.analyticalsolutions.biz\/Technology\/author\/analytical\/","title":"Security - Analytical Solutions","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"NgtjcOkjre\"><a href=\"http:\/\/www.analyticalsolutions.biz\/Technology\/security\/\">Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/security\/embed\/#?secret=NgtjcOkjre\" width=\"600\" height=\"338\" title=\"&#8220;Security&#8221; &#8212; Analytical Solutions\" data-secret=\"NgtjcOkjre\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=http:\/\/www.analyticalsolutions.biz\/Technology\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"[vc_row bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-vz-jquery&#8221; bg_image_new=&#8221;id^342|url^http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/02\/bg-Security.jpg|caption^null|alt^null|title^bg-Security|description^null&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_override=&#8221;ex-full&#8221; disable_on_mobile_img_parallax=&#8221;disable_on_mobile_img_parallax_value&#8221;][vc_column][vc_empty_space height=&#8221;60px&#8221;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text el_class=&#8221;clearfix&#8221;]One of the biggest challenges faced by IT today is Security of the network. As organizations encirclement the latest technologies in implementing IT enabled systems, security, confidentiality and privacy concerns as well as legal and regulatory compliance are issues that need immediate action. Many organizations today"}