{"id":1463,"date":"2026-02-19T11:45:19","date_gmt":"2026-02-19T06:15:19","guid":{"rendered":"https:\/\/devcrawlgeek.com\/amx\/?page_id=1463"},"modified":"2026-03-16T15:32:13","modified_gmt":"2026-03-16T10:02:13","slug":"threat-intelligence","status":"publish","type":"page","link":"https:\/\/devcrawlgeek.com\/amx\/threat-intelligence\/","title":{"rendered":"Threat Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1463\" class=\"elementor elementor-1463\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-414563a4 e-flex e-con-boxed e-con e-parent\" data-id=\"414563a4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,97C126.7,96.3,0.8,19.8,0,0v100l1000,0V1C1000,19.4,873.3,97.8,500,97z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c264fe7 e-con-full e-flex e-con e-child\" data-id=\"5c264fe7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a8f8b16 elementor-widget elementor-widget-elementskit-heading\" data-id=\"4a8f8b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Threat Intelligence<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Actionable insights. Proactive defence. Intelligence-driven security.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33d8eb02 e-con-full e-flex e-con e-child\" data-id=\"33d8eb02\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7aa14ef elementor-widget elementor-widget-button\" data-id=\"7aa14ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/devcrawlgeek.com\/amx\/contact-us\/#talktoexpert\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk To Security Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23fcc328 e-flex e-con-boxed e-con e-parent\" data-id=\"23fcc328\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58912975 elementor-widget elementor-widget-elementskit-heading\" data-id=\"58912975\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Are you aware of the <span><span>threats targeting<\/span><\/span> your industry right now?  <\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<div class=\"section-head wow animate__fadeInUp\">\n<div class=\"sub_content\">\n<p>Discover why threat intelligence is essential for organisations facing today\u2019s rapidly evolving cyber landscape.<\/p>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-11d99b24 e-flex e-con-boxed e-con e-parent\" data-id=\"11d99b24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-371224a0 soc-peek-carousel elementor-arrows-position-inside elementor-widget elementor-widget-n-carousel\" data-id=\"371224a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Evolving Attack Techniques&quot;,&quot;_id&quot;:&quot;dd47660&quot;},{&quot;slide_title&quot;:&quot;Information Overload&quot;,&quot;_id&quot;:&quot;870ffb3&quot;},{&quot;slide_title&quot;:&quot;Limited Visibility into External Threats&quot;,&quot;_id&quot;:&quot;6e4c7b4&quot;},{&quot;slide_title&quot;:&quot;Delayed Risk Awareness&quot;,&quot;_id&quot;:&quot;8110a0c&quot;},{&quot;slide_title&quot;:&quot;Industry-Specific Targeting&quot;,&quot;_id&quot;:&quot;5560f69&quot;}],&quot;slides_to_show&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"polite\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-354a5501 e-flex e-con-boxed e-con e-child\" data-id=\"354a5501\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7defb5f3 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"7defb5f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Attacks-dont-follow-business-scaled.png\" class=\"attachment-full size-full wp-image-1315\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Attacks-dont-follow-business-scaled.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Attacks-dont-follow-business-300x300.png 300w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Evolving Attack Techniques<\/h3><p class=\"elementor-image-box-description\">Cybercriminals continuously adapt their tactics, making traditional defences insufficient.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c459773 e-flex e-con-boxed e-con e-child\" data-id=\"3c459773\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5da22ff3 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"5da22ff3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Limited-Visiblity-scaled.png\" class=\"attachment-full size-full wp-image-1320\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Limited-Visiblity-scaled.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Limited-Visiblity-300x300.png 300w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Information Overload<\/h3><p class=\"elementor-image-box-description\">Security teams receive large volumes of raw threat data that lack context and prioritisation.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e2cf594 e-flex e-con-boxed e-con e-child\" data-id=\"4e2cf594\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46441418 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"46441418\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Delayed-Threat-Detection-scaled.png\" class=\"attachment-full size-full wp-image-1314\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Delayed-Threat-Detection-scaled.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Delayed-Threat-Detection-300x300.png 300w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Limited Visibility into External Threats<\/h3><p class=\"elementor-image-box-description\">Without intelligence feeds, organisations cannot see risks forming outside their perimeter.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"4\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a42e90 e-flex e-con-boxed e-con e-child\" data-id=\"3a42e90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2725fed8 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"2725fed8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Shortage-of-skilled-analysts-scaled.png\" class=\"attachment-full size-full wp-image-1311\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Shortage-of-skilled-analysts-scaled.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Shortage-of-skilled-analysts-300x300.png 300w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Delayed Risk Awareness<\/h3><p class=\"elementor-image-box-description\">Emerging vulnerabilities and exploit campaigns may remain unnoticed until they are actively weaponised.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"5\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5819b8bb e-flex e-con-boxed e-con e-child\" data-id=\"5819b8bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7218569f elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"7218569f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Compliance-Risk-scaled.png\" class=\"attachment-full size-full wp-image-1313\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Compliance-Risk-scaled.png 2560w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Compliance-Risk-300x300.png 300w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Industry-Specific Targeting<\/h3><p class=\"elementor-image-box-description\">Threat actors increasingly focus on specific sectors with tailored attack strategies.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Previous\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f72fc91 e-flex e-con-boxed e-con e-parent\" data-id=\"2f72fc91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-48003d41 e-con-full e-flex e-con e-child\" data-id=\"48003d41\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-710255b elementor-widget elementor-widget-elementskit-heading\" data-id=\"710255b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Stay Ahead of Emerging Threats<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<div class=\"section-head wow animate__fadeInUp\">\n<div class=\"sub_content\">\n<p>Discover why security operation centers are the heart of modern defense against sophisticated threats.<\/p>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74520d62 elementor-widget elementor-widget-text-editor\" data-id=\"74520d62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1544\" data-end=\"1795\">Modern cyber threats evolve faster than ever. Ransomware groups, nation-state actors, and cybercriminal organisations constantly develop new tools and exploit methods. Relying only on internal alerts leaves organisations reactive rather than prepared.<\/p><p data-start=\"1797\" data-end=\"2042\">Threat intelligence transforms external threat data into meaningful insights. It provides context around attacker behaviour, emerging vulnerabilities, and targeted campaigns\u2014allowing organisations to strengthen defences before being compromised.<\/p><p data-start=\"2044\" data-end=\"2342\">AMX Securesoft Threat Intelligence Service combines global intelligence sources, advanced analytics, and expert analysis to deliver actionable insights. We enrich your security operations with timely information, enabling faster decisions, improved detection accuracy, and stronger risk management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df44683 e-con-full e-flex e-con e-child\" data-id=\"df44683\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-621ca03a e-flex e-con-boxed e-con e-parent\" data-id=\"621ca03a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f961a0a elementor-widget__width-initial elementor-widget elementor-widget-elementskit-heading\" data-id=\"1f961a0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">What we do<\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a9e4c68 e-con-full e-flex e-con e-child\" data-id=\"3a9e4c68\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-abf078a elementor-arrows-position-inside elementor-widget elementor-widget-n-carousel\" data-id=\"abf078a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Slide #1&quot;,&quot;_id&quot;:&quot;36b16b0&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;fb1153e&quot;},{&quot;slide_title&quot;:&quot;Slide #4&quot;,&quot;_id&quot;:&quot;edeffb9&quot;},{&quot;slide_title&quot;:&quot;Slide #5&quot;,&quot;_id&quot;:&quot;1d45ad1&quot;},{&quot;slide_title&quot;:&quot;Slide #6&quot;,&quot;_id&quot;:&quot;9278a55&quot;}],&quot;slides_to_show&quot;:&quot;3&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;autoplay_speed&quot;:3000,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5248d5c4 e-flex e-con-boxed e-con e-child\" data-id=\"5248d5c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-459d8457 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"459d8457\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Continious-Environment-Monitoring.png\" class=\"attachment-full size-full wp-image-1307\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Continious-Environment-Monitoring.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Continious-Environment-Monitoring-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Global Threat Monitoring<\/h3><p class=\"elementor-image-box-description\">We monitor global threat feeds, dark web activity, vulnerability disclosures, and adversary movements.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-746223b8 e-flex e-con-boxed e-con e-child\" data-id=\"746223b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67a463ca elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"67a463ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Real-Time-Alerting.png\" class=\"attachment-full size-full wp-image-1305\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Real-Time-Alerting.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Real-Time-Alerting-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Intelligence Correlation &amp; Enrichment<\/h3><p class=\"elementor-image-box-description\">Threat data is analysed and contextualised to align with your environment and industry.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e519583 e-flex e-con-boxed e-con e-child\" data-id=\"7e519583\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d2f2b28 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3d2f2b28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Threat-Identification.png\" class=\"attachment-full size-full wp-image-1303\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Threat-Identification.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Threat-Identification-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Indicator of Compromise (IOC) Sharing<\/h3><p class=\"elementor-image-box-description\">Relevant IOCs are delivered to enhance detection within your SIEM and EDR systems.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"4\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a61020d e-flex e-con-boxed e-con e-child\" data-id=\"a61020d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33aa8959 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"33aa8959\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Incident-Escalation.png\" class=\"attachment-full size-full wp-image-1306\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Incident-Escalation.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Incident-Escalation-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Adversary &amp; Campaign Tracking<\/h3><p class=\"elementor-image-box-description\">We track attacker groups, tactics, techniques, and procedures (TTPs) targeting your sector.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"5\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 5\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-619e15df e-flex e-con-boxed e-con e-child\" data-id=\"619e15df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36651948 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"36651948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"425\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Security-Visiblity.png\" class=\"attachment-full size-full wp-image-1304\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Security-Visiblity.png 638w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/Security-Visiblity-300x200.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Strategic Intelligence Reporting<\/h3><p class=\"elementor-image-box-description\">Regular reports provide executive-level insights and long-term risk visibility.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Previous\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-429f4cb3 e-flex e-con-boxed e-con e-parent\" data-id=\"429f4cb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-61ef84ed e-con-full e-flex e-con e-child\" data-id=\"61ef84ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-28e88369 e-con-full e-flex e-con e-child\" data-id=\"28e88369\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d463ad0 elementor-widget elementor-widget-elementskit-heading\" data-id=\"2d463ad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">How it works <span><span>AMX Way<\/span><\/span><\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>AMX Securesoft Managed Security Solutions is a 12-month engagement designed to deliver ongoing security assessments and improvement activities that steadily strengthen your organisation\u2019s security maturity. Over time, as controls and processes improve, recurring weaknesses are reduced and the number of assessment findings typically decreases each quarter.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4121223a e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"4121223a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2635bd elementor-widget__width-initial elementor-widget-laptop__width-inherit elementor-widget elementor-widget-hotspot\" data-id=\"a2635bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;hotspot&quot;:[{&quot;hotspot_label&quot;:&quot;Ingest&quot;,&quot;hotspot_custom_size&quot;:&quot;yes&quot;,&quot;hotspot_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;hotspot_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Connect cloud, on-prem, and endpoints to centralize logs and gain complete security visibility across your environment.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:7,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;e7cf948&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Analyze&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;AI\\\/ML correlates events, filters noise, and highlights high-risk activity so real threats surface faster.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:28,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;1d30eeb&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Investigate&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;SOC analysts validate alerts, add context, and reduce false positives with expert-led threat investigation.&lt;\\\/p&gt;&quot;,&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;01bcfeb&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Respond&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Contain incidents quickly and guide remediation steps to stop spread, reduce impact, and restore operations.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:73,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;c9f77bf&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Report&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Monthly reports summarize incidents, trends, and security posture improvements to support leadership decisions and compliance.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:94,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;5d2cc6d&quot;,&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}],&quot;tooltip_position&quot;:&quot;bottom&quot;,&quot;tooltip_position_laptop&quot;:&quot;bottom&quot;,&quot;tooltip_trigger&quot;:&quot;mouseenter&quot;,&quot;tooltip_trigger_laptop&quot;:&quot;mouseenter&quot;,&quot;hotspot_sequenced_animation&quot;:&quot;no&quot;,&quot;tooltip_animation&quot;:&quot;e-hotspot--fade-in-out&quot;}\" data-widget_type=\"hotspot.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"171\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1024x171.png\" class=\"attachment-large size-large wp-image-1403\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1024x171.png 1024w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-300x50.png 300w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-768x128.png 768w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-e7cf948  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Ingest<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Connect cloud, on-prem, and endpoints to centralize logs and gain complete security visibility across your environment.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-1d30eeb  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Analyze<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>AI\/ML correlates events, filters noise, and highlights high-risk activity so real threats surface faster.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-01bcfeb  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Investigate<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>SOC analysts validate alerts, add context, and reduce false positives with expert-led threat investigation.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-c9f77bf  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Respond<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Contain incidents quickly and guide remediation steps to stop spread, reduce impact, and restore operations.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-5d2cc6d  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Report<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Monthly reports summarize incidents, trends, and security posture improvements to support leadership decisions and compliance.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e08e4a7 e-con-full elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"7e08e4a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28dd25e1 elementor-widget__width-initial elementor-widget-laptop__width-initial elementor-widget elementor-widget-hotspot\" data-id=\"28dd25e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;hotspot&quot;:[{&quot;hotspot_label&quot;:&quot;Ingest&quot;,&quot;hotspot_custom_size&quot;:&quot;yes&quot;,&quot;hotspot_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:92,&quot;sizes&quot;:[]},&quot;hotspot_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Connect cloud, on-prem, and endpoints to centralize logs and gain complete security visibility across your environment.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:7,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;e7cf948&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:8,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Analyze&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;AI\\\/ML correlates events, filters noise, and highlights high-risk activity so real threats surface faster.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:28,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;1d30eeb&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:29,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Investigate&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;SOC analysts validate alerts, add context, and reduce false positives with expert-led threat investigation.&lt;\\\/p&gt;&quot;,&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;01bcfeb&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Respond&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Contain incidents quickly and guide remediation steps to stop spread, reduce impact, and restore operations.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:73,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;c9f77bf&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:72,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}},{&quot;hotspot_label&quot;:&quot;Report&quot;,&quot;hotspot_tooltip_content&quot;:&quot;&lt;p&gt;Monthly reports summarize incidents, trends, and security posture improvements to support leadership decisions and compliance.&lt;\\\/p&gt;&quot;,&quot;hotspot_offset_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:94,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_position&quot;:&quot;yes&quot;,&quot;hotspot_tooltip_text_wrap&quot;:&quot;yes&quot;,&quot;_id&quot;:&quot;5d2cc6d&quot;,&quot;hotspot_offset_x_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:93,&quot;sizes&quot;:[]},&quot;hotspot_link&quot;:{&quot;url&quot;:&quot;&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;hotspot_icon&quot;:{&quot;value&quot;:&quot;&quot;,&quot;library&quot;:&quot;&quot;},&quot;hotspot_custom_size&quot;:&quot;no&quot;,&quot;hotspot_horizontal&quot;:&quot;left&quot;,&quot;hotspot_vertical&quot;:&quot;top&quot;,&quot;hotspot_position&quot;:&quot;&quot;,&quot;hotspot_position_laptop&quot;:&quot;&quot;,&quot;hotspot_position_tablet&quot;:&quot;&quot;,&quot;hotspot_position_mobile&quot;:&quot;&quot;,&quot;hotspot_icon_position&quot;:null,&quot;hotspot_icon_spacing&quot;:null,&quot;hotspot_width&quot;:null,&quot;hotspot_height&quot;:null,&quot;hotspot_offset_x_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_x_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_offset_y_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;hotspot_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}],&quot;tooltip_position&quot;:&quot;bottom&quot;,&quot;tooltip_position_laptop&quot;:&quot;bottom&quot;,&quot;tooltip_trigger&quot;:&quot;mouseenter&quot;,&quot;tooltip_trigger_laptop&quot;:&quot;mouseenter&quot;,&quot;hotspot_sequenced_animation&quot;:&quot;no&quot;,&quot;tooltip_animation&quot;:&quot;e-hotspot--fade-in-out&quot;}\" data-widget_type=\"hotspot.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"171\" height=\"1024\" src=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1-e1770982171191-171x1024.png\" class=\"attachment-large size-large wp-image-1407\" alt=\"\" srcset=\"https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1-e1770982171191-171x1024.png 171w, https:\/\/devcrawlgeek.com\/amx\/wp-content\/uploads\/2026\/02\/AMX-Loop-Design-1-e1770982171191-50x300.png 50w\" sizes=\"(max-width: 171px) 100vw, 171px\" \/>\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-e7cf948  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Ingest<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Connect cloud, on-prem, and endpoints to centralize logs and gain complete security visibility across your environment.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-1d30eeb  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Analyze<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>AI\/ML correlates events, filters noise, and highlights high-risk activity so real threats surface faster.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-01bcfeb  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Investigate<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>SOC analysts validate alerts, add context, and reduce false positives with expert-led threat investigation.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-c9f77bf  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Respond<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Contain incidents quickly and guide remediation steps to stop spread, reduce impact, and restore operations.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<div class=\"e-hotspot elementor-repeater-item-5d2cc6d  e-hotspot--position-left e-hotspot--position-top  \">\n\n\t\t\t\t\t\t\t\t<div class=\"e-hotspot__button \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__label\">Report<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-hotspot__tooltip  e-hotspot--tooltip-position e-hotspot--fade-in-out \" >\n\t\t\t\t\t\t<p>Monthly reports summarize incidents, trends, and security posture improvements to support leadership decisions and compliance.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\n\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e240f99 e-flex e-con-boxed e-con e-parent\" data-id=\"5e240f99\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d04c28 elementor-widget elementor-widget-elementskit-heading\" data-id=\"6d04c28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \"><span><span>Benefits<\/span><\/span> of our Threat Intelligence Service<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Shut down threats that bypass your preventative controls without hiring a small army. AMX Securesof delivers world-class detection and response at a fraction of the cost of building the capability in-house.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-677eac01 e-grid e-con-boxed e-con e-parent\" data-id=\"677eac01\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b89b36 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"1b89b36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-protected-content-v3\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tActionable Threat Insights\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tReceive relevant, contextual intelligence tailored to your industry and risk profile.\nInstead of generic data feeds, you gain actionable insights that help prioritise real risks affecting your organisation.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e16b530 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"3e16b530\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-stopwatch\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tEarly Threat Awareness\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tIdentify emerging threats before they target your environment.\nProactive intelligence enables your security team to prepare defences against new attack campaigns and vulnerabilities.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-661c89c1 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"661c89c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-hand_shake\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tReduced False Positives\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tIntelligence-enriched alerts improve detection accuracy.\nBy correlating internal events with external threat data, you reduce noise and focus on genuine threats.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bbf7d7 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"6bbf7d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" viewBox=\"0 0 512 512\"><path d=\"m485.82 257.925c-6.082 0-11.667 2.168-16.024 5.772l-16.33-10.173c-1.27-.791-2.735-1.21-4.23-1.21h-44.058l-11.303-24.872h26.893c4.418 0 8-3.582 8-8v-34.541h16.291c3.352 9.973 12.782 17.179 23.869 17.179 13.884 0 25.179-11.295 25.179-25.18s-11.295-25.18-25.179-25.18c-11.088 0-20.518 7.207-23.869 17.18h-24.291c-4.418 0-8 3.582-8 8v34.541h-26.676c-5.337-7.881-13.883-12.668-24.161-13.325l-30.676-1.96c5.806-18.453 6.22-40.704 1.216-62.35h29.875c3.352 9.973 12.782 17.18 23.869 17.18 13.884 0 25.18-11.295 25.18-25.18s-11.296-25.18-25.18-25.18c-11.087 0-20.518 7.207-23.869 17.18h-34.622c-9.237-25.237-24.942-44.035-44.276-52.962l-1.229-.568c-8.766-4.056-19.674-9.103-30.004-9.616-.264-.013-.529-.013-.793 0-10.33.513-21.238 5.56-30.004 9.616l-1.229.568c-19.333 8.927-35.039 27.725-44.275 52.962h-34.184c-3.352-9.973-12.782-17.18-23.869-17.18-13.884 0-25.18 11.295-25.18 25.18s11.296 25.18 25.18 25.18c11.087 0 20.518-7.207 23.869-17.18h29.436c-5.003 21.646-4.589 43.896 1.216 62.35l-30.676 1.96c-10.278.657-18.824 5.444-24.161 13.325h-30.865l-14.381-8.96c.446-1.873.689-3.824.689-5.832 0-13.884-11.296-25.18-25.18-25.18s-25.18 11.295-25.18 25.18 11.296 25.18 25.18 25.18c6.082 0 11.667-2.168 16.024-5.771l16.33 10.173c1.27.791 2.735 1.21 4.23 1.21h25.371l-15.403 33.892h-44.311c-3.352-9.973-12.782-17.18-23.869-17.18-13.884 0-25.18 11.296-25.18 25.18s11.296 25.18 25.18 25.18c11.087 0 20.518-7.207 23.869-17.18h37.039l-17.534 38.581c-4.639 10.205-3.582 21.638 2.897 31.367 6.25 9.386 16.303 14.769 27.579 14.769h36.663v14.045c0 7.719 6.28 14 13.999 14h130.453v3.357c0 26.777 12.32 49.148 35.63 64.693l56.853 37.918c1.344.896 2.891 1.345 4.438 1.345s3.095-.448 4.439-1.345l56.851-37.918c23.31-15.547 35.63-37.918 35.63-64.693v-71.218c0-2.917-1.587-5.602-4.142-7.008-16.951-9.333-32.245-16.241-46.594-20.947l-11.801-25.966h34.498l14.382 8.96c-.446 1.873-.689 3.824-.689 5.832 0 13.884 11.296 25.18 25.18 25.18s25.18-11.296 25.18-25.18-11.296-25.18-25.18-25.18zm-16.892-90.204c5.062 0 9.179 4.118 9.179 9.18s-4.117 9.18-9.179 9.18-9.18-4.118-9.18-9.18 4.118-9.18 9.18-9.18zm-421.12 38.109c-5.062 0-9.18-4.118-9.18-9.18s4.118-9.18 9.18-9.18 9.18 4.118 9.18 9.18-4.119 9.18-9.18 9.18zm-21.628 72.683c-5.062 0-9.18-4.118-9.18-9.18s4.118-9.18 9.18-9.18 9.18 4.118 9.18 9.18c-.001 5.062-4.119 9.18-9.18 9.18zm360.035-161.885c5.062 0 9.18 4.118 9.18 9.18s-4.118 9.18-9.18 9.18c-5.058 0-9.174-4.113-9.179-9.17 0-.003 0-.006 0-.01s0-.006 0-.01c.005-5.057 4.121-9.17 9.179-9.17zm-268.355 18.359c-5.062 0-9.18-4.118-9.18-9.18s4.118-9.18 9.18-9.18 9.18 4.118 9.18 9.18-4.118 9.18-9.18 9.18zm34.833 239.108v-121.177h198.251v36.289c-19.845 3.999-40.997 12.442-65.657 26.02-2.555 1.406-4.142 4.091-4.142 7.008v51.861h-128.452zm306.293 19.358c0 21.175-9.858 38.943-28.509 51.383l-52.411 34.957-52.414-34.958c-18.649-12.438-28.507-30.206-28.507-51.382v-66.46c22.93-12.286 42.745-19.978 61.774-23.085.008 0 .016.001.024.001.8 0 1.571-.121 2.3-.339 17.959-2.587 35.307-1.066 53.999 4.574.583.254 1.192.445 1.821.555 13.068 4.11 26.818 10.201 41.923 18.294zm-80.92-107.012c-.002 0 .001 0 0 0-3.692 0-7.394.159-11.122.472v-35.996c0-7.719-6.28-14-14-14h-202.252c-7.719 0-13.999 6.28-13.999 14v95.133h-36.663c-6.003 0-10.935-2.641-14.263-7.638-3.397-5.102-3.982-10.741-1.647-15.878l45.349-99.783c2.36-5.193 7.068-8.271 13.257-8.667l41.587-2.657c2.651-.169 5.045-1.644 6.39-3.935s1.464-5.1.319-7.497c-9.606-20.116-9.711-50.027-.266-76.201 7.745-21.462 20.58-37.238 36.139-44.422l1.242-.575c7.372-3.411 16.514-7.64 23.682-8.132 7.168.492 16.31 4.722 23.682 8.132l1.241.574c15.56 7.185 28.395 22.961 36.14 44.423 9.445 26.174 9.341 56.085-.266 76.201-1.145 2.397-1.025 5.206.319 7.497 1.345 2.291 3.738 3.765 6.39 3.935l41.587 2.657c6.188.395 10.896 3.473 13.257 8.667l30.121 66.277c-8.934-1.743-17.608-2.586-26.224-2.587zm107.754 5.844c-5.062 0-9.18-4.118-9.18-9.18s4.118-9.18 9.18-9.18 9.18 4.118 9.18 9.18-4.118 9.18-9.18 9.18zm-234.001-2.639c-13.157 0-23.862 10.704-23.862 23.861s10.705 23.861 23.862 23.861 23.861-10.704 23.861-23.861-10.703-23.861-23.861-23.861zm0 31.722c-4.335 0-7.862-3.526-7.862-7.861s3.527-7.861 7.862-7.861 7.861 3.526 7.861 7.861-3.526 7.861-7.861 7.861zm165.28 22.383c0-21.522-17.51-39.032-39.032-39.032s-39.032 17.51-39.032 39.032v8.523c-7.995 1.986-13.945 9.203-13.945 17.803v54.879c0 10.125 8.237 18.363 18.363 18.363h69.229c10.125 0 18.362-8.237 18.362-18.363v-54.879c0-8.6-5.95-15.817-13.944-17.802v-8.524zm-39.033-23.032c12.7 0 23.032 10.332 23.032 23.032v7.963h-2.735v-7.963c0-11.191-9.105-20.296-20.297-20.296s-20.297 9.105-20.297 20.296v7.963h-2.735v-7.963c0-12.7 10.332-23.032 23.032-23.032zm4.297 30.995h-8.594v-7.963c0-2.329 1.968-4.296 4.297-4.296s4.297 1.967 4.297 4.296zm32.68 73.242c0 1.281-1.082 2.363-2.362 2.363h-69.229c-1.281 0-2.363-1.082-2.363-2.363v-54.879c0-1.28 1.082-2.362 2.363-2.362h69.229c1.28 0 2.362 1.082 2.362 2.362zm-36.977-52.922c-11.33 0-20.548 9.218-20.548 20.547 0 8.494 5.181 15.8 12.548 18.926v5.707c0 4.418 3.582 8 8 8s8-3.582 8-8v-5.708c7.366-3.126 12.547-10.432 12.547-18.926 0-11.328-9.217-20.546-20.547-20.546zm0 16c2.507 0 4.547 2.04 4.547 4.547s-2.038 4.546-4.543 4.548c-.001 0-.002 0-.003 0s-.002 0-.003 0c-2.506-.002-4.544-2.041-4.544-4.548-.001-2.507 2.039-4.547 4.546-4.547zm-65.377-254.372c1.159-2.23 1.222-4.883.118-7.166-12.15-25.118-35.416-41.251-60.72-42.104-.18-.006-.359-.006-.539 0-25.303.852-48.568 16.985-60.719 42.103-1.104 2.283-1.042 4.937.118 7.167-1.37 10.241-2.307 25.076 5.583 34.483 2.91 3.47 8.321 7.653 17.573 7.877 13.269.312 21.561-5.559 27.616-9.852 4.304-3.051 6.954-4.831 10.099-5.081 3.145.25 5.795 2.03 10.099 5.081 5.897 4.181 13.914 9.865 26.579 9.865.342 0 .689-.004 1.038-.013 9.251-.224 14.662-4.407 17.572-7.876 7.891-9.406 6.953-24.243 5.583-34.484zm-60.871-33.268c15.24.602 29.596 8.661 39.632 21.753-15.207.088-27.503-.139-39.482-.363-.05-.001-.1-.001-.149-.001s-.1 0-.149.001c-11.98.224-24.274.453-39.482.363 10.036-13.092 24.391-21.152 39.63-21.753zm43.03 57.471c-.744.888-2.146 2.078-5.7 2.164-7.983.192-12.601-3.099-17.977-6.91-5.078-3.6-10.833-7.68-19.006-8.034-.23-.011-.463-.011-.693 0-8.173.354-13.928 4.435-19.005 8.034-5.376 3.811-10.001 7.104-17.977 6.91-3.555-.086-4.956-1.276-5.7-2.164-3.306-3.941-3.02-12.8-2.252-19.764 17.942.191 31.82-.065 45.28-.316 10.189.19 20.61.383 32.857.383 3.934 0 8.06-.02 12.423-.067.769 6.964 1.054 15.824-2.25 19.764zm-213.004-74.525c12.041 0 21.837-9.796 21.837-21.837v-24.588c0-12.041-9.797-21.836-21.838-21.836s-21.837 9.796-21.837 21.836v24.588c0 12.041 9.797 21.837 21.838 21.837zm-5.838-46.425c0-3.218 2.619-5.836 5.838-5.836s5.837 2.618 5.837 5.836v24.588c0 3.219-2.619 5.837-5.838 5.837s-5.837-2.618-5.837-5.837zm-48.095 37.935v-52.259c0-4.418 3.582-8 8-8s8 3.582 8 8v52.259c0 4.418-3.582 8-8 8s-8-3.581-8-8zm91.864 0v-52.259c0-4.418 3.582-8 8-8s8 3.582 8 8v52.259c0 4.418-3.582 8-8 8s-8-3.581-8-8zm53.933 8.49c12.041 0 21.837-9.796 21.837-21.837v-24.588c0-12.041-9.796-21.836-21.837-21.836s-21.837 9.796-21.837 21.836v24.588c0 12.041 9.796 21.837 21.837 21.837zm-5.837-46.425c0-3.218 2.618-5.836 5.837-5.836s5.837 2.618 5.837 5.836v24.588c0 3.219-2.618 5.837-5.837 5.837s-5.837-2.618-5.837-5.837zm253.923 46.425c12.041 0 21.837-9.796 21.837-21.837v-24.588c0-12.041-9.797-21.836-21.838-21.836s-21.837 9.796-21.837 21.836v24.588c0 12.041 9.797 21.837 21.838 21.837zm-5.838-46.425c0-3.218 2.619-5.836 5.838-5.836s5.837 2.618 5.837 5.836v24.588c0 3.219-2.619 5.837-5.838 5.837s-5.837-2.618-5.837-5.837zm43.77 37.935v-52.259c0-4.418 3.582-8 8-8s8 3.582 8 8v52.259c0 4.418-3.582 8-8 8s-8-3.581-8-8zm-91.865 0v-52.259c0-4.418 3.582-8 8-8s8 3.582 8 8v52.259c0 4.418-3.582 8-8 8s-8-3.581-8-8zm-37.932 8.49c12.041 0 21.837-9.796 21.837-21.837v-24.588c0-12.041-9.796-21.836-21.837-21.836s-21.837 9.796-21.837 21.836v24.588c0 12.041 9.796 21.837 21.837 21.837zm-5.837-46.425c0-3.218 2.618-5.836 5.837-5.836s5.837 2.618 5.837 5.836v24.588c0 3.219-2.618 5.837-5.837 5.837s-5.837-2.618-5.837-5.837z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tImproved Detection Capabilities\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tEnhance SIEM, EDR, and SOC performance with enriched intelligence.\nIndicators of compromise (IOCs) and adversary tactics strengthen your existing security controls.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a8df5b8 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"7a8df5b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Icons\" viewBox=\"0 0 512 512\"><path d=\"m332.12987 70.4805167v119.8288187h-31.1524642v-106.2212493c0-9.17267-7.4203439-16.5930139-16.5930139-16.5930139h-116.1727309c-9.1510363 0-16.5930139 7.4203439-16.5930139 16.5930139v106.2212493h-31.1524642v-119.8288187c0-19.5568247 15.8574696-35.3926607 35.4142943-35.3926607h140.856732c19.5568247 0 35.3926607 15.8358359 35.3926607 35.3926607z\" fill=\"#d3dde9\"><\/path><path d=\"m374.4669341 316.4551816c24.5541992 0 44.4355287 19.9029632 44.4355287 44.4571624 0 24.5325655-19.8813296 44.4355287-44.4355287 44.4355287-24.5325655 0-44.4355287-19.9029632-44.4355287-44.4355287 0-24.5541992 19.9029632-44.4571624 44.4355287-44.4571624z\" fill=\"#4257ff\"><\/path><path d=\"m144.0685013 359.6359583-33.1860278 42.3370642h-32.2125133v-1.254752l32.2125133-41.0823122z\" fill=\"#d3dde9\"><\/path><path d=\"m209.488676 359.6359583h.9951482l-33.2076615 42.3370642h-33.2076614l33.2076614-42.3370642z\" fill=\"#d3dde9\"><\/path><path d=\"m275.8823653 359.6359583-33.1860278 42.3370642h-33.2076615l33.2076615-42.3370642z\" fill=\"#d3dde9\"><\/path><g fill=\"none\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"5.408\"><path d=\"m460.677052 269.2289113v102.0026865c0 31.4553353-14.9272224 61.6126513-39.957362 80.671902l-46.2527558 35.2412251-46.2527558-35.2412251c-16.6579149-12.6989559-28.837663-30.2871179-35.1114231-49.9304773-3.1801474-9.864947-4.8459389-20.227468-4.8459389-30.7414247v-102.0026865h172.4202357\" stroke=\"#00356c\"><\/path><path d=\"m418.9024629 360.912344c0 24.5325655-19.8813296 44.4355287-44.4355287 44.4355287-24.5325655 0-44.4355287-19.9029632-44.4355287-44.4355287 0-24.5541992 19.9029632-44.4571624 44.4355287-44.4571624 24.5541992 0 44.4355287 19.9029632 44.4355287 44.4571624z\" stroke=\"#00356c\"><\/path><path d=\"m356.8355048 362.4050663 10.7519268 10.7519268 24.5325655-24.5109318\" stroke=\"#f9f9f9\"><\/path><path d=\"m120.4661829 190.3093354v-119.8288187c0-19.5568247 15.8574696-35.3926607 35.4142943-35.3926607h140.856732c19.5568247 0 35.3926607 15.8358359 35.3926607 35.3926607v119.8288187\" stroke=\"#00356c\"><\/path><path d=\"m300.9774058 190.3093354v-106.2212493c0-9.17267-7.4203439-16.5930139-16.5930139-16.5930139h-116.1727309c-9.1510363 0-16.5930139 7.4203439-16.5930139 16.5930139v106.2212493\" stroke=\"#00356c\"><\/path><path d=\"m293.1027552 401.9730225h-214.9736364c-7.788116 0-14.1051435-6.3170275-14.1051435-14.1267771v-183.4317664c0-7.788116 6.3170275-14.1051435 14.1051435-14.1051435h296.3378153c7.788116 0 14.1051435 6.3170275 14.1051435 14.1051435v64.8144324\" stroke=\"#00356c\"><\/path><path d=\"m64.0239753 359.6359583h46.8584982 33.1860278 33.2076614 32.2125133.9951482 32.2125133 33.1860278 10.9033624\" stroke=\"#00356c\"><\/path><path d=\"m78.67 400.718 32.212-41.082\" stroke=\"#00356c\"><\/path><path d=\"m110.882 401.973 33.187-42.337\" stroke=\"#00356c\"><\/path><path d=\"m144.069 401.973 33.207-42.337\" stroke=\"#00356c\"><\/path><path d=\"m177.276 401.973 33.208-42.337\" stroke=\"#00356c\"><\/path><path d=\"m177.276 400.718 32.213-41.082\" stroke=\"#00356c\"><\/path><path d=\"m209.489 401.973 33.207-42.337\" stroke=\"#00356c\"><\/path><path d=\"m242.696 401.973 33.186-42.337\" stroke=\"#00356c\"><\/path><\/g><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tStronger Risk Prioritization\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tUnderstand which threats pose the greatest business impact.\nContextual scoring and analysis help allocate resources effectively and respond faster to critical risks.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e28851f elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"6e28851f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-eye3\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tEnhanced Incident Response\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tAccess detailed threat context during investigations.\nThreat intelligence provides attacker profiles, techniques, and remediation guidance to accelerate containment.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4559ff62 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"4559ff62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" viewBox=\"0 0 500 500\"><path clip-rule=\"evenodd\" d=\"m345.836 290.92 49.603 24.503c.309.153.492.448.492.793s-.183.64-.492.793l-145.048 71.65c-.255.126-.528.126-.783 0l-145.047-71.65c-.309-.153-.493-.448-.493-.793s.183-.64.493-.793l49.603-24.503c.255-.126.528-.126.783 0l94.661 46.76c.255.126.528.126.783 0l94.662-46.76c.255-.126.528-.126.783 0zm-9.118 132.806c-10.627 0-19.242 8.615-19.242 19.242s8.615 19.242 19.242 19.242c11.71 0 20.627-10.34 19.067-21.836-.05-.365.119-.706.439-.887l90.78-51.602c.02-.011.037-.02.057-.03 2.238-1.065 3.785-3.347 3.785-5.991v-263.728h-.019c-.002-2.3-1.206-4.534-3.349-5.751l-91.254-51.871c-.32-.182-.488-.522-.439-.888 1.56-11.496-7.357-21.836-19.067-21.836-10.627 0-19.242 8.615-19.242 19.242 0 16.25 18.837 24.962 31.222 15.057.288-.231.668-.261.989-.079l87.448 49.708c.284.161.447.442.447.768v255.026c0 .327-.163.607-.447.768l-87.448 49.708c-.321.182-.699.153-.988-.077-3.287-2.618-7.451-4.185-11.981-4.185zm-173.436 0c-4.53 0-8.694 1.567-11.982 4.187-.288.23-.667.259-.988.077l-87.448-49.708c-.284-.161-.447-.442-.447-.768v-255.027c0-.327.163-.607.447-.768l87.448-49.708c.321-.182.701-.152.989.079 12.389 9.906 31.222 1.19 31.222-15.057 0-10.627-8.615-19.242-19.242-19.242-11.71 0-20.627 10.34-19.067 21.836.05.365-.119.705-.439.888l-91.254 51.871c-2.143 1.217-3.347 3.451-3.349 5.751h-.018v263.728c0 2.644 1.548 4.926 3.785 5.991.02.01.037.018.057.03l90.779 51.602c.32.182.489.522.439.887-1.56 11.496 7.357 21.836 19.067 21.836 10.627 0 19.242-8.615 19.242-19.242.001-10.628-8.614-19.243-19.241-19.243zm87.109-312.383 145.048 71.65c.309.153.492.448.492.793s-.183.64-.492.793l-145.048 71.65c-.255.126-.528.126-.783 0l-145.047-71.65c-.309-.153-.493-.448-.493-.793s.183-.64.493-.793l145.047-71.65c.255-.126.528-.126.783 0zm95.467 113.373c-.255-.126-.528-.126-.783 0l-94.684 46.771c-.255.126-.528.126-.783 0l-94.683-46.771c-.255-.126-.528-.126-.783 0l-49.581 24.492c-.309.153-.493.448-.493.793s.183.64.493.793l145.047 71.65c.255.126.528.126.783 0l145.048-71.65c.309-.153.492-.448.492-.793s-.183-.64-.492-.793z\" fill-rule=\"evenodd\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tIndustry-Specific Intelligence\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tGain visibility into threats targeting your sector.\nMonitoring sector-based attack trends improves preparedness and strategic planning.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57c79144 elementor-flip-box--direction-left elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"57c79144\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1_1_\" height=\"512\" viewBox=\"0 0 64 64\" width=\"512\"><path d=\"m2 55.004h1.52c.104.296.225.585.359.868l-1.075 1.075c-.188.188-.293.442-.293.707s.105.52.293.707l2.834 2.834c.375.375 1.039.375 1.414 0l1.076-1.076c.283.135.572.254.867.358v1.523c0 .552.448 1 1 1h4.008c.552 0 1-.448 1-1v-1.525c.294-.104.583-.224.864-.358l1.079 1.079c.188.188.442.293.707.293s.52-.105.707-.293l2.834-2.834c.188-.188.293-.442.293-.707s-.105-.52-.293-.707l-1.08-1.08c.134-.281.253-.569.357-.863h1.529c.552 0 1-.448 1-1v-4.008c0-.552-.448-1-1-1h-1.528c-.104-.294-.223-.582-.357-.863l1.08-1.08c.188-.188.293-.442.293-.707s-.105-.52-.293-.707l-2.834-2.834c-.375-.375-1.039-.375-1.414 0l-1.079 1.079c-.281-.134-.57-.253-.864-.358v-1.527c0-.552-.448-1-1-1h-4.008c-.552 0-1 .448-1 1v1.522c-.295.104-.584.224-.867.358l-1.076-1.076c-.188-.188-.442-.293-.707-.293s-.52.105-.707.293l-2.834 2.834c-.188.188-.293.442-.293.707s.105.52.293.707l1.075 1.075c-.135.284-.255.573-.36.869h-1.52c-.552 0-1 .448-1 1v4.008c0 .552.448 1 1 1zm1-4.008h1.259c.456 0 .854-.309.968-.75.163-.631.413-1.235.743-1.794.232-.393.168-.893-.154-1.215l-.891-.891 1.42-1.42.891.892c.321.322.82.386 1.215.154.559-.329 1.162-.579 1.793-.741.442-.114.75-.512.75-.968v-1.263h2.008v1.264c0 .456.308.854.749.968.632.164 1.234.414 1.792.743.392.231.894.168 1.215-.154l.894-.895 1.42 1.42-.896.896c-.322.322-.386.822-.154 1.215.328.557.577 1.159.74 1.791.114.441.512.75.968.75h1.27v2.008h-1.267c-.456 0-.854.308-.968.75-.163.631-.413 1.234-.74 1.791-.232.393-.168.893.154 1.215l.895.895-1.42 1.42-.894-.897c-.321-.322-.822-.386-1.215-.154-.557.329-1.16.579-1.792.743-.441.114-.749.512-.749.968v1.263h-2.008v-1.262c0-.456-.309-.854-.75-.968-.631-.163-1.235-.412-1.793-.741-.395-.231-.894-.167-1.215.154l-.891.891-1.42-1.42.89-.89c.323-.322.386-.822.154-1.215-.33-.56-.58-1.163-.743-1.794-.114-.441-.512-.75-.968-.75h-1.26z\"><\/path><path d=\"m12 57c2.757 0 5-2.243 5-5s-2.243-5-5-5-5 2.243-5 5 2.243 5 5 5zm0-8c1.654 0 3 1.346 3 3s-1.346 3-3 3-3-1.346-3-3 1.346-3 3-3z\"><\/path><path d=\"m62.948 6.266c-.119-.355-.427-.615-.797-.671l-3.618-.552-1.627-3.467c-.165-.352-.518-.576-.906-.576s-.741.224-.905.575l-1.627 3.467-3.618.552c-.371.057-.678.316-.797.671s-.029.748.232 1.016l2.647 2.713-.626 3.844c-.062.378.098.758.411.979.313.22.724.242 1.06.058l3.223-1.782 3.224 1.782c.151.083.318.125.484.125.202 0 .404-.062.576-.183.313-.22.473-.601.411-.979l-.626-3.844 2.647-2.713c.262-.267.351-.659.232-1.015zm-4.664 2.694c-.222.227-.322.546-.271.859l.376 2.309-1.906-1.053c-.15-.083-.317-.125-.484-.125s-.333.042-.484.125l-1.906 1.053.376-2.309c.051-.313-.049-.632-.271-.859l-1.641-1.682 2.222-.339c.33-.051.613-.262.754-.564l.951-2.021.949 2.021c.142.302.425.513.754.564l2.222.339z\"><\/path><path d=\"m47.377 13.076c-.544-.083-1.106.061-1.54.401l-7.846 6.138c.431-.829.63-1.76.55-2.714-.112-1.331-.736-2.538-1.757-3.4s-2.314-1.273-3.646-1.162c-1.331.113-2.538.737-3.4 1.757-.861 1.021-1.274 2.315-1.162 3.646.096 1.128.576 2.153 1.336 2.968-1.164.288-2.191.977-2.88 1.962l-7.879 10.754c-.45.643-.486 1.465-.094 2.145.391.679 1.115 1.057 1.902.995l2.396-.203c.582-.049 1.112-.349 1.439-.804l4.757-6.258.36 4.27-2.363 16.208c-.892.183-1.788.347-2.689.473l.277 1.98c3.138-.439 6.235-1.21 9.204-2.293 5.76-2.1 10.364-5.123 13.914-8.158l.224-.067-.031-.104c3.425-2.962 5.853-5.919 7.364-8.028.193-.27.24-.617.125-.927-.114-.311-.375-.545-.696-.625l-1.542-.386 5.615-3.119 1.326 5.968-1.324-.441c-.431-.144-.902.021-1.151.398l-.166.25c-12.571 19.139-26.545 23.779-36.055 24.301l.109 1.997c9.903-.544 24.394-5.301 37.357-24.807l2.271.757c.341.115.718.035.986-.206s.384-.608.306-.959l-2-9c-.068-.308-.278-.566-.566-.695-.288-.128-.619-.116-.896.038l-9 5c-.359.199-.559.598-.505 1.005.053.407.351.74.749.839l2.545.636c-1.319 1.706-3.14 3.783-5.483 5.892l-1.783-5.981c-.166-.514-.539-.945-1.002-1.172l-4.111-2.141-.643-4.888 9.156-6.976c.847-.644 1.041-1.838.441-2.717l-1.156-1.698c-.308-.454-.798-.764-1.343-.849zm-14.071 1.257c.086-.007.172-.011.258-.011.707 0 1.384.247 1.93.708.612.517.986 1.241 1.054 2.04.067.799-.18 1.576-.697 2.188s-1.241.987-2.04 1.054c-.8.069-1.576-.18-2.188-.697s-.987-1.241-1.054-2.04c-.139-1.649 1.089-3.103 2.737-3.242zm1.359 33.334 2.081-12.009 3.676 1.784 2.173 6.1c-2.317 1.532-4.956 2.953-7.93 4.125zm3.943-23.59c-.285.217-.432.57-.386.926l.786 5.979c.043.323.24.606.53.756l4.588 2.372 2.032 6.817c-.591.482-1.214.96-1.862 1.434l-2.002-5.62c-.184-.466-.532-.843-.98-1.062l-4.887-2.398c-.282-.138-.613-.135-.895.007-.281.143-.478.41-.531.72l-2.502 14.442c-.942.313-1.894.601-2.857.849l2.268-15.551c.011-.076.013-.152.007-.229l-.589-6.975c-.035-.413-.32-.761-.717-.876-.398-.117-.825.026-1.075.355l-6.346 8.349-2.409.22 7.879-10.754c.512-.731 1.316-1.194 2.206-1.27l3.113-.263h.002.001l3.985-.337c.194-.017.379-.089.532-.209l8.572-6.706 1.157 1.698z\"><\/path><path d=\"m4 2h2v2h-2z\"><\/path><path d=\"m6 4h2v2h-2z\"><\/path><path d=\"m2 4h2v2h-2z\"><\/path><path d=\"m4 6h2v2h-2z\"><\/path><path d=\"m12 5h2v2h-2z\"><\/path><path d=\"m14 7h2v2h-2z\"><\/path><path d=\"m10 7h2v2h-2z\"><\/path><path d=\"m12 9h2v2h-2z\"><\/path><path d=\"m58 56h2v2h-2z\"><\/path><path d=\"m60 58h2v2h-2z\"><\/path><path d=\"m56 58h2v2h-2z\"><\/path><path d=\"m58 60h2v2h-2z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tStrategic Security Planning\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tUse intelligence reporting to support leadership decisions.\nExecutive summaries and trend analysis guide long-term cybersecurity investments and risk management strategies.\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66e235f4 e-flex e-con-boxed e-con e-parent\" data-id=\"66e235f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4772c503 e-con-full e-flex e-con e-child\" data-id=\"4772c503\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e28f406 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-heading\" data-id=\"1e28f406\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-text_left\"><h2 class=\"ekit-heading--title elementskit-section-title \">Frequently Asked <span><span>Questions<\/span><\/span><\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-39d045f5 e-con-full e-flex e-con e-child\" data-id=\"39d045f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d5a67eb elementor-widget elementor-widget-elementskit-accordion\" data-id=\"5d5a67eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69e4aa052ca54\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-5d5a67eb\">\n                        <a href=\"#collapse-44e9aab69e4aa052ca54\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-44e9aab69e4aa052ca54\" aria-expanded=\"true\" aria-controls=\"Collapse-44e9aab69e4aa052ca54\">\n                            \n                            <span class=\"ekit-accordion-title\">What is a Threat Intelligence Service?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-44e9aab69e4aa052ca54\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-5d5a67eb\" data-parent=\"#accordion-69e4aa052ca54\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>It is a service that provides actionable information about emerging threats, attacker tactics, and industry-specific risks to strengthen your cybersecurity posture.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-5d5a67eb\">\n                        <a href=\"#collapse-da05be769e4aa052ca54\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-da05be769e4aa052ca54\" aria-expanded=\"false\" aria-controls=\"Collapse-da05be769e4aa052ca54\">\n                            \n                            <span class=\"ekit-accordion-title\">How does this integrate with our existing tools?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-da05be769e4aa052ca54\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-5d5a67eb\" data-parent=\"#accordion-69e4aa052ca54\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Threat intelligence feeds can integrate with SIEM, EDR, and SOC platforms to enhance detection and response.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-5d5a67eb\">\n                        <a href=\"#collapse-eef760e69e4aa052ca54\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-eef760e69e4aa052ca54\" aria-expanded=\"false\" aria-controls=\"Collapse-eef760e69e4aa052ca54\">\n                            \n                            <span class=\"ekit-accordion-title\">Is this only for large enterprises?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-eef760e69e4aa052ca54\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-5d5a67eb\" data-parent=\"#accordion-69e4aa052ca54\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>No. The service scales to organisations of all sizes and industries.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Threat Intelligence Actionable insights. Proactive defence. Intelligence-driven security. Talk To Security Expert Are you aware of the threats targeting your industry right now? Discover why threat intelligence is essential for organisations facing today\u2019s rapidly evolving cyber landscape. Evolving Attack Techniques Cybercriminals continuously adapt their tactics, making traditional defences insufficient. Information Overload Security teams receive large &#8230; <a title=\"Threat Intelligence\" class=\"read-more\" href=\"https:\/\/devcrawlgeek.com\/amx\/threat-intelligence\/\" aria-label=\"Read more about Threat Intelligence\">Read more<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1463","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/pages\/1463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/comments?post=1463"}],"version-history":[{"count":19,"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/pages\/1463\/revisions"}],"predecessor-version":[{"id":2641,"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/pages\/1463\/revisions\/2641"}],"wp:attachment":[{"href":"https:\/\/devcrawlgeek.com\/amx\/wp-json\/wp\/v2\/media?parent=1463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}