{"id":1457,"date":"2026-02-19T11:19:29","date_gmt":"2026-02-19T05:49:29","guid":{"rendered":"https:\/\/devcrawlgeek.com\/amx\/?page_id=1457"},"modified":"2026-03-16T15:30:22","modified_gmt":"2026-03-16T10:00:22","slug":"managed-threat-hunting","status":"publish","type":"page","link":"https:\/\/devcrawlgeek.com\/amx\/managed-threat-hunting\/","title":{"rendered":"Managed threat hunting"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1457\" class=\"elementor elementor-1457\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46989d5 e-flex e-con-boxed e-con e-parent\" data-id=\"46989d5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,97C126.7,96.3,0.8,19.8,0,0v100l1000,0V1C1000,19.4,873.3,97.8,500,97z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4402991c e-con-full e-flex e-con e-child\" data-id=\"4402991c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e7da14a elementor-widget elementor-widget-elementskit-heading\" data-id=\"1e7da14a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Managed Threat Hunting<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Proactively Hunt Threats. Eliminate Hidden Risks. Stay Ahead of Attackers.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcba87e e-con-full e-flex e-con e-child\" data-id=\"dcba87e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-704b3d41 elementor-widget elementor-widget-button\" data-id=\"704b3d41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/devcrawlgeek.com\/amx\/contact-us\/#talktoexpert\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk To Security Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1da853af e-flex e-con-boxed e-con e-parent\" data-id=\"1da853af\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f9d230b elementor-widget elementor-widget-elementskit-heading\" data-id=\"2f9d230b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Are <span><span>hidden threats<\/span><\/span> already inside your environment? <\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<div class=\"section-head wow animate__fadeInUp\">\n<div class=\"sub_content\">\n<p>Discover why proactive threat hunting is essential for organisations operating in today\u2019s advanced threat landscape.<\/p>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2863ae43 e-flex e-con-boxed e-con e-parent\" data-id=\"2863ae43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2411cc7b soc-peek-carousel elementor-arrows-position-inside elementor-widget elementor-widget-n-carousel\" data-id=\"2411cc7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Attacks Don\\u2019t Follow Business Hours&quot;,&quot;_id&quot;:&quot;dd47660&quot;},{&quot;slide_title&quot;:&quot;Attackers Move Laterally Undetected&quot;,&quot;_id&quot;:&quot;870ffb3&quot;},{&quot;slide_title&quot;:&quot;Delayed Discovery Increases Impact&quot;,&quot;_id&quot;:&quot;6e4c7b4&quot;},{&quot;slide_title&quot;:&quot;Limited Internal Hunting Capability&quot;,&quot;_id&quot;:&quot;8110a0c&quot;},{&quot;slide_title&quot;:&quot;Compliance and Risk Pressure&quot;,&quot;_id&quot;:&quot;5560f69&quot;}],&quot;slides_to_show&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"polite\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d86ed08 e-flex e-con-boxed e-con e-child\" data-id=\"d86ed08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e881576 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"6e881576\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/1-2.png\" class=\"attachment-full size-full wp-image-1523\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/1-2.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/1-2-300x300.png 300w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/1-2-1024x1024.png 1024w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/1-2-150x150.png 150w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/1-2-768x768.png 768w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/1-2-1536x1536.png 1536w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/1-2-2048x2048.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Attacks Don\u2019t Follow Business Hours<\/h3><p class=\"elementor-image-box-description\">Cybercriminals strike when teams are offline, allowing attacks to go unnoticed for hours or days.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34e7313 e-flex e-con-boxed e-con e-child\" data-id=\"34e7313\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40af39bc elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"40af39bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/2-2.png\" class=\"attachment-full size-full wp-image-1524\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/2-2.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/2-2-300x300.png 300w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/2-2-1024x1024.png 1024w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/2-2-150x150.png 150w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/2-2-768x768.png 768w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/2-2-1536x1536.png 1536w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/2-2-2048x2048.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Attackers Move Laterally Undetected<\/h3><p class=\"elementor-image-box-description\">Once inside, threat actors quietly expand access across systems and accounts.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-239959a5 e-flex e-con-boxed e-con e-child\" data-id=\"239959a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c242bba elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"4c242bba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/3-2.png\" class=\"attachment-full size-full wp-image-1525\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/3-2.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/3-2-300x300.png 300w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/3-2-1024x1024.png 1024w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/3-2-150x150.png 150w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/3-2-768x768.png 768w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/3-2-1536x1536.png 1536w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/3-2-2048x2048.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Delayed Discovery Increases Impact<\/h3><p class=\"elementor-image-box-description\">The longer an attacker remains undetected, the greater the financial and operational damage.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"4\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2420b932 e-flex e-con-boxed e-con e-child\" data-id=\"2420b932\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ece54a2 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"6ece54a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/4-2.png\" class=\"attachment-full size-full wp-image-1526\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/4-2.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/4-2-300x300.png 300w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/4-2-1024x1024.png 1024w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/4-2-150x150.png 150w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/4-2-768x768.png 768w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/4-2-1536x1536.png 1536w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/4-2-2048x2048.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Limited Internal Hunting Capability<\/h3><p class=\"elementor-image-box-description\">Threat hunting requires specialised expertise, analytics skills, and dedicated resources.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"5\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c887158 e-flex e-con-boxed e-con e-child\" data-id=\"7c887158\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c0f1b23 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"4c0f1b23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/5-2.png\" class=\"attachment-full size-full wp-image-1527\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/5-2.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/5-2-300x300.png 300w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/5-2-1024x1024.png 1024w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/5-2-150x150.png 150w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/5-2-768x768.png 768w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/5-2-1536x1536.png 1536w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/5-2-2048x2048.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Rising Sophistication of Cyber Threats<\/h3><p class=\"elementor-image-box-description\">Ransomware groups and APTs continuously evolve tactics, techniques, and procedures.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Previous\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ee42664 e-flex e-con-boxed e-con e-parent\" data-id=\"1ee42664\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1c59cf5e e-con-full e-flex e-con e-child\" data-id=\"1c59cf5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d0afcbf elementor-widget elementor-widget-elementskit-heading\" data-id=\"3d0afcbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Identify What Others Miss<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<div class=\"section-head wow animate__fadeInUp\">\n<div class=\"sub_content\">\n<p>Discover why security operation centers are the heart of modern defense against sophisticated threats.<\/p>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-642d9104 elementor-widget elementor-widget-text-editor\" data-id=\"642d9104\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1480\" data-end=\"1699\">Modern organisations rely on automated alerts, but not all threats generate warnings. Sophisticated adversaries use fileless attacks, credential abuse, and living-off-the-land techniques that blend into normal activity.<\/p><p data-start=\"1701\" data-end=\"1891\">Traditional monitoring focuses on reacting to alerts. Threat hunting goes further\u2014proactively searching for suspicious behaviour, hidden persistence mechanisms, and indicators of compromise.<\/p><p data-start=\"1893\" data-end=\"2223\">AMX Securesoft Managed Threat Hunting provides structured, intelligence-driven investigations across your environment. Using behavioural analytics, threat intelligence, and expert analysis, we uncover stealthy threats, validate risks, and guide containment\u2014helping you reduce attacker dwell time and strengthen overall resilience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d4ceec6 e-con-full e-flex e-con e-child\" data-id=\"4d4ceec6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1334c080 e-flex e-con-boxed e-con e-parent\" data-id=\"1334c080\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a33199 elementor-widget__width-initial elementor-widget elementor-widget-elementskit-heading\" data-id=\"5a33199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">What we do<\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38082c2a e-con-full e-flex e-con e-child\" data-id=\"38082c2a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57818ba9 elementor-arrows-position-inside elementor-widget elementor-widget-n-carousel\" data-id=\"57818ba9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Slide #1&quot;,&quot;_id&quot;:&quot;36b16b0&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;fb1153e&quot;},{&quot;slide_title&quot;:&quot;Slide #4&quot;,&quot;_id&quot;:&quot;edeffb9&quot;},{&quot;slide_title&quot;:&quot;Slide #5&quot;,&quot;_id&quot;:&quot;1d45ad1&quot;},{&quot;slide_title&quot;:&quot;Slide #6&quot;,&quot;_id&quot;:&quot;9278a55&quot;}],&quot;slides_to_show&quot;:&quot;3&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;autoplay_speed&quot;:3000,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c4e4f9e e-flex e-con-boxed e-con e-child\" data-id=\"3c4e4f9e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75328b35 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"75328b35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Continious-Environment-Monitoring.png\" class=\"attachment-full size-full wp-image-1307\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Continious-Environment-Monitoring.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Continious-Environment-Monitoring-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Hypothesis-Driven Hunting<\/h3><p class=\"elementor-image-box-description\">We develop threat scenarios based on real-world intelligence and test your environment against them.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56f5a6bc e-flex e-con-boxed e-con e-child\" data-id=\"56f5a6bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5912dd03 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"5912dd03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Real-Time-Alerting.png\" class=\"attachment-full size-full wp-image-1305\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Real-Time-Alerting.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Real-Time-Alerting-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Behavioural Analysis<\/h3><p class=\"elementor-image-box-description\">User and system behaviour is analysed to detect anomalies beyond rule-based alerts.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b24da21 e-flex e-con-boxed e-con e-child\" data-id=\"1b24da21\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-455cc6f2 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"455cc6f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Threat-Identification.png\" class=\"attachment-full size-full wp-image-1303\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Threat-Identification.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Threat-Identification-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Deep Log &amp; Endpoint Investigation<\/h3><p class=\"elementor-image-box-description\">We examine SIEM, EDR, and network telemetry to uncover hidden attack patterns.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"4\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79fda2c2 e-flex e-con-boxed e-con e-child\" data-id=\"79fda2c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e8198c6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6e8198c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Incident-Escalation.png\" class=\"attachment-full size-full wp-image-1306\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Incident-Escalation.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Incident-Escalation-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Compromise Assessment<\/h3><p class=\"elementor-image-box-description\">Indicators of compromise and suspicious artefacts are identified and validated.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"5\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c316bf1 e-flex e-con-boxed e-con e-child\" data-id=\"7c316bf1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77ef659a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"77ef659a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Security-Visiblity.png\" class=\"attachment-full size-full wp-image-1304\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Security-Visiblity.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Security-Visiblity-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Escalation &amp; Remediation Guidance<\/h3><p class=\"elementor-image-box-description\">Confirmed threats are escalated with clear containment and mitigation recommendations.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Previous\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79f477df e-flex e-con-boxed e-con e-parent\" data-id=\"79f477df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4da0f3a e-con-full e-flex e-con e-child\" data-id=\"4da0f3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5005e619 e-con-full e-flex e-con e-child\" data-id=\"5005e619\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4abea62a elementor-widget elementor-widget-elementskit-heading\" data-id=\"4abea62a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">How it works <span><span>AMX Way<\/span><\/span><\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>AMX Securesoft Managed Security Solutions is a 12-month engagement designed to deliver ongoing security assessments and improvement activities that steadily strengthen your organisation\u2019s security maturity. Over time, as controls and processes improve, recurring weaknesses are reduced and the number of assessment findings typically decreases each quarter.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65cfdc2b e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"65cfdc2b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cb743ce elementor-widget__width-initial elementor-widget-laptop__width-inherit elementor-widget elementor-widget-hotspot\" data-id=\"7cb743ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;hotspot&quot;:[{&quot;hotspot_label&quot;:&quot;Ingest&quot;,&quot;hotspot_custom_size&quot;:&quot;yes&quot;,&quot;hotspot_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;hotspot_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Connect cloud, on-prem, and endpoints to centralize logs and gain complete security visibility across your environment.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:7,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;e7cf948&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Analyze&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;AI\\\/ML correlates events, filters noise, and highlights high-risk activity so real threats surface faster.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:28,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;1d30eeb&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Investigate&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;SOC analysts validate alerts, add context, and reduce false positives with expert-led threat investigation.&lt;\\\/p&gt;&quot;,&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;01bcfeb&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Respond&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Contain incidents quickly and guide remediation steps to stop spread, reduce impact, and restore operations.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:73,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;c9f77bf&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Report&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Monthly reports summarize incidents, trends, and security posture improvements to support leadership decisions and compliance.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:94,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;5d2cc6d&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}],&quot;tooltip_position&quot;:&quot;bottom&quot;,&quot;tooltip_position_laptop&quot;:&quot;bottom&quot;,&quot;tooltip_trigger&quot;:&quot;mouseenter&quot;,&quot;tooltip_trigger_laptop&quot;:&quot;mouseenter&quot;,&quot;hotspot_sequenced_animation&quot;:&quot;no&quot;,&quot;tooltip_animation&quot;:&quot;e-hotspot--fade-in-out&quot;}\" data-widget_type=\"hotspot.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"171\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1024x171.png\" class=\"attachment-large size-large wp-image-1403\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1024x171.png 1024w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-300x50.png 300w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-768x128.png 768w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-e7cf948  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Ingest<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Connect cloud, on-prem, and endpoints to centralize logs and gain complete security visibility across your environment.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-1d30eeb  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Analyze<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>AI\/ML correlates events, filters noise, and highlights high-risk activity so real threats surface faster.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-01bcfeb  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Investigate<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>SOC analysts validate alerts, add context, and reduce false positives with expert-led threat investigation.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-c9f77bf  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Respond<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Contain incidents quickly and guide remediation steps to stop spread, reduce impact, and restore operations.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-5d2cc6d  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Report<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Monthly reports summarize incidents, trends, and security posture improvements to support leadership decisions and compliance.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-492cea34 e-con-full elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"492cea34\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11205db1 elementor-widget__width-initial elementor-widget-laptop__width-initial elementor-widget elementor-widget-hotspot\" data-id=\"11205db1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;hotspot&quot;:[{&quot;hotspot_label&quot;:&quot;Ingest&quot;,&quot;hotspot_custom_size&quot;:&quot;yes&quot;,&quot;hotspot_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:92,&quot;sizes&quot;:[]},&quot;hotspot_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Connect cloud, on-prem, and endpoints to centralize logs and gain complete security visibility across your environment.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:7,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;e7cf948&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:8,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Analyze&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;AI\\\/ML correlates events, filters noise, and highlights high-risk activity so real threats surface faster.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:28,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;1d30eeb&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:29,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Investigate&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;SOC analysts validate alerts, add context, and reduce false positives with expert-led threat investigation.&lt;\\\/p&gt;&quot;,&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;01bcfeb&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Respond&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Contain incidents quickly and guide remediation steps to stop spread, reduce impact, and restore operations.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:73,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;c9f77bf&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:72,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Report&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Monthly reports summarize incidents, trends, and security posture improvements to support leadership decisions and compliance.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:94,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;5d2cc6d&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:93,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}],&quot;tooltip_position&quot;:&quot;bottom&quot;,&quot;tooltip_position_laptop&quot;:&quot;bottom&quot;,&quot;tooltip_trigger&quot;:&quot;mouseenter&quot;,&quot;tooltip_trigger_laptop&quot;:&quot;mouseenter&quot;,&quot;hotspot_sequenced_animation&quot;:&quot;no&quot;,&quot;tooltip_animation&quot;:&quot;e-hotspot--fade-in-out&quot;}\" data-widget_type=\"hotspot.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"171\" height=\"1024\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1-e1770982171191-171x1024.png\" class=\"attachment-large size-large wp-image-1407\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1-e1770982171191-171x1024.png 171w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1-e1770982171191-50x300.png 50w\" sizes=\"(max-width: 171px) 100vw, 171px\" \/>\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-e7cf948  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Ingest<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Connect cloud, on-prem, and endpoints to centralize logs and gain complete security visibility across your environment.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-1d30eeb  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Analyze<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>AI\/ML correlates events, filters noise, and highlights high-risk activity so real threats surface faster.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-01bcfeb  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Investigate<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>SOC analysts validate alerts, add context, and reduce false positives with expert-led threat investigation.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-c9f77bf  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Respond<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Contain incidents quickly and guide remediation steps to stop spread, reduce impact, and restore operations.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-5d2cc6d  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Report<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Monthly reports summarize incidents, trends, and security posture improvements to support leadership decisions and compliance.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75b4bb15 e-flex e-con-boxed e-con e-parent\" data-id=\"75b4bb15\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8220ea6 elementor-widget elementor-widget-elementskit-heading\" data-id=\"8220ea6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \"><span><span>Benefits<\/span><\/span> of our Managed Threat Hunting<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Shut down threats that bypass your preventative controls without hiring a small army. AMX Securesof delivers world-class detection and response at a fraction of the cost of building the capability in-house.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ce4e49 e-grid e-con-boxed e-con e-parent\" data-id=\"7ce4e49\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12b09260 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"12b09260\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-protected-content-v3\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tProactive Risk Reduction\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tThreats are identified before they cause significant impact.\nBy uncovering hidden risks early, your organisation reduces the likelihood of costly breaches, operational disruption, and reputational damage.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ef0b614 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"3ef0b614\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-stopwatch\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tReduced Attacker Dwell Time\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tEarly discovery limits lateral movement and damage.\nShortening the time attackers remain undetected significantly decreases the scope and severity of incidents.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79c216d9 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"79c216d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-hand_shake\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tDetection of Unknown Threats\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tFind sophisticated activity that automated tools may overlook.\nBehavioural analysis and intelligence-driven hunting reveal stealth techniques, fileless attacks, and advanced persistent threats.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67c0a46 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"67c0a46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" viewBox=\"0 0 512 512\"><path d=\"m485.82 257.925c-6.082 0-11.667 2.168-16.024 5.772l-16.33-10.173c-1.27-.791-2.735-1.21-4.23-1.21h-44.058l-11.303-24.872h26.893c4.418 0 8-3.582 8-8v-34.541h16.291c3.352 9.973 12.782 17.179 23.869 17.179 13.884 0 25.179-11.295 25.179-25.18s-11.295-25.18-25.179-25.18c-11.088 0-20.518 7.207-23.869 17.18h-24.291c-4.418 0-8 3.582-8 8v34.541h-26.676c-5.337-7.881-13.883-12.668-24.161-13.325l-30.676-1.96c5.806-18.453 6.22-40.704 1.216-62.35h29.875c3.352 9.973 12.782 17.18 23.869 17.18 13.884 0 25.18-11.295 25.18-25.18s-11.296-25.18-25.18-25.18c-11.087 0-20.518 7.207-23.869 17.18h-34.622c-9.237-25.237-24.942-44.035-44.276-52.962l-1.229-.568c-8.766-4.056-19.674-9.103-30.004-9.616-.264-.013-.529-.013-.793 0-10.33.513-21.238 5.56-30.004 9.616l-1.229.568c-19.333 8.927-35.039 27.725-44.275 52.962h-34.184c-3.352-9.973-12.782-17.18-23.869-17.18-13.884 0-25.18 11.295-25.18 25.18s11.296 25.18 25.18 25.18c11.087 0 20.518-7.207 23.869-17.18h29.436c-5.003 21.646-4.589 43.896 1.216 62.35l-30.676 1.96c-10.278.657-18.824 5.444-24.161 13.325h-30.865l-14.381-8.96c.446-1.873.689-3.824.689-5.832 0-13.884-11.296-25.18-25.18-25.18s-25.18 11.295-25.18 25.18 11.296 25.18 25.18 25.18c6.082 0 11.667-2.168 16.024-5.771l16.33 10.173c1.27.791 2.735 1.21 4.23 1.21h25.371l-15.403 33.892h-44.311c-3.352-9.973-12.782-17.18-23.869-17.18-13.884 0-25.18 11.296-25.18 25.18s11.296 25.18 25.18 25.18c11.087 0 20.518-7.207 23.869-17.18h37.039l-17.534 38.581c-4.639 10.205-3.582 21.638 2.897 31.367 6.25 9.386 16.303 14.769 27.579 14.769h36.663v14.045c0 7.719 6.28 14 13.999 14h130.453v3.357c0 26.777 12.32 49.148 35.63 64.693l56.853 37.918c1.344.896 2.891 1.345 4.438 1.345s3.095-.448 4.439-1.345l56.851-37.918c23.31-15.547 35.63-37.918 35.63-64.693v-71.218c0-2.917-1.587-5.602-4.142-7.008-16.951-9.333-32.245-16.241-46.594-20.947l-11.801-25.966h34.498l14.382 8.96c-.446 1.873-.689 3.824-.689 5.832 0 13.884 11.296 25.18 25.18 25.18s25.18-11.296 25.18-25.18-11.296-25.18-25.18-25.18zm-16.892-90.204c5.062 0 9.179 4.118 9.179 9.18s-4.117 9.18-9.179 9.18-9.18-4.118-9.18-9.18 4.118-9.18 9.18-9.18zm-421.12 38.109c-5.062 0-9.18-4.118-9.18-9.18s4.118-9.18 9.18-9.18 9.18 4.118 9.18 9.18-4.119 9.18-9.18 9.18zm-21.628 72.683c-5.062 0-9.18-4.118-9.18-9.18s4.118-9.18 9.18-9.18 9.18 4.118 9.18 9.18c-.001 5.062-4.119 9.18-9.18 9.18zm360.035-161.885c5.062 0 9.18 4.118 9.18 9.18s-4.118 9.18-9.18 9.18c-5.058 0-9.174-4.113-9.179-9.17 0-.003 0-.006 0-.01s0-.006 0-.01c.005-5.057 4.121-9.17 9.179-9.17zm-268.355 18.359c-5.062 0-9.18-4.118-9.18-9.18s4.118-9.18 9.18-9.18 9.18 4.118 9.18 9.18-4.118 9.18-9.18 9.18zm34.833 239.108v-121.177h198.251v36.289c-19.845 3.999-40.997 12.442-65.657 26.02-2.555 1.406-4.142 4.091-4.142 7.008v51.861h-128.452zm306.293 19.358c0 21.175-9.858 38.943-28.509 51.383l-52.411 34.957-52.414-34.958c-18.649-12.438-28.507-30.206-28.507-51.382v-66.46c22.93-12.286 42.745-19.978 61.774-23.085.008 0 .016.001.024.001.8 0 1.571-.121 2.3-.339 17.959-2.587 35.307-1.066 53.999 4.574.583.254 1.192.445 1.821.555 13.068 4.11 26.818 10.201 41.923 18.294zm-80.92-107.012c-.002 0 .001 0 0 0-3.692 0-7.394.159-11.122.472v-35.996c0-7.719-6.28-14-14-14h-202.252c-7.719 0-13.999 6.28-13.999 14v95.133h-36.663c-6.003 0-10.935-2.641-14.263-7.638-3.397-5.102-3.982-10.741-1.647-15.878l45.349-99.783c2.36-5.193 7.068-8.271 13.257-8.667l41.587-2.657c2.651-.169 5.045-1.644 6.39-3.935s1.464-5.1.319-7.497c-9.606-20.116-9.711-50.027-.266-76.201 7.745-21.462 20.58-37.238 36.139-44.422l1.242-.575c7.372-3.411 16.514-7.64 23.682-8.132 7.168.492 16.31 4.722 23.682 8.132l1.241.574c15.56 7.185 28.395 22.961 36.14 44.423 9.445 26.174 9.341 56.085-.266 76.201-1.145 2.397-1.025 5.206.319 7.497 1.345 2.291 3.738 3.765 6.39 3.935l41.587 2.657c6.188.395 10.896 3.473 13.257 8.667l30.121 66.277c-8.934-1.743-17.608-2.586-26.224-2.587zm107.754 5.844c-5.062 0-9.18-4.118-9.18-9.18s4.118-9.18 9.18-9.18 9.18 4.118 9.18 9.18-4.118 9.18-9.18 9.18zm-234.001-2.639c-13.157 0-23.862 10.704-23.862 23.861s10.705 23.861 23.862 23.861 23.861-10.704 23.861-23.861-10.703-23.861-23.861-23.861zm0 31.722c-4.335 0-7.862-3.526-7.862-7.861s3.527-7.861 7.862-7.861 7.861 3.526 7.861 7.861-3.526 7.861-7.861 7.861zm165.28 22.383c0-21.522-17.51-39.032-39.032-39.032s-39.032 17.51-39.032 39.032v8.523c-7.995 1.986-13.945 9.203-13.945 17.803v54.879c0 10.125 8.237 18.363 18.363 18.363h69.229c10.125 0 18.362-8.237 18.362-18.363v-54.879c0-8.6-5.95-15.817-13.944-17.802v-8.524zm-39.033-23.032c12.7 0 23.032 10.332 23.032 23.032v7.963h-2.735v-7.963c0-11.191-9.105-20.296-20.297-20.296s-20.297 9.105-20.297 20.296v7.963h-2.735v-7.963c0-12.7 10.332-23.032 23.032-23.032zm4.297 30.995h-8.594v-7.963c0-2.329 1.968-4.296 4.297-4.296s4.297 1.967 4.297 4.296zm32.68 73.242c0 1.281-1.082 2.363-2.362 2.363h-69.229c-1.281 0-2.363-1.082-2.363-2.363v-54.879c0-1.28 1.082-2.362 2.363-2.362h69.229c1.28 0 2.362 1.082 2.362 2.362zm-36.977-52.922c-11.33 0-20.548 9.218-20.548 20.547 0 8.494 5.181 15.8 12.548 18.926v5.707c0 4.418 3.582 8 8 8s8-3.582 8-8v-5.708c7.366-3.126 12.547-10.432 12.547-18.926 0-11.328-9.217-20.546-20.547-20.546zm0 16c2.507 0 4.547 2.04 4.547 4.547s-2.038 4.546-4.543 4.548c-.001 0-.002 0-.003 0s-.002 0-.003 0c-2.506-.002-4.544-2.041-4.544-4.548-.001-2.507 2.039-4.547 4.546-4.547zm-65.377-254.372c1.159-2.23 1.222-4.883.118-7.166-12.15-25.118-35.416-41.251-60.72-42.104-.18-.006-.359-.006-.539 0-25.303.852-48.568 16.985-60.719 42.103-1.104 2.283-1.042 4.937.118 7.167-1.37 10.241-2.307 25.076 5.583 34.483 2.91 3.47 8.321 7.653 17.573 7.877 13.269.312 21.561-5.559 27.616-9.852 4.304-3.051 6.954-4.831 10.099-5.081 3.145.25 5.795 2.03 10.099 5.081 5.897 4.181 13.914 9.865 26.579 9.865.342 0 .689-.004 1.038-.013 9.251-.224 14.662-4.407 17.572-7.876 7.891-9.406 6.953-24.243 5.583-34.484zm-60.871-33.268c15.24.602 29.596 8.661 39.632 21.753-15.207.088-27.503-.139-39.482-.363-.05-.001-.1-.001-.149-.001s-.1 0-.149.001c-11.98.224-24.274.453-39.482.363 10.036-13.092 24.391-21.152 39.63-21.753zm43.03 57.471c-.744.888-2.146 2.078-5.7 2.164-7.983.192-12.601-3.099-17.977-6.91-5.078-3.6-10.833-7.68-19.006-8.034-.23-.011-.463-.011-.693 0-8.173.354-13.928 4.435-19.005 8.034-5.376 3.811-10.001 7.104-17.977 6.91-3.555-.086-4.956-1.276-5.7-2.164-3.306-3.941-3.02-12.8-2.252-19.764 17.942.191 31.82-.065 45.28-.316 10.189.19 20.61.383 32.857.383 3.934 0 8.06-.02 12.423-.067.769 6.964 1.054 15.824-2.25 19.764zm-213.004-74.525c12.041 0 21.837-9.796 21.837-21.837v-24.588c0-12.041-9.797-21.836-21.838-21.836s-21.837 9.796-21.837 21.836v24.588c0 12.041 9.797 21.837 21.838 21.837zm-5.838-46.425c0-3.218 2.619-5.836 5.838-5.836s5.837 2.618 5.837 5.836v24.588c0 3.219-2.619 5.837-5.838 5.837s-5.837-2.618-5.837-5.837zm-48.095 37.935v-52.259c0-4.418 3.582-8 8-8s8 3.582 8 8v52.259c0 4.418-3.582 8-8 8s-8-3.581-8-8zm91.864 0v-52.259c0-4.418 3.582-8 8-8s8 3.582 8 8v52.259c0 4.418-3.582 8-8 8s-8-3.581-8-8zm53.933 8.49c12.041 0 21.837-9.796 21.837-21.837v-24.588c0-12.041-9.796-21.836-21.837-21.836s-21.837 9.796-21.837 21.836v24.588c0 12.041 9.796 21.837 21.837 21.837zm-5.837-46.425c0-3.218 2.618-5.836 5.837-5.836s5.837 2.618 5.837 5.836v24.588c0 3.219-2.618 5.837-5.837 5.837s-5.837-2.618-5.837-5.837zm253.923 46.425c12.041 0 21.837-9.796 21.837-21.837v-24.588c0-12.041-9.797-21.836-21.838-21.836s-21.837 9.796-21.837 21.836v24.588c0 12.041 9.797 21.837 21.838 21.837zm-5.838-46.425c0-3.218 2.619-5.836 5.838-5.836s5.837 2.618 5.837 5.836v24.588c0 3.219-2.619 5.837-5.838 5.837s-5.837-2.618-5.837-5.837zm43.77 37.935v-52.259c0-4.418 3.582-8 8-8s8 3.582 8 8v52.259c0 4.418-3.582 8-8 8s-8-3.581-8-8zm-91.865 0v-52.259c0-4.418 3.582-8 8-8s8 3.582 8 8v52.259c0 4.418-3.582 8-8 8s-8-3.581-8-8zm-37.932 8.49c12.041 0 21.837-9.796 21.837-21.837v-24.588c0-12.041-9.796-21.836-21.837-21.836s-21.837 9.796-21.837 21.836v24.588c0 12.041 9.796 21.837 21.837 21.837zm-5.837-46.425c0-3.218 2.618-5.836 5.837-5.836s5.837 2.618 5.837 5.836v24.588c0 3.219-2.618 5.837-5.837 5.837s-5.837-2.618-5.837-5.837z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tExpert-Led Investigations\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified threat hunters analyse your environment continuously.\nHuman expertise adds contextual analysis and validation beyond automated detection capabilities.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23d86a09 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"23d86a09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Icons\" viewBox=\"0 0 512 512\"><path d=\"m332.12987 70.4805167v119.8288187h-31.1524642v-106.2212493c0-9.17267-7.4203439-16.5930139-16.5930139-16.5930139h-116.1727309c-9.1510363 0-16.5930139 7.4203439-16.5930139 16.5930139v106.2212493h-31.1524642v-119.8288187c0-19.5568247 15.8574696-35.3926607 35.4142943-35.3926607h140.856732c19.5568247 0 35.3926607 15.8358359 35.3926607 35.3926607z\" fill=\"#d3dde9\"><\/path><path d=\"m374.4669341 316.4551816c24.5541992 0 44.4355287 19.9029632 44.4355287 44.4571624 0 24.5325655-19.8813296 44.4355287-44.4355287 44.4355287-24.5325655 0-44.4355287-19.9029632-44.4355287-44.4355287 0-24.5541992 19.9029632-44.4571624 44.4355287-44.4571624z\" fill=\"#4257ff\"><\/path><path d=\"m144.0685013 359.6359583-33.1860278 42.3370642h-32.2125133v-1.254752l32.2125133-41.0823122z\" fill=\"#d3dde9\"><\/path><path d=\"m209.488676 359.6359583h.9951482l-33.2076615 42.3370642h-33.2076614l33.2076614-42.3370642z\" fill=\"#d3dde9\"><\/path><path d=\"m275.8823653 359.6359583-33.1860278 42.3370642h-33.2076615l33.2076615-42.3370642z\" fill=\"#d3dde9\"><\/path><g fill=\"none\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"5.408\"><path d=\"m460.677052 269.2289113v102.0026865c0 31.4553353-14.9272224 61.6126513-39.957362 80.671902l-46.2527558 35.2412251-46.2527558-35.2412251c-16.6579149-12.6989559-28.837663-30.2871179-35.1114231-49.9304773-3.1801474-9.864947-4.8459389-20.227468-4.8459389-30.7414247v-102.0026865h172.4202357\" stroke=\"#00356c\"><\/path><path d=\"m418.9024629 360.912344c0 24.5325655-19.8813296 44.4355287-44.4355287 44.4355287-24.5325655 0-44.4355287-19.9029632-44.4355287-44.4355287 0-24.5541992 19.9029632-44.4571624 44.4355287-44.4571624 24.5541992 0 44.4355287 19.9029632 44.4355287 44.4571624z\" stroke=\"#00356c\"><\/path><path d=\"m356.8355048 362.4050663 10.7519268 10.7519268 24.5325655-24.5109318\" stroke=\"#f9f9f9\"><\/path><path d=\"m120.4661829 190.3093354v-119.8288187c0-19.5568247 15.8574696-35.3926607 35.4142943-35.3926607h140.856732c19.5568247 0 35.3926607 15.8358359 35.3926607 35.3926607v119.8288187\" stroke=\"#00356c\"><\/path><path d=\"m300.9774058 190.3093354v-106.2212493c0-9.17267-7.4203439-16.5930139-16.5930139-16.5930139h-116.1727309c-9.1510363 0-16.5930139 7.4203439-16.5930139 16.5930139v106.2212493\" stroke=\"#00356c\"><\/path><path d=\"m293.1027552 401.9730225h-214.9736364c-7.788116 0-14.1051435-6.3170275-14.1051435-14.1267771v-183.4317664c0-7.788116 6.3170275-14.1051435 14.1051435-14.1051435h296.3378153c7.788116 0 14.1051435 6.3170275 14.1051435 14.1051435v64.8144324\" stroke=\"#00356c\"><\/path><path d=\"m64.0239753 359.6359583h46.8584982 33.1860278 33.2076614 32.2125133.9951482 32.2125133 33.1860278 10.9033624\" stroke=\"#00356c\"><\/path><path d=\"m78.67 400.718 32.212-41.082\" stroke=\"#00356c\"><\/path><path d=\"m110.882 401.973 33.187-42.337\" stroke=\"#00356c\"><\/path><path d=\"m144.069 401.973 33.207-42.337\" stroke=\"#00356c\"><\/path><path d=\"m177.276 401.973 33.208-42.337\" stroke=\"#00356c\"><\/path><path d=\"m177.276 400.718 32.213-41.082\" stroke=\"#00356c\"><\/path><path d=\"m209.489 401.973 33.207-42.337\" stroke=\"#00356c\"><\/path><path d=\"m242.696 401.973 33.186-42.337\" stroke=\"#00356c\"><\/path><\/g><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tStronger Security Posture\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tEach hunt uncovers gaps and improves defensive controls.\nInsights gained from investigations help refine detection rules, strengthen policies, and enhance overall resilience.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-380001cd elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"380001cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-eye3\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tImproved Incident Readiness\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour organisation becomes better prepared for advanced threats.\nProactive assessments improve response planning and ensure faster containment when incidents occur.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42237c01 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"42237c01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" viewBox=\"0 0 500 500\"><path clip-rule=\"evenodd\" d=\"m345.836 290.92 49.603 24.503c.309.153.492.448.492.793s-.183.64-.492.793l-145.048 71.65c-.255.126-.528.126-.783 0l-145.047-71.65c-.309-.153-.493-.448-.493-.793s.183-.64.493-.793l49.603-24.503c.255-.126.528-.126.783 0l94.661 46.76c.255.126.528.126.783 0l94.662-46.76c.255-.126.528-.126.783 0zm-9.118 132.806c-10.627 0-19.242 8.615-19.242 19.242s8.615 19.242 19.242 19.242c11.71 0 20.627-10.34 19.067-21.836-.05-.365.119-.706.439-.887l90.78-51.602c.02-.011.037-.02.057-.03 2.238-1.065 3.785-3.347 3.785-5.991v-263.728h-.019c-.002-2.3-1.206-4.534-3.349-5.751l-91.254-51.871c-.32-.182-.488-.522-.439-.888 1.56-11.496-7.357-21.836-19.067-21.836-10.627 0-19.242 8.615-19.242 19.242 0 16.25 18.837 24.962 31.222 15.057.288-.231.668-.261.989-.079l87.448 49.708c.284.161.447.442.447.768v255.026c0 .327-.163.607-.447.768l-87.448 49.708c-.321.182-.699.153-.988-.077-3.287-2.618-7.451-4.185-11.981-4.185zm-173.436 0c-4.53 0-8.694 1.567-11.982 4.187-.288.23-.667.259-.988.077l-87.448-49.708c-.284-.161-.447-.442-.447-.768v-255.027c0-.327.163-.607.447-.768l87.448-49.708c.321-.182.701-.152.989.079 12.389 9.906 31.222 1.19 31.222-15.057 0-10.627-8.615-19.242-19.242-19.242-11.71 0-20.627 10.34-19.067 21.836.05.365-.119.705-.439.888l-91.254 51.871c-2.143 1.217-3.347 3.451-3.349 5.751h-.018v263.728c0 2.644 1.548 4.926 3.785 5.991.02.01.037.018.057.03l90.779 51.602c.32.182.489.522.439.887-1.56 11.496 7.357 21.836 19.067 21.836 10.627 0 19.242-8.615 19.242-19.242.001-10.628-8.614-19.243-19.241-19.243zm87.109-312.383 145.048 71.65c.309.153.492.448.492.793s-.183.64-.492.793l-145.048 71.65c-.255.126-.528.126-.783 0l-145.047-71.65c-.309-.153-.493-.448-.493-.793s.183-.64.493-.793l145.047-71.65c.255-.126.528-.126.783 0zm95.467 113.373c-.255-.126-.528-.126-.783 0l-94.684 46.771c-.255.126-.528.126-.783 0l-94.683-46.771c-.255-.126-.528-.126-.783 0l-49.581 24.492c-.309.153-.493.448-.493.793s.183.64.493.793l145.047 71.65c.255.126.528.126.783 0l145.048-71.65c.309-.153.492-.448.492-.793s-.183-.64-.492-.793z\" fill-rule=\"evenodd\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tEnhanced Visibility\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tGain deeper insight into attacker behaviour and system activity.\nComprehensive telemetry analysis provides leadership with clearer understanding of risks and trends.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fc4b835 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"4fc4b835\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1_1_\" height=\"512\" viewBox=\"0 0 64 64\" width=\"512\"><path d=\"m2 55.004h1.52c.104.296.225.585.359.868l-1.075 1.075c-.188.188-.293.442-.293.707s.105.52.293.707l2.834 2.834c.375.375 1.039.375 1.414 0l1.076-1.076c.283.135.572.254.867.358v1.523c0 .552.448 1 1 1h4.008c.552 0 1-.448 1-1v-1.525c.294-.104.583-.224.864-.358l1.079 1.079c.188.188.442.293.707.293s.52-.105.707-.293l2.834-2.834c.188-.188.293-.442.293-.707s-.105-.52-.293-.707l-1.08-1.08c.134-.281.253-.569.357-.863h1.529c.552 0 1-.448 1-1v-4.008c0-.552-.448-1-1-1h-1.528c-.104-.294-.223-.582-.357-.863l1.08-1.08c.188-.188.293-.442.293-.707s-.105-.52-.293-.707l-2.834-2.834c-.375-.375-1.039-.375-1.414 0l-1.079 1.079c-.281-.134-.57-.253-.864-.358v-1.527c0-.552-.448-1-1-1h-4.008c-.552 0-1 .448-1 1v1.522c-.295.104-.584.224-.867.358l-1.076-1.076c-.188-.188-.442-.293-.707-.293s-.52.105-.707.293l-2.834 2.834c-.188.188-.293.442-.293.707s.105.52.293.707l1.075 1.075c-.135.284-.255.573-.36.869h-1.52c-.552 0-1 .448-1 1v4.008c0 .552.448 1 1 1zm1-4.008h1.259c.456 0 .854-.309.968-.75.163-.631.413-1.235.743-1.794.232-.393.168-.893-.154-1.215l-.891-.891 1.42-1.42.891.892c.321.322.82.386 1.215.154.559-.329 1.162-.579 1.793-.741.442-.114.75-.512.75-.968v-1.263h2.008v1.264c0 .456.308.854.749.968.632.164 1.234.414 1.792.743.392.231.894.168 1.215-.154l.894-.895 1.42 1.42-.896.896c-.322.322-.386.822-.154 1.215.328.557.577 1.159.74 1.791.114.441.512.75.968.75h1.27v2.008h-1.267c-.456 0-.854.308-.968.75-.163.631-.413 1.234-.74 1.791-.232.393-.168.893.154 1.215l.895.895-1.42 1.42-.894-.897c-.321-.322-.822-.386-1.215-.154-.557.329-1.16.579-1.792.743-.441.114-.749.512-.749.968v1.263h-2.008v-1.262c0-.456-.309-.854-.75-.968-.631-.163-1.235-.412-1.793-.741-.395-.231-.894-.167-1.215.154l-.891.891-1.42-1.42.89-.89c.323-.322.386-.822.154-1.215-.33-.56-.58-1.163-.743-1.794-.114-.441-.512-.75-.968-.75h-1.26z\"><\/path><path d=\"m12 57c2.757 0 5-2.243 5-5s-2.243-5-5-5-5 2.243-5 5 2.243 5 5 5zm0-8c1.654 0 3 1.346 3 3s-1.346 3-3 3-3-1.346-3-3 1.346-3 3-3z\"><\/path><path d=\"m62.948 6.266c-.119-.355-.427-.615-.797-.671l-3.618-.552-1.627-3.467c-.165-.352-.518-.576-.906-.576s-.741.224-.905.575l-1.627 3.467-3.618.552c-.371.057-.678.316-.797.671s-.029.748.232 1.016l2.647 2.713-.626 3.844c-.062.378.098.758.411.979.313.22.724.242 1.06.058l3.223-1.782 3.224 1.782c.151.083.318.125.484.125.202 0 .404-.062.576-.183.313-.22.473-.601.411-.979l-.626-3.844 2.647-2.713c.262-.267.351-.659.232-1.015zm-4.664 2.694c-.222.227-.322.546-.271.859l.376 2.309-1.906-1.053c-.15-.083-.317-.125-.484-.125s-.333.042-.484.125l-1.906 1.053.376-2.309c.051-.313-.049-.632-.271-.859l-1.641-1.682 2.222-.339c.33-.051.613-.262.754-.564l.951-2.021.949 2.021c.142.302.425.513.754.564l2.222.339z\"><\/path><path d=\"m47.377 13.076c-.544-.083-1.106.061-1.54.401l-7.846 6.138c.431-.829.63-1.76.55-2.714-.112-1.331-.736-2.538-1.757-3.4s-2.314-1.273-3.646-1.162c-1.331.113-2.538.737-3.4 1.757-.861 1.021-1.274 2.315-1.162 3.646.096 1.128.576 2.153 1.336 2.968-1.164.288-2.191.977-2.88 1.962l-7.879 10.754c-.45.643-.486 1.465-.094 2.145.391.679 1.115 1.057 1.902.995l2.396-.203c.582-.049 1.112-.349 1.439-.804l4.757-6.258.36 4.27-2.363 16.208c-.892.183-1.788.347-2.689.473l.277 1.98c3.138-.439 6.235-1.21 9.204-2.293 5.76-2.1 10.364-5.123 13.914-8.158l.224-.067-.031-.104c3.425-2.962 5.853-5.919 7.364-8.028.193-.27.24-.617.125-.927-.114-.311-.375-.545-.696-.625l-1.542-.386 5.615-3.119 1.326 5.968-1.324-.441c-.431-.144-.902.021-1.151.398l-.166.25c-12.571 19.139-26.545 23.779-36.055 24.301l.109 1.997c9.903-.544 24.394-5.301 37.357-24.807l2.271.757c.341.115.718.035.986-.206s.384-.608.306-.959l-2-9c-.068-.308-.278-.566-.566-.695-.288-.128-.619-.116-.896.038l-9 5c-.359.199-.559.598-.505 1.005.053.407.351.74.749.839l2.545.636c-1.319 1.706-3.14 3.783-5.483 5.892l-1.783-5.981c-.166-.514-.539-.945-1.002-1.172l-4.111-2.141-.643-4.888 9.156-6.976c.847-.644 1.041-1.838.441-2.717l-1.156-1.698c-.308-.454-.798-.764-1.343-.849zm-14.071 1.257c.086-.007.172-.011.258-.011.707 0 1.384.247 1.93.708.612.517.986 1.241 1.054 2.04.067.799-.18 1.576-.697 2.188s-1.241.987-2.04 1.054c-.8.069-1.576-.18-2.188-.697s-.987-1.241-1.054-2.04c-.139-1.649 1.089-3.103 2.737-3.242zm1.359 33.334 2.081-12.009 3.676 1.784 2.173 6.1c-2.317 1.532-4.956 2.953-7.93 4.125zm3.943-23.59c-.285.217-.432.57-.386.926l.786 5.979c.043.323.24.606.53.756l4.588 2.372 2.032 6.817c-.591.482-1.214.96-1.862 1.434l-2.002-5.62c-.184-.466-.532-.843-.98-1.062l-4.887-2.398c-.282-.138-.613-.135-.895.007-.281.143-.478.41-.531.72l-2.502 14.442c-.942.313-1.894.601-2.857.849l2.268-15.551c.011-.076.013-.152.007-.229l-.589-6.975c-.035-.413-.32-.761-.717-.876-.398-.117-.825.026-1.075.355l-6.346 8.349-2.409.22 7.879-10.754c.512-.731 1.316-1.194 2.206-1.27l3.113-.263h.002.001l3.985-.337c.194-.017.379-.089.532-.209l8.572-6.706 1.157 1.698z\"><\/path><path d=\"m4 2h2v2h-2z\"><\/path><path d=\"m6 4h2v2h-2z\"><\/path><path d=\"m2 4h2v2h-2z\"><\/path><path d=\"m4 6h2v2h-2z\"><\/path><path d=\"m12 5h2v2h-2z\"><\/path><path d=\"m14 7h2v2h-2z\"><\/path><path d=\"m10 7h2v2h-2z\"><\/path><path d=\"m12 9h2v2h-2z\"><\/path><path d=\"m58 56h2v2h-2z\"><\/path><path d=\"m60 58h2v2h-2z\"><\/path><path d=\"m56 58h2v2h-2z\"><\/path><path d=\"m58 60h2v2h-2z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tScalable Protection\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tThreat hunting adapts as your infrastructure grows.\nAs your cloud, endpoints, and network footprint expand, the service scales seamlessly to maintain consistent protection.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c750764 e-flex e-con-boxed e-con e-parent\" data-id=\"c750764\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2211916e e-con-full e-flex e-con e-child\" data-id=\"2211916e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66d2a2d9 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-heading\" data-id=\"66d2a2d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-text_left\"><h2 class=\"ekit-heading--title elementskit-section-title \">Frequently Asked <span><span>Questions<\/span><\/span><\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-203269f9 e-con-full e-flex e-con e-child\" data-id=\"203269f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1aa722 elementor-widget elementor-widget-elementskit-accordion\" data-id=\"f1aa722\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69e46917a261c\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-f1aa722\">\n                        <a href=\"#collapse-44e9aab69e46917a261c\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-44e9aab69e46917a261c\" aria-expanded=\"true\" aria-controls=\"Collapse-44e9aab69e46917a261c\">\n                            \n                            <span class=\"ekit-accordion-title\">What is Managed Threat Hunting?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-44e9aab69e46917a261c\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-f1aa722\" data-parent=\"#accordion-69e46917a261c\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>It is a proactive cybersecurity service where experts actively search for hidden threats instead of waiting for alerts.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-f1aa722\">\n                        <a href=\"#collapse-da05be769e46917a261c\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-da05be769e46917a261c\" aria-expanded=\"false\" aria-controls=\"Collapse-da05be769e46917a261c\">\n                            \n                            <span class=\"ekit-accordion-title\">How is this different from security monitoring?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-da05be769e46917a261c\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-f1aa722\" data-parent=\"#accordion-69e46917a261c\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Monitoring reacts to alerts. Threat hunting proactively investigates suspicious behaviour that may not generate alerts.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-f1aa722\">\n                        <a href=\"#collapse-eef760e69e46917a261c\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-eef760e69e46917a261c\" aria-expanded=\"false\" aria-controls=\"Collapse-eef760e69e46917a261c\">\n                            \n                            <span class=\"ekit-accordion-title\">Is this suitable for all organisations?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-eef760e69e46917a261c\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-f1aa722\" data-parent=\"#accordion-69e46917a261c\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Yes. The service scales to businesses of varying sizes and risk levels.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Managed Threat Hunting Proactively Hunt Threats. Eliminate Hidden Risks. Stay Ahead of Attackers. Talk To Security Expert Are hidden threats already inside your environment? Discover why proactive threat hunting is essential for organisations operating in today\u2019s advanced threat landscape. Attacks Don\u2019t Follow Business Hours Cybercriminals strike when teams are offline, allowing attacks to go unnoticed &#8230; <a title=\"Managed threat hunting\" class=\"read-more\" href=\"https:\/\/devcrawlgeek.com\/amx\/managed-threat-hunting\/\" aria-label=\"Read more about Managed threat hunting\">Read more<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1457","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/pages\/1457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/comments?post=1457"}],"version-history":[{"count":52,"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/pages\/1457\/revisions"}],"predecessor-version":[{"id":2632,"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/pages\/1457\/revisions\/2632"}],"wp:attachment":[{"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/media?parent=1457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}