{"id":163,"date":"2018-01-31T05:12:28","date_gmt":"2018-01-31T05:12:28","guid":{"rendered":"http:\/\/www.analyticalsolutions.biz\/Technology\/?page_id=163"},"modified":"2018-02-21T14:31:58","modified_gmt":"2018-02-21T09:31:58","slug":"security","status":"publish","type":"page","link":"http:\/\/www.analyticalsolutions.biz\/Technology\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-vz-jquery&#8221; bg_image_new=&#8221;id^342|url^http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/02\/bg-Security.jpg|caption^null|alt^null|title^bg-Security|description^null&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_override=&#8221;ex-full&#8221; disable_on_mobile_img_parallax=&#8221;disable_on_mobile_img_parallax_value&#8221;][vc_column][vc_empty_space height=&#8221;60px&#8221;]<div id=\"ultimate-heading-825269ea7d1790760\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-825269ea7d1790760 uvc-5723 \" data-hspacer=\"line_with_icon\" data-hline_width=\"50\" data-hicon_type=\"selector\" data-hborder_style=\"solid\" data-hborder_height=\"2\" data-hborder_color=\"#c66a24\" data-icon_width=\"28\" data-hfixer=\"20\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-825269ea7d1790760 h3'  data-responsive-json-new='{\"font-size\":\"desktop:32px;\",\"line-height\":\"\"}' ><h3 style=\"font-weight:normal;color:#8a4228;\">NETWORK SECURITY<\/h3><\/div><div class=\"uvc-heading-spacer line_with_icon\" style=\"topheight:28px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"color:#c66a24;font-size:28px;display:inline-block;\">\n\t<i class=\"Defaults-shield\"><\/i>\n<\/div><\/div><\/div><\/div><\/div>[vc_empty_space height=&#8221;40px&#8221;][vc_column_text el_class=&#8221;clearfix&#8221;]One of the biggest challenges faced by IT today is Security of the network. As organizations encirclement the latest technologies in implementing IT enabled systems, security, confidentiality and privacy concerns as well as legal and regulatory compliance are issues that need immediate action. Many organizations today are focused in implementing network architecture based upon business urgency rather than security. ASL provides tailored security solutions for small to large organizations, telecommunication companies and government concerns.[\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;30px&#8221;]<div id=\"ultimate-heading-74969ea7d17907a8\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-74969ea7d17907a8 uvc-629 \" data-hspacer=\"line_with_icon\" data-hline_width=\"50\" data-hicon_type=\"selector\" data-hborder_style=\"solid\" data-hborder_height=\"2\" data-hborder_color=\"#c66a24\" data-icon_width=\"28\" data-hfixer=\"20\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-74969ea7d17907a8 h3'  data-responsive-json-new='{\"font-size\":\"desktop:32px;\",\"line-height\":\"\"}' ><h3 style=\"font-weight:normal;color:#8a4228;\">PARTNER &amp; ALLIANCES<\/h3><\/div><div class=\"uvc-heading-spacer line_with_icon\" style=\"topheight:28px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"color:#c66a24;font-size:28px;display:inline-block;\">\n\t<i class=\"Defaults-group users\"><\/i>\n<\/div><\/div><\/div><\/div><\/div>[vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<div class=\"supercrsl supercarousel206 \" data-carouseloptions=\"{&quot;source&quot;:&quot;Post&quot;,&quot;respDesktop&quot;:&quot;visible&quot;,&quot;desktopVisible&quot;:&quot;7&quot;,&quot;desktopWidth&quot;:&quot;200&quot;,&quot;desktopHeight&quot;:&quot;200&quot;,&quot;respLaptop&quot;:&quot;visible&quot;,&quot;laptopVisible&quot;:&quot;7&quot;,&quot;laptopWidth&quot;:&quot;200&quot;,&quot;laptopHeight&quot;:&quot;200&quot;,&quot;respTablet&quot;:&quot;visible&quot;,&quot;tabletVisible&quot;:&quot;3&quot;,&quot;tabletWidth&quot;:&quot;200&quot;,&quot;tabletHeight&quot;:&quot;200&quot;,&quot;respMobile&quot;:&quot;visible&quot;,&quot;mobileVisible&quot;:&quot;1&quot;,&quot;mobileWidth&quot;:&quot;200&quot;,&quot;mobileHeight&quot;:&quot;200&quot;,&quot;direction&quot;:&quot;left&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;easing&quot;:&quot;swing&quot;,&quot;easingTime&quot;:&quot;400&quot;,&quot;step&quot;:&quot;1&quot;,&quot;auto&quot;:&quot;1&quot;,&quot;pauseTime&quot;:&quot;3000&quot;,&quot;pauseOver&quot;:&quot;0&quot;,&quot;autoscroll&quot;:&quot;0&quot;,&quot;scrollspeed&quot;:&quot;5&quot;,&quot;autoHeight&quot;:&quot;1&quot;,&quot;slideGap&quot;:&quot;40&quot;,&quot;nextPrev&quot;:&quot;1&quot;,&quot;arrowStyle&quot;:&quot;style2-black-small&quot;,&quot;arrowsOut&quot;:&quot;1&quot;,&quot;circular&quot;:&quot;1&quot;,&quot;mouseWheel&quot;:&quot;0&quot;,&quot;swipe&quot;:&quot;1&quot;,&quot;keys&quot;:&quot;0&quot;,&quot;paging&quot;:&quot;0&quot;,&quot;wrapper_class&quot;:&quot;&quot;,&quot;randomize&quot;:&quot;0&quot;,&quot;superhidden&quot;:&quot;1&quot;,&quot;customrespmin&quot;:[],&quot;customrespmax&quot;:[],&quot;customrespby&quot;:[],&quot;customrespvisible&quot;:[],&quot;customrespwidth&quot;:[],&quot;customrespheight&quot;:[],&quot;carouselid&quot;:206}\">\n    <div class=\"supercarousel\">\n                    <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo7.png\" alt=\"Lenovo\" title=\"Lenovo\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo11.png\" alt=\"3M\" title=\"3M\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo8.png\" alt=\"IBM\" title=\"IBM\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo9.png\" alt=\"TP Link\" title=\"TP Link\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo10.png\" alt=\"Emerson\" title=\"Emerson\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo12.png\" alt=\"molex\" title=\"molex\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo13.png\" alt=\"Aver\" title=\"Aver\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo1.png\" alt=\"Cisco\" title=\"Cisco\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo2.png\" alt=\"Aruba Networks\" title=\"Aruba Networks\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo3.png\" alt=\"D-Link\" title=\"D-Link\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo4.png\" alt=\"Intel\" title=\"Intel\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo5.png\" alt=\"HP\" title=\"HP\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                        <div>\n                <div class=\"super_imagewrap\"><div class=\"super_overlay super_overlay0\"><\/div><img decoding=\"async\" src=\"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/01\/client-logo6.png\" alt=\"Dell\" title=\"Dell\" class=\"super_image superelement0\" \/><\/div>            <\/div>\n                <\/div>\n    <div class=\"clear\"><\/div>\n            <a class=\"superprev super_style2-black-small\" href=\"#\"><span>prev<\/span><\/a>\n        <a class=\"supernext super_style2-black-small\" href=\"#\"><span>next<\/span><\/a>\n            <div class=\"pagination\"><\/div>\n<\/div>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-vz-jquery&#8221; bg_image_new=&#8221;id^342|url^http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/02\/bg-Security.jpg|caption^null|alt^null|title^bg-Security|description^null&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_override=&#8221;ex-full&#8221; disable_on_mobile_img_parallax=&#8221;disable_on_mobile_img_parallax_value&#8221;][vc_column][vc_empty_space height=&#8221;60px&#8221;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text el_class=&#8221;clearfix&#8221;]One of the biggest challenges faced by IT today is Security of the network. As organizations encirclement the latest technologies in implementing IT enabled systems, security, confidentiality and privacy concerns as well as legal and regulatory compliance are issues that need immediate action. Many organizations today<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-163","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security - Analytical Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.analyticalsolutions.biz\/Technology\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security - Analytical Solutions\" \/>\n<meta property=\"og:description\" content=\"[vc_row bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-vz-jquery&#8221; bg_image_new=&#8221;id^342|url^http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/02\/bg-Security.jpg|caption^null|alt^null|title^bg-Security|description^null&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_override=&#8221;ex-full&#8221; disable_on_mobile_img_parallax=&#8221;disable_on_mobile_img_parallax_value&#8221;][vc_column][vc_empty_space height=&#8221;60px&#8221;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text el_class=&#8221;clearfix&#8221;]One of the biggest challenges faced by IT today is Security of the network. As organizations encirclement the latest technologies in implementing IT enabled systems, security, confidentiality and privacy concerns as well as legal and regulatory compliance are issues that need immediate action. Many organizations today\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.analyticalsolutions.biz\/Technology\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Analytical Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-21T09:31:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/security\\\/\",\"url\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/security\\\/\",\"name\":\"Security - Analytical Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/#website\"},\"datePublished\":\"2018-01-31T05:12:28+00:00\",\"dateModified\":\"2018-02-21T09:31:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/#website\",\"url\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/\",\"name\":\"Analytical Solutions\",\"description\":\"Design, Develop, Implementation of Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.analyticalsolutions.biz\\\/Technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security - Analytical Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.analyticalsolutions.biz\/Technology\/security\/","og_locale":"en_US","og_type":"article","og_title":"Security - Analytical Solutions","og_description":"[vc_row bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-vz-jquery&#8221; bg_image_new=&#8221;id^342|url^http:\/\/www.analyticalsolutions.biz\/Technology\/wp-content\/uploads\/2018\/02\/bg-Security.jpg|caption^null|alt^null|title^bg-Security|description^null&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_override=&#8221;ex-full&#8221; disable_on_mobile_img_parallax=&#8221;disable_on_mobile_img_parallax_value&#8221;][vc_column][vc_empty_space height=&#8221;60px&#8221;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text el_class=&#8221;clearfix&#8221;]One of the biggest challenges faced by IT today is Security of the network. As organizations encirclement the latest technologies in implementing IT enabled systems, security, confidentiality and privacy concerns as well as legal and regulatory compliance are issues that need immediate action. Many organizations today","og_url":"https:\/\/www.analyticalsolutions.biz\/Technology\/security\/","og_site_name":"Analytical Solutions","article_modified_time":"2018-02-21T09:31:58+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.analyticalsolutions.biz\/Technology\/security\/","url":"https:\/\/www.analyticalsolutions.biz\/Technology\/security\/","name":"Security - Analytical Solutions","isPartOf":{"@id":"https:\/\/www.analyticalsolutions.biz\/Technology\/#website"},"datePublished":"2018-01-31T05:12:28+00:00","dateModified":"2018-02-21T09:31:58+00:00","breadcrumb":{"@id":"https:\/\/www.analyticalsolutions.biz\/Technology\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.analyticalsolutions.biz\/Technology\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.analyticalsolutions.biz\/Technology\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.analyticalsolutions.biz\/Technology\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/www.analyticalsolutions.biz\/Technology\/#website","url":"https:\/\/www.analyticalsolutions.biz\/Technology\/","name":"Analytical Solutions","description":"Design, Develop, Implementation of Solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.analyticalsolutions.biz\/Technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-json\/wp\/v2\/pages\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":1,"href":"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-json\/wp\/v2\/pages\/163\/revisions"}],"predecessor-version":[{"id":439,"href":"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-json\/wp\/v2\/pages\/163\/revisions\/439"}],"wp:attachment":[{"href":"http:\/\/www.analyticalsolutions.biz\/Technology\/wp-json\/wp\/v2\/media?parent=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}