{"id":91,"date":"2020-02-03T22:00:36","date_gmt":"2020-02-03T22:00:36","guid":{"rendered":"https:\/\/import.brothersthemes.com\/nur\/?post_type=service&#038;p=91"},"modified":"2021-03-09T23:09:21","modified_gmt":"2021-03-09T23:09:21","slug":"vuln-assessment-remediation","status":"publish","type":"service","link":"https:\/\/www.computerdojo.com\/www\/index.php\/service\/vuln-assessment-remediation\/","title":{"rendered":"Vulnerability Assessment &#038; Remediation"},"content":{"rendered":"<p>[vc_section][vc_row][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_wp_custommenu title=&#8221;Services&#8221; nav_menu=&#8221;37&#8243;][\/vc_column][vc_column offset=&#8221;vc_col-md-8&#8243;][vc_single_image source=&#8221;featured_image&#8221; img_size=&#8221;medium&#8221;][vc_column_text]<\/p>\n<ul>\n<li><strong>Vulnerability Assessment &amp; Remediation<br \/>\n<\/strong>We use industry-leading tools combined with strong experience to provide extensive vulnerability assessment and remediation services to organizations of all sizes. Even for those companies with their own in-house IT personnel, regular assessment and remediation of internal and external network and endpoint vulnerabilities adds huge value to business operations in the modern enterprise, and we often partner with existing IT teams to teach them the necessary applications and skill sets required to add vulnerability management to their ongoing IT operations.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_section][vc_row][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_wp_custommenu title=&#8221;Services&#8221; nav_menu=&#8221;37&#8243;][\/vc_column][vc_column offset=&#8221;vc_col-md-8&#8243;][vc_single_image source=&#8221;featured_image&#8221; img_size=&#8221;medium&#8221;][vc_column_text] Vulnerability Assessment &amp; Remediation We use industry-leading tools combined with strong experience to provide extensive vulnerability assessment and remediation services to organizations of all sizes. Even for those companies with their own in-house IT personnel, regular assessment and remediation of internal and external network and endpoint [&hellip;]<\/p>\n","protected":false},"featured_media":706,"parent":0,"menu_order":2,"template":"","_links":{"self":[{"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/service\/91"}],"collection":[{"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/types\/service"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/media\/706"}],"wp:attachment":[{"href":"https:\/\/www.computerdojo.com\/www\/index.php\/wp-json\/wp\/v2\/media?parent=91"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}