{"id":1459,"date":"2024-08-17T18:45:05","date_gmt":"2024-08-17T18:45:05","guid":{"rendered":"https:\/\/wp.pureit.pw\/gloex\/?page_id=1459"},"modified":"2024-08-28T16:30:22","modified_gmt":"2024-08-28T16:30:22","slug":"projects","status":"publish","type":"page","link":"https:\/\/wp.pureit.top\/sybex\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1459\" class=\"elementor elementor-1459\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7095b76 e-flex e-con-boxed e-con e-parent\" data-id=\"7095b76\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2b23b7d e-con-full e-flex e-con e-child\" data-id=\"2b23b7d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6629c07 elementor-widget elementor-widget-sectiontitle\" data-id=\"6629c07\" data-element_type=\"widget\" data-widget_type=\"sectiontitle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"section-title style-one t_left\">\r\n                 \r\n                        <h5>Case Study<\/h5>\r\n                \t\t\t\t\r\n\t\t\t\t  \r\n                       <h1 class=\"text-anime-style-3\">Powerful Cyber Security Operation Center <\/h1>\r\n                \t\t\t\t\r\n                \t\t\t<\/div>\t\r\n\r\n\t\t\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37bae8f e-con-full e-flex e-con e-child\" data-id=\"37bae8f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2a41b0 elementor-widget elementor-widget-heading\" data-id=\"d2a41b0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Modern consumers heavily rely on digital platforms to research products before making purchasing decisions. Studies show that 51% of consumers use Google to research brands.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d222c3 e-flex e-con-boxed e-con e-parent\" data-id=\"3d222c3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d2814 elementor-widget elementor-widget-pureitportfolio\" data-id=\"91d2814\" data-element_type=\"widget\" data-widget_type=\"pureitportfolio.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"port_list owl-carousel owl-loaded\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"single_protfolio\">\r\n\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<div class=\"prot_thumb\">\r\n\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1300\" height=\"800\" src=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-5.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-5.jpg 1300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-5-300x185.jpg 300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-5-1024x630.jpg 1024w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-5-768x473.jpg 768w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-5-570x350.jpg 570w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\r\n\t\t\t\t\t\t\t\t<div class=\"prot_main-content\">\r\n\t\t\t\t\t\t\t\t\t<a class=\"port__title\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/property-simplified\/\">Cyber Security Protects Sensitive Network Data<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"category-item\">\r\n\t\t\t\t\t\t\t\t\t\t\tcyber security\t\t\t\t\t\t\t\t\t\t<\/p>\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"prot_icon\">\r\n\t\t\t\t\t\t\t\t<a class=\"port__icon\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/property-simplified\/\"> <i class=\"fa-regular fa-arrow-right\"><\/i> <\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t\t\t<\/div>\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div><!-- .single_protfolio -->\r\n\t\t\t\t<\/div><!-- .grid-item .col-xs-12 .col-sm-6 -->\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"single_protfolio\">\r\n\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<div class=\"prot_thumb\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1300\" height=\"800\" src=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-6.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-6.jpg 1300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-6-300x185.jpg 300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-6-1024x630.jpg 1024w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-6-768x473.jpg 768w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-6-570x350.jpg 570w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\r\n\t\t\t\t\t\t\t\t<div class=\"prot_main-content\">\r\n\t\t\t\t\t\t\t\t\t<a class=\"port__title\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/data-management\/\">The Road To Recovery After A Cyber Data Hijack<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"category-item\">\r\n\t\t\t\t\t\t\t\t\t\t\tcyber security\t\t\t\t\t\t\t\t\t\t<\/p>\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"prot_icon\">\r\n\t\t\t\t\t\t\t\t<a class=\"port__icon\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/data-management\/\"> <i class=\"fa-regular fa-arrow-right\"><\/i> <\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t\t\t<\/div>\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div><!-- .single_protfolio -->\r\n\t\t\t\t<\/div><!-- .grid-item .col-xs-12 .col-sm-6 -->\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"single_protfolio\">\r\n\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<div class=\"prot_thumb\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1300\" height=\"800\" src=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2.jpg 1300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2-300x185.jpg 300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2-1024x630.jpg 1024w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2-768x473.jpg 768w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2-570x350.jpg 570w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\r\n\t\t\t\t\t\t\t\t<div class=\"prot_main-content\">\r\n\t\t\t\t\t\t\t\t\t<a class=\"port__title\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/propertinternal-networking\/\">The Steps to Gaining Privileged Access Security<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"category-item\">\r\n\t\t\t\t\t\t\t\t\t\t\tcyber security\t\t\t\t\t\t\t\t\t\t<\/p>\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"prot_icon\">\r\n\t\t\t\t\t\t\t\t<a class=\"port__icon\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/propertinternal-networking\/\"> <i class=\"fa-regular fa-arrow-right\"><\/i> <\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t\t\t<\/div>\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div><!-- .single_protfolio -->\r\n\t\t\t\t<\/div><!-- .grid-item .col-xs-12 .col-sm-6 -->\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"single_protfolio\">\r\n\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<div class=\"prot_thumb\">\r\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"800\" src=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-4.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-4.jpg 1300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-4-300x185.jpg 300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-4-1024x630.jpg 1024w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-4-768x473.jpg 768w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-4-570x350.jpg 570w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\r\n\t\t\t\t\t\t\t\t<div class=\"prot_main-content\">\r\n\t\t\t\t\t\t\t\t\t<a class=\"port__title\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/warranty-management\/\">Enhance Trust, Compliance, And Governance<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"category-item\">\r\n\t\t\t\t\t\t\t\t\t\t\tcyber security\t\t\t\t\t\t\t\t\t\t<\/p>\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"prot_icon\">\r\n\t\t\t\t\t\t\t\t<a class=\"port__icon\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/warranty-management\/\"> <i class=\"fa-regular fa-arrow-right\"><\/i> <\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t\t\t<\/div>\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div><!-- .single_protfolio -->\r\n\t\t\t\t<\/div><!-- .grid-item .col-xs-12 .col-sm-6 -->\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"single_protfolio\">\r\n\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<div class=\"prot_thumb\">\r\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"800\" src=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-3.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-3.jpg 1300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-3-300x185.jpg 300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-3-1024x630.jpg 1024w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-3-768x473.jpg 768w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-3-570x350.jpg 570w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\r\n\t\t\t\t\t\t\t\t<div class=\"prot_main-content\">\r\n\t\t\t\t\t\t\t\t\t<a class=\"port__title\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/research-energy\/\">Cyber Security Protects Sensitive Network Data<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"category-item\">\r\n\t\t\t\t\t\t\t\t\t\t\tcyber security\t\t\t\t\t\t\t\t\t\t<\/p>\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"prot_icon\">\r\n\t\t\t\t\t\t\t\t<a class=\"port__icon\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/research-energy\/\"> <i class=\"fa-regular fa-arrow-right\"><\/i> <\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t\t\t<\/div>\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div><!-- .single_protfolio -->\r\n\t\t\t\t<\/div><!-- .grid-item .col-xs-12 .col-sm-6 -->\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"single_protfolio\">\r\n\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<div class=\"prot_thumb\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1300\" height=\"800\" src=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2.jpg 1300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2-300x185.jpg 300w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2-1024x630.jpg 1024w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2-768x473.jpg 768w, https:\/\/wp.pureit.top\/sybex\/wp-content\/uploads\/2024\/08\/portpolio-2-570x350.jpg 570w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\r\n\t\t\t\t\t\t\t\t<div class=\"prot_main-content\">\r\n\t\t\t\t\t\t\t\t\t<a class=\"port__title\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/firewall-advance\/\">The Road To Recovery After A Cyber Data Hijack<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"category-item\">\r\n\t\t\t\t\t\t\t\t\t\t\tcyber security\t\t\t\t\t\t\t\t\t\t<\/p>\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"prot_icon\">\r\n\t\t\t\t\t\t\t\t<a class=\"port__icon\" href=\"https:\/\/wp.pureit.top\/sybex\/portfolios\/firewall-advance\/\"> <i class=\"fa-regular fa-arrow-right\"><\/i> <\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t\t\t<\/div>\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div><!-- .single_protfolio -->\r\n\t\t\t\t<\/div><!-- .grid-item .col-xs-12 .col-sm-6 -->\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n            <script>\r\n            \tjQuery(document).ready(function($) {\r\n            \t\t\"use strict\";\r\n            \t\t$('.port_list').owlCarousel({\r\n            \t\tloop: true,\r\n            \t\tautoplay: false,\r\n\t\t\t\t\tdotsEach:true,\r\n            \t\tautoplayTimeout: 10000,\r\n            \t\tdots: true,\r\n\t\t\t\t\tcenter:false,\r\n            \t\tnav: true,\r\n\t\t\t\t\tmargin:20,\r\n            \t\tnavText: [\"<i class='flaticon flaticon-back'><\/i>\", \"<i class='flaticon flaticon-next'><\/i>\"],\r\n            \t\tresponsive: {\r\n            \t\t\t0: {\r\n            \t\t\t\titems: 1\r\n            \t\t\t},\r\n            \t\t\t768: {\r\n            \t\t\t\titems: 1\r\n            \t\t\t},\r\n            \t\t\t992: {\r\n            \t\t\t\titems: 2\r\n            \t\t\t},\r\n            \t\t\t1000: {\r\n            \t\t\t\titems: 2\r\n            \t\t\t},\r\n            \t\t\t1920: {\r\n            \t\t\t\titems: 3,\r\n            \t\t\t}\r\n            \t\t}\r\n            \t})\r\n            \t});\r\n            <\/script>\t\r\n\r\n\r\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee0d4d2 e-flex e-con-boxed e-con e-parent\" data-id=\"ee0d4d2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c2e22f e-con-full e-flex e-con e-child\" data-id=\"3c2e22f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-304895c elementor-widget elementor-widget-heading\" data-id=\"304895c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Let\u2019s Talk About How Can Help<br> You Securely Advance<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-920e0d3 elementor-widget elementor-widget-pureit-button\" data-id=\"920e0d3\" data-element_type=\"widget\" data-widget_type=\"pureit-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t\r\n\t\t\t\t<div class=\"pureit-button-box style1\">\r\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"pi__btn__one\" href=\"#\">\r\n\t\t\t\t\t\t\t<span>Discover More<\/span>\r\n\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\r\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Case Study Powerful Cyber Security Operation Center Modern consumers heavily rely on digital platforms to research products before making purchasing decisions. Studies show that 51% of consumers use Google to research brands. Cyber Security Protects Sensitive Network Data cyber security The Road To Recovery After A Cyber Data Hijack cyber security The Steps to Gaining [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-default.php","meta":{"footnotes":""},"class_list":["post-1459","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wp.pureit.top\/sybex\/wp-json\/wp\/v2\/pages\/1459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.pureit.top\/sybex\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wp.pureit.top\/sybex\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wp.pureit.top\/sybex\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.pureit.top\/sybex\/wp-json\/wp\/v2\/comments?post=1459"}],"version-history":[{"count":0,"href":"https:\/\/wp.pureit.top\/sybex\/wp-json\/wp\/v2\/pages\/1459\/revisions"}],"wp:attachment":[{"href":"https:\/\/wp.pureit.top\/sybex\/wp-json\/wp\/v2\/media?parent=1459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}