{"id":22653,"date":"2025-05-06T09:10:08","date_gmt":"2025-05-06T09:10:08","guid":{"rendered":"https:\/\/new.vacif.com\/en\/?page_id=22653"},"modified":"2025-08-27T11:05:42","modified_gmt":"2025-08-27T04:05:42","slug":"an-ninh-mang-2-2","status":"publish","type":"page","link":"https:\/\/vacif.com\/en\/giai-phap-dich-vu\/an-ninh-mang-2-2\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<div class=\"wp-block-essential-blocks-advanced-image  root-eb-advanced-image-2hyra\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-2hyra \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-2hyra no-effect\" data-id=\"eb-advanced-image-2hyra\"><div class=\"eb-image-wrapper\"><div class=\"eb-image-wrapper-inner eb-img-style-square\"><img decoding=\"async\" src=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2025\/08\/Cybersecurity.png\" alt=\"\"\/><\/div><\/div><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-pwv8c\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-pwv8c \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-pwv8c button-1 undefined\" data-id=\"eb-advance-heading-pwv8c\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">Comprehensive Security Solutions for Your Business<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3d3424492d4ac3de95e14920c14efdf7\">In the digital era, information security has become a critical factor for every business. With the rising threats from hackers and cybercriminals, protecting data and IT systems is a top priority. We provide comprehensive security services to help your business maintain stability and safety, minimizing risks during operations.<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-f2w5f\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-f2w5f \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-f2w5f button-1 undefined\" data-id=\"eb-advance-heading-f2w5f\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">VACIF&#8217;s Security Services Include:<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-y2tkc\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-y2tkc \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-y2tkc button-1 undefined\" data-id=\"eb-advance-heading-y2tkc\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">1. Comprehensive Security<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-aca99951455ca34c822fdcbae4a01290\">We offer a multi-layered security solution tailored specifically for your business. Each security layer plays a vital role in preventing threats, from endpoints to applications and network systems.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-43928ca62c9675577e21bc46abe64752\">We will help you build a comprehensive security strategy that includes:<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-feature-list  root-eb-feature-list-exlp9\"><div class=\"eb-parent-wrapper eb-parent-eb-feature-list-exlp9 \"><div class=\"eb-feature-list-exlp9 eb-feature-list-wrapper eb-icon-position-left eb-tablet-icon-position-left eb-mobile-icon-position-left eb-feature-list-left\"><ul class=\"eb-feature-list-items circle stacked\"><li class=\"eb-feature-list-item\" data-new-tab=\"false\" data-icon-type=\"icon\" data-icon=\"fas fa-check\" data-icon-color=\"\" data-link=\"\" data-show-badge=\"false\"><div class=\"eb-feature-list-icon-box\"><div class=\"eb-feature-list-icon-inner\"><span class=\"eb-feature-list-icon\" style=\"color:\"><i icon=\"fas fa-check\" class=\"fas fa-check \"><\/i><\/span><\/div><\/div><div class=\"eb-feature-list-content-box\"><div class=\"eb-feature-list-title-wrapper\"><span class=\"eb-feature-list-title\">Security risk assessment to identify vulnerabilities<\/span><\/div><p class=\"eb-feature-list-content\"><\/p><\/div><\/li><li class=\"eb-feature-list-item\" data-new-tab=\"false\" data-icon-type=\"icon\" data-icon=\"fas fa-check\" data-link=\"\" data-show-badge=\"false\"><div class=\"eb-feature-list-icon-box\"><div class=\"eb-feature-list-icon-inner\"><span class=\"eb-feature-list-icon\"><i icon=\"fas fa-check\" class=\"fas fa-check \"><\/i><\/span><\/div><\/div><div class=\"eb-feature-list-content-box\"><div class=\"eb-feature-list-title-wrapper\"><span class=\"eb-feature-list-title\">Consulting and implementing appropriate security policies<\/span><\/div><p class=\"eb-feature-list-content\"><\/p><\/div><\/li><li class=\"eb-feature-list-item\" data-new-tab=\"false\" data-icon-type=\"icon\" data-icon=\"fas fa-check\" data-icon-color=\"\" data-link=\"\" data-show-badge=\"false\"><div class=\"eb-feature-list-icon-box\"><div class=\"eb-feature-list-icon-inner\"><span class=\"eb-feature-list-icon\" style=\"color:\"><i icon=\"fas fa-check\" class=\"fas fa-check \"><\/i><\/span><\/div><\/div><div class=\"eb-feature-list-content-box\"><div class=\"eb-feature-list-title-wrapper\"><span class=\"eb-feature-list-title\">Continuous security monitoring and control<\/span><\/div><p class=\"eb-feature-list-content\"><\/p><\/div><\/li><li class=\"eb-feature-list-item\" data-new-tab=\"false\" data-icon-type=\"icon\" data-icon=\"fas fa-check\" data-icon-color=\"\" data-link=\"\" data-show-badge=\"false\"><div class=\"eb-feature-list-icon-box\"><div class=\"eb-feature-list-icon-inner\"><span class=\"eb-feature-list-icon\" style=\"color:\"><i icon=\"fas fa-check\" class=\"fas fa-check \"><\/i><\/span><\/div><\/div><div class=\"eb-feature-list-content-box\"><div class=\"eb-feature-list-title-wrapper\"><span class=\"eb-feature-list-title\">Security awareness training for all employees<\/span><\/div><p class=\"eb-feature-list-content\"><\/p><\/div><\/li><\/ul><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-jy7a7\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-jy7a7 \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-jy7a7 button-1 undefined\" data-id=\"eb-advance-heading-jy7a7\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">2. Firewall &amp; EDR \u2013 <strong>Active Defense Layer<\/strong><\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-row  root-eb-row-mqbrs\"><div class=\"eb-parent-wrapper eb-parent-eb-row-mqbrs \"><div class=\"eb-row-root-container eb-row-mqbrs\" data-id=\"eb-row-mqbrs\"><div class=\"eb-row-wrapper\"><div class=\"eb-row-inner\">\n<div class=\"wp-block-essential-blocks-column  root-eb-column-hd0tx\"><div class=\"eb-parent-wrapper eb-parent-eb-column-hd0tx \"><div class=\"eb-column-wrapper eb-column-hd0tx\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-advanced-image  root-eb-advanced-image-695wu\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-695wu \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-695wu no-effect\" data-id=\"eb-advanced-image-695wu\"><div class=\"eb-image-wrapper\"><div class=\"eb-image-wrapper-inner eb-img-style-rounded\"><img decoding=\"async\" src=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2025\/07\/928-min-2-scaled.jpg\" alt=\"\"\/><\/div><\/div><\/figure><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-7z0ew\"><div class=\"eb-parent-wrapper eb-parent-eb-column-7z0ew \"><div class=\"eb-column-wrapper eb-column-7z0ew\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-n6e1x\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-n6e1x \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-n6e1x button-1 undefined\" data-id=\"eb-advance-heading-n6e1x\"><p class=\"eb-ah-title\"><span class=\"first-title\"><strong>Firewall:<\/strong><br><\/span>\u00a0<span class=\"second-title\">Next-generation firewalls help prevent unauthorized access and effectively control network traffic. We deploy advanced firewall solutions to protect your network systems from external attacks.<\/span><\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-row  root-eb-row-7oe7n\"><div class=\"eb-parent-wrapper eb-parent-eb-row-7oe7n \"><div class=\"eb-row-root-container eb-row-7oe7n\" data-id=\"eb-row-7oe7n\"><div class=\"eb-row-wrapper\"><div class=\"eb-row-inner\">\n<div class=\"wp-block-essential-blocks-column  root-eb-column-zhi69\"><div class=\"eb-parent-wrapper eb-parent-eb-column-zhi69 \"><div class=\"eb-column-wrapper eb-column-zhi69\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-advanced-image  root-eb-advanced-image-dso9v\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-dso9v \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-dso9v no-effect\" data-id=\"eb-advanced-image-dso9v\"><div class=\"eb-image-wrapper\"><div class=\"eb-image-wrapper-inner eb-img-style-rounded\"><img decoding=\"async\" src=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2025\/07\/8590807_1348-min-1-scaled.jpg\" alt=\"\"\/><\/div><\/div><\/figure><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-jqmed\"><div class=\"eb-parent-wrapper eb-parent-eb-column-jqmed \"><div class=\"eb-column-wrapper eb-column-jqmed\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-ad2qv\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-ad2qv \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-ad2qv button-1 undefined\" data-id=\"eb-advance-heading-ad2qv\"><p class=\"eb-ah-title\"><span class=\"first-title\"><strong>EDR (Endpoint Detection and Response):<br><\/strong><\/span>\u00a0<span class=\"second-title\">An endpoint security solution designed to detect and respond to threats on user devices. EDR provides continuous monitoring, early malware detection, and the ability to stop attacks at their initial stages.<\/span><\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-x9xo0\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-x9xo0 \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-x9xo0 button-1 undefined\" data-id=\"eb-advance-heading-x9xo0\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">3. Zero Trust Security \u2013 Trust No One, Not Even Internally<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-2c5d247695f8a9487cd85796beedb2b4\"><strong>Zero Trust Security<\/strong> is a modern security model that requires all access to systems to be authenticated and continuously monitored, no exceptions. This approach protects your business from threats both external and internal.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6ff69af477cb61689ec6beef2f35a720\">Key components of a Zero Trust strategy:<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-wrapper  root-eb-wrapper-4pids\"><div class=\"eb-parent-wrapper eb-parent-eb-wrapper-4pids \"><div class=\"eb-wrapper-outer eb-wrapper-4pids\"><div class=\"eb-wrapper-inner\"><div class=\"eb-wrapper-inner-blocks eb-wrapper-align-center\">\n<div class=\"wp-block-essential-blocks-row  root-eb-row-s3sj4\"><div class=\"eb-parent-wrapper eb-parent-eb-row-s3sj4 \"><div class=\"eb-row-root-container eb-row-s3sj4\" data-id=\"eb-row-s3sj4\"><div class=\"eb-row-wrapper\"><div class=\"eb-row-inner\">\n<div class=\"wp-block-essential-blocks-column  root-eb-column-7y3mh\"><div class=\"eb-parent-wrapper eb-parent-eb-column-7y3mh \"><div class=\"eb-column-wrapper eb-column-7y3mh\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-icon  root-eb-icon-ozvvw\"><div class=\"eb-parent-wrapper eb-parent-eb-icon-ozvvw \"><div class=\"eb-icon-wrapper eb-icon-ozvvw eb-icon-view-default\" data-id=\"eb-icon-ozvvw\"><div class=\"eb-icon-container\"><span class=\"dashicon dashicons dashicons-id-alt\"><\/span><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-wqjo4\"><div class=\"eb-parent-wrapper eb-parent-eb-column-wqjo4 \"><div class=\"eb-column-wrapper eb-column-wqjo4\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-text  root-eb-text-3jckt\"><div class=\"eb-parent-wrapper eb-parent-eb-text-3jckt \"><div class=\"eb-text-wrapper eb-text-3jckt\" data-id=\"eb-text-3jckt\"><p class=\"eb-text\">Identity and Access Management <strong>(IAM)<\/strong><\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-row  root-eb-row-a5tml\"><div class=\"eb-parent-wrapper eb-parent-eb-row-a5tml \"><div class=\"eb-row-root-container eb-row-a5tml\" data-id=\"eb-row-a5tml\"><div class=\"eb-row-wrapper\"><div class=\"eb-row-inner\">\n<div class=\"wp-block-essential-blocks-column  root-eb-column-z919j\"><div class=\"eb-parent-wrapper eb-parent-eb-column-z919j \"><div class=\"eb-column-wrapper eb-column-z919j\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-icon  root-eb-icon-40jl2\"><div class=\"eb-parent-wrapper eb-parent-eb-icon-40jl2 \"><div class=\"eb-icon-wrapper eb-icon-40jl2 eb-icon-view-default\" data-id=\"eb-icon-40jl2\"><div class=\"eb-icon-container\"><i icon=\"far fa-id-badge\" class=\"far fa-id-badge \"><\/i><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-efanu\"><div class=\"eb-parent-wrapper eb-parent-eb-column-efanu \"><div class=\"eb-column-wrapper eb-column-efanu\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-text  root-eb-text-hv0wg\"><div class=\"eb-parent-wrapper eb-parent-eb-text-hv0wg \"><div class=\"eb-text-wrapper eb-text-hv0wg\" data-id=\"eb-text-hv0wg\"><p class=\"eb-text\">Multi-Factor Authentication <strong>(MFA)<\/strong><\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-row  root-eb-row-dqemr\"><div class=\"eb-parent-wrapper eb-parent-eb-row-dqemr \"><div class=\"eb-row-root-container eb-row-dqemr\" data-id=\"eb-row-dqemr\"><div class=\"eb-row-wrapper\"><div class=\"eb-row-inner\">\n<div class=\"wp-block-essential-blocks-column  root-eb-column-7z7e4\"><div class=\"eb-parent-wrapper eb-parent-eb-column-7z7e4 \"><div class=\"eb-column-wrapper eb-column-7z7e4\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-icon  root-eb-icon-761kc\"><div class=\"eb-parent-wrapper eb-parent-eb-icon-761kc \"><div class=\"eb-icon-wrapper eb-icon-761kc eb-icon-view-default\" data-id=\"eb-icon-761kc\"><div class=\"eb-icon-container\"><span class=\"dashicon dashicons dashicons-fullscreen-alt\"><\/span><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-ieuy6\"><div class=\"eb-parent-wrapper eb-parent-eb-column-ieuy6 \"><div class=\"eb-column-wrapper eb-column-ieuy6\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-text  root-eb-text-iqx32\"><div class=\"eb-parent-wrapper eb-parent-eb-text-iqx32 \"><div class=\"eb-text-wrapper eb-text-iqx32\" data-id=\"eb-text-iqx32\"><p class=\"eb-text\">Network Microsegmentation<\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-la52t\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-la52t \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-la52t button-1 undefined\" data-id=\"eb-advance-heading-la52t\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">4. SOC Services \u2013 24\/7 Security Monitoring<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-bf83871d89ba0a7a7f1ca6918494814f\">A <strong>Security Operations Center (SOC)<\/strong> is a centralized unit that monitors and responds rapidly to cybersecurity incidents.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-0231058f4c7df7ebd64ec6864e582e8b\">With our <strong>Managed SOC<\/strong> service, your business will be continuously monitored 24\/7 to detect and respond to security incidents in real time, minimizing damage and ensuring uninterrupted system operations.<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-6wkpt\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-6wkpt \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-6wkpt button-1 undefined\" data-id=\"eb-advance-heading-6wkpt\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">Why Choose VACIF?<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-wrapper  root-eb-wrapper-sbg7k\"><div class=\"eb-parent-wrapper eb-parent-eb-wrapper-sbg7k \"><div class=\"eb-wrapper-outer eb-wrapper-sbg7k\"><div class=\"eb-wrapper-inner\"><div class=\"eb-wrapper-inner-blocks eb-wrapper-align-center\">\n<div class=\"wp-block-essential-blocks-row  root-eb-row-45b2e\"><div class=\"eb-parent-wrapper eb-parent-eb-row-45b2e \"><div class=\"eb-row-root-container eb-row-45b2e\" data-id=\"eb-row-45b2e\"><div class=\"eb-row-wrapper\"><div class=\"eb-row-inner\">\n<div class=\"wp-block-essential-blocks-column  root-eb-column-bwyt6\"><div class=\"eb-parent-wrapper eb-parent-eb-column-bwyt6 \"><div class=\"eb-column-wrapper eb-column-bwyt6\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-icon  root-eb-icon-43dds\"><div class=\"eb-parent-wrapper eb-parent-eb-icon-43dds \"><div class=\"eb-icon-wrapper eb-icon-43dds eb-icon-view-stacked eb-icon-shape-circle\" data-id=\"eb-icon-43dds\"><div class=\"eb-icon-container\"><i icon=\"fas fa-user-shield\" class=\"fas fa-user-shield \"><\/i><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-drwao\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-drwao \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-drwao button-1 undefined\" data-id=\"eb-advance-heading-drwao\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">World-Class Security Experts<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-text  root-eb-text-wlv4n\"><div class=\"eb-parent-wrapper eb-parent-eb-text-wlv4n \"><div class=\"eb-text-wrapper eb-text-wlv4n\" data-id=\"eb-text-wlv4n\"><p class=\"eb-text\">Our team includes certified professionals (CISSP, CEH) with years of experience in the cybersecurity industry.<\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-5pu2i\"><div class=\"eb-parent-wrapper eb-parent-eb-column-5pu2i \"><div class=\"eb-column-wrapper eb-column-5pu2i\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-icon  root-eb-icon-g0ocl\"><div class=\"eb-parent-wrapper eb-parent-eb-icon-g0ocl \"><div class=\"eb-icon-wrapper eb-icon-g0ocl eb-icon-view-stacked eb-icon-shape-circle\" data-id=\"eb-icon-g0ocl\"><div class=\"eb-icon-container\"><i icon=\"fas fa-gears\" class=\"fas fa-gears \"><\/i><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-7ymw7\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-7ymw7 \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-7ymw7 button-1 undefined\" data-id=\"eb-advance-heading-7ymw7\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">Flexible Solutions<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-text  root-eb-text-n29ul\"><div class=\"eb-parent-wrapper eb-parent-eb-text-n29ul \"><div class=\"eb-text-wrapper eb-text-n29ul\" data-id=\"eb-text-n29ul\"><p class=\"eb-text\">We offer security services tailored to businesses of all sizes and across various industries.<\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-l874u\"><div class=\"eb-parent-wrapper eb-parent-eb-column-l874u \"><div class=\"eb-column-wrapper eb-column-l874u\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-icon  root-eb-icon-nvcs7\"><div class=\"eb-parent-wrapper eb-parent-eb-icon-nvcs7 \"><div class=\"eb-icon-wrapper eb-icon-nvcs7 eb-icon-view-stacked eb-icon-shape-circle\" data-id=\"eb-icon-nvcs7\"><div class=\"eb-icon-container\"><i icon=\"far fa-handshake\" class=\"far fa-handshake \"><\/i><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-1qzhr\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-1qzhr \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-1qzhr button-1 undefined\" data-id=\"eb-advance-heading-1qzhr\"><h2 class=\"eb-ah-title\"><span class=\"first-title\"><strong>Trusted Partner<\/strong><\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-text  root-eb-text-xlmsv\"><div class=\"eb-parent-wrapper eb-parent-eb-text-xlmsv \"><div class=\"eb-text-wrapper eb-text-xlmsv\" data-id=\"eb-text-xlmsv\"><p class=\"eb-text\">We are a strategic partner of leading global cybersecurity providers, ensuring you receive the most effective and optimized solutions.<\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-dtprp\"><div class=\"eb-parent-wrapper eb-parent-eb-column-dtprp \"><div class=\"eb-column-wrapper eb-column-dtprp\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-icon  root-eb-icon-yzdk0\"><div class=\"eb-parent-wrapper eb-parent-eb-icon-yzdk0 \"><div class=\"eb-icon-wrapper eb-icon-yzdk0 eb-icon-view-stacked eb-icon-shape-circle\" data-id=\"eb-icon-yzdk0\"><div class=\"eb-icon-container\"><i icon=\"fas fa-list-check\" class=\"fas fa-list-check \"><\/i><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-vzrex\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-vzrex \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-vzrex button-1 undefined\" data-id=\"eb-advance-heading-vzrex\"><h2 class=\"eb-ah-title\"><span class=\"first-title\"><strong>International Standards Compliance<\/strong><\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-text  root-eb-text-4mepj\"><div class=\"eb-parent-wrapper eb-parent-eb-text-4mepj \"><div class=\"eb-text-wrapper eb-text-4mepj\" data-id=\"eb-text-4mepj\"><p class=\"eb-text\">We are committed to adhering to global security standards such as ISO 27001, NIST, and GDPR.<\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-xd3m2\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-xd3m2 \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-xd3m2 button-1 undefined\" data-id=\"eb-advance-heading-xd3m2\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">Let VACIF Help You Secure Your Business<\/span><\/h2><\/div><\/div><\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d932b1c7a9c4c27f986005c53c4fb097\">Don&#8217;t let cyber threats hinder your business growth. Let us help you protect your digital assets, maintain stability, and ensure sustainable development in today&#8217;s digital environment.<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-wrapper  root-eb-wrapper-x8h5t\"><div class=\"eb-parent-wrapper eb-parent-eb-wrapper-x8h5t \"><div class=\"eb-wrapper-outer eb-wrapper-x8h5t\"><div class=\"eb-wrapper-inner\"><div class=\"eb-wrapper-inner-blocks eb-wrapper-align-center\">\n<div class=\"wp-block-essential-blocks-row  root-eb-row-scdmw\"><div class=\"eb-parent-wrapper eb-parent-eb-row-scdmw \"><div class=\"eb-row-root-container eb-row-scdmw\" data-id=\"eb-row-scdmw\"><div class=\"eb-row-wrapper\"><div class=\"eb-row-inner\">\n<div class=\"wp-block-essential-blocks-column  root-eb-column-2ye5l\"><div class=\"eb-parent-wrapper eb-parent-eb-column-2ye5l \"><div class=\"eb-column-wrapper eb-column-2ye5l\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-icon  root-eb-icon-5etpg\"><div class=\"eb-parent-wrapper eb-parent-eb-icon-5etpg \"><div class=\"eb-icon-wrapper eb-icon-5etpg eb-icon-view-default\" data-id=\"eb-icon-5etpg\"><div class=\"eb-icon-container\"><i icon=\"fas fa-phone\" class=\"fas fa-phone \"><\/i><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-essential-blocks-column  root-eb-column-y0f3u\"><div class=\"eb-parent-wrapper eb-parent-eb-column-y0f3u \"><div class=\"eb-column-wrapper eb-column-y0f3u\"><div class=\"eb-column-inner\">\n<div class=\"wp-block-essential-blocks-text  root-eb-text-oe84d\"><div class=\"eb-parent-wrapper eb-parent-eb-text-oe84d \"><div class=\"eb-text-wrapper eb-text-oe84d\" data-id=\"eb-text-oe84d\"><p class=\"eb-text\"><strong>Contact VACIF today<\/strong> for a free consultation on the right security solution for your business!<\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the digital era, information security has become a critical factor for every business. With the rising threats from hackers and cybercriminals, protecting data and IT systems is a top priority. We provide comprehensive security services to help your business maintain stability and safety, minimizing risks during operations. We offer a multi-layered security solution tailored [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":25211,"parent":792,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","ocean_post_layout":"right-sidebar","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"enable","ocean_disable_heading":"enable","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":25211,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-22653","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/pages\/22653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/comments?post=22653"}],"version-history":[{"count":5,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/pages\/22653\/revisions"}],"predecessor-version":[{"id":26629,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/pages\/22653\/revisions\/26629"}],"up":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/pages\/792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/media\/25211"}],"wp:attachment":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/media?parent=22653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}