{"id":113386,"date":"2023-12-14T17:27:47","date_gmt":"2023-12-14T17:27:47","guid":{"rendered":"https:\/\/crtech.devcherryroad.com\/?page_id=113386"},"modified":"2024-12-17T17:46:47","modified_gmt":"2024-12-17T17:46:47","slug":"security-services","status":"publish","type":"page","link":"https:\/\/devcherryroad.com\/cherryroad\/services\/infrastructure-as-a-service\/security-services\/","title":{"rendered":"Security Services"},"content":{"rendered":"\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-4b04a9e\" data-block-id=\"4b04a9e\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-4b04a9e-column alignfull\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-e6acc2c\" data-v=\"4\" data-block-id=\"e6acc2c\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-e6acc2c-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-e6acc2c-inner-blocks\">\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-99afedd stk-block-background stk--has-background-overlay\" data-block-id=\"99afedd\"><style>.stk-99afedd{background-color:#000000 !important;background-image:url(https:\/\/devcherryroad.com\/cherryroad\/wp-content\/uploads\/sites\/27\/2024\/09\/logme-1.jpg) !important;min-height:300px !important;align-items:center !important;margin-bottom:50px !important;display:flex !important}.stk-99afedd:before{background-color:#000000 !important;opacity:0.6 !important}.stk-99afedd-column{--stk-columns-spacing:20px !important;--stk-column-gap:20px !important;row-gap:20px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-99afedd-column alignfull\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-517f534\" data-v=\"4\" data-block-id=\"517f534\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-517f534-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-517f534-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-9291669\" id=\"security-services\" data-block-id=\"9291669\"><style>.stk-9291669 .stk-block-heading__text{color:var(--theme-palette-color-8,#ffffff) !important}<\/style><h2 class=\"stk-block-heading__text has-text-color has-text-align-center\">Security Services<\/h2><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-3cac243\" data-block-id=\"3cac243\"><style>.stk-3cac243{margin-bottom:100px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-3cac243-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-2797607\" data-v=\"4\" data-block-id=\"2797607\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-2797607-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-2797607-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-5542285\" id=\"protecting-your-enterprise-with-expert-it-security-services\" data-block-id=\"5542285\"><h2 class=\"stk-block-heading__text has-text-align-center\">Protecting Your Enterprise With Expert IT Security Services<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-809d9dd\" data-block-id=\"809d9dd\"><p class=\"stk-block-text__text has-text-align-center\">Cyber threats and attacks are dramatically rising, making IT security services the number-one strategic priority in state and local government organizations. At the same time, public sector CIOs face inadequate budgets and resources as well as the need to comply with expanding regulations.<\/p><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-ca51495\" data-block-id=\"ca51495\"><style>.stk-ca51495{margin-bottom:100px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-ca51495-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-b819ec7\" data-v=\"4\" data-block-id=\"b819ec7\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-b819ec7-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-b819ec7-inner-blocks\">\n<div class=\"wp-block-stackable-image stk-block-image stk-block stk-8a08e9f\" data-block-id=\"8a08e9f\"><style>.stk-8a08e9f .stk-img-wrapper{width:62% !important;height:323px !important}<\/style><figure><span class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-113387\" src=\"https:\/\/devcherryroad.com\/cherryroad\/wp-content\/uploads\/sites\/27\/2023\/12\/security-img-min.jpeg\" width=\"600\" height=\"500\" alt=\"security-img-min\" srcset=\"https:\/\/devcherryroad.com\/cherryroad\/wp-content\/uploads\/sites\/27\/2023\/12\/security-img-min.jpeg 600w, https:\/\/devcherryroad.com\/cherryroad\/wp-content\/uploads\/sites\/27\/2023\/12\/security-img-min-300x250.jpeg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/span><\/figure><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-96789d2\" data-v=\"4\" data-block-id=\"96789d2\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-96789d2-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-96789d2-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-8ec4fc7\" data-block-id=\"8ec4fc7\"><p class=\"stk-block-text__text\">CherryRoad\u2019s experts deliver cost-effective comprehensive security services that enable our clients to protect stakeholder data as well as their information assets, infrastructure, and services.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-246a5d0\" data-block-id=\"246a5d0\"><p class=\"stk-block-text__text\">Often we first help clients with an Enterprise Security Assessment in which we uncover vulnerabilities in network penetration, applications, user security awareness, disaster recovery, firewall and border security, web and email content filtering, directory configuration, and proprietary information.<\/p><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-acba851\" data-block-id=\"acba851\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-acba851-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-dc99018\" data-v=\"4\" data-block-id=\"dc99018\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-dc99018-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-dc99018-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-dc9604e\" data-block-id=\"dc9604e\"><p class=\"stk-block-text__text\">With a fact-based remediation strategy to maximize both the security of your environment and the cost-effectiveness of protecting it, CherryRoad delivers security services to effectively mitigate network penetration, data breaches, loss of services, and numerous other risks. Our integrated and scalable security services span:<\/p><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Comprehensive penetration testing<\/li>\n\n\n\n<li>Compliance and audit<\/li>\n\n\n\n<li>Vulnerability assessment<\/li>\n\n\n\n<li>Secure code review<\/li>\n\n\n\n<li>Digital forensics and incident response<\/li>\n\n\n\n<li>Managed security services<\/li>\n\n\n\n<li>Education and training<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security Services Protecting Your Enterprise With Expert IT Security Services Cyber threats and attacks are dramatically rising, making IT security services the number-one strategic priority in state and local government organizations. At the same time, public sector CIOs face inadequate budgets and resources as well as the need to comply with expanding regulations. CherryRoad\u2019s experts [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":113360,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_gspb_post_css":"","footnotes":""},"class_list":["post-113386","page","type-page","status-publish","hentry"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages\/113386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/comments?post=113386"}],"version-history":[{"count":1,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages\/113386\/revisions"}],"predecessor-version":[{"id":114448,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages\/113386\/revisions\/114448"}],"up":[{"embeddable":true,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages\/113360"}],"wp:attachment":[{"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/media?parent=113386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}