{"id":34772,"date":"2025-03-19T15:00:05","date_gmt":"2025-03-19T15:00:05","guid":{"rendered":"https:\/\/ramsdata.com.pl\/?page_id=34772"},"modified":"2025-03-19T16:39:58","modified_gmt":"2025-03-19T16:39:58","slug":"endpoint-security","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/en\/trellix\/endpoint-security\/","title":{"rendered":"Endpoint Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"34772\" class=\"elementor elementor-34772\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25b4313d e-flex e-con-boxed e-con e-parent\" data-id=\"25b4313d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-392aeeb1 e-con-full e-flex e-con e-child\" data-id=\"392aeeb1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7060e4a1 elementor-widget elementor-widget-heading\" data-id=\"7060e4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Modern Endpoint Security\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b3723ea elementor-widget elementor-widget-text-editor\" data-id=\"6b3723ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOne agent for attack surface reduction, protection, detection, forensics, and remediation across your hybrid environment\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e9e9e6 elementor-widget elementor-widget-button\" data-id=\"7e9e9e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ramsdata.com.pl\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c4c38c4 e-con-full e-flex e-con e-child\" data-id=\"2c4c38c4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d137d2f e-flex e-con-boxed e-con e-parent\" data-id=\"d137d2f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2dabcfc e-con-full e-flex e-con e-child\" data-id=\"2dabcfc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fad39bc elementor-widget elementor-widget-image\" data-id=\"fad39bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"446\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/edr-tour-loop.gif\" class=\"attachment-large size-large wp-image-34798\" alt=\"edr-tour-loop\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a77134 e-con-full e-flex e-con e-child\" data-id=\"5a77134\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22c8566 elementor-widget elementor-widget-heading\" data-id=\"22c8566\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Detect, contain, and recover from threats faster\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-477315c elementor-widget elementor-widget-text-editor\" data-id=\"477315c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tModern endpoint security provides multi-layered protection to reduce your attack surface, detect threats that have bypassed security controls, and rapidly remediate threats. It also includes forensics to identify and contain the blast radius so you can quickly and confidently return to a known good state.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10b3dcc e-flex e-con-boxed e-con e-parent\" data-id=\"10b3dcc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c0df7e e-con-full e-flex e-con e-child\" data-id=\"3c0df7e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-b438d8e e-con-full e-flex e-con e-child\" data-id=\"b438d8e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-1153572 e-con-full e-flex e-con e-child\" data-id=\"1153572\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1d2ed2 elementor-widget elementor-widget-heading\" data-id=\"c1d2ed2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trellix Endpoint Security solutions\n\n\n\n\n\n\n\n\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25c292e e-flex e-con-boxed e-con e-child\" data-id=\"25c292e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-750e1b7 e-con-full e-flex e-con e-child\" data-id=\"750e1b7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15f4d08 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"15f4d08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix Endpoint Security<\/h3><p class=\"elementor-image-box-description\">Protect against modern and novel threats with multi-layered protection stack delivered in a single agent.\n<\/br><\/br><\/br><\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-89e4f5d e-con-full e-flex e-con e-child\" data-id=\"89e4f5d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1b7167 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"a1b7167\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix Endpoint Detection and Response<\/h3><p class=\"elementor-image-box-description\">Comprehensive EDR solution that reduces time to detection and time to remediation without the alert fatigue.<\/br><\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c020c0 e-con-full e-flex e-con e-child\" data-id=\"2c020c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00e1b31 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"00e1b31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix Managed Detection and Response<\/h3><p class=\"elementor-image-box-description\">GenAI-powered detection and response, managed 24\/7 by the Trellix Security Platform.\n<\/br><\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc3253e e-flex e-con-boxed e-con e-child\" data-id=\"dc3253e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9543789 e-con-full e-flex e-con e-child\" data-id=\"9543789\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-871d179 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"871d179\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix Endpoint Forensics<\/h3><p class=\"elementor-image-box-description\">Identify the blast radius of an incident by performing fast, targeted forensic investigations across thousands of endpoints.<\/br><\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6810aaf e-con-full e-flex e-con e-child\" data-id=\"6810aaf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed87f60 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"ed87f60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix Application and Change Control<\/h3><p class=\"elementor-image-box-description\">Ensure that only trusted applications run on devices, servers, and desktops, whether it\u2019s for compliance or to reduce your attack surface.<\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb86109 e-con-full e-flex e-con e-child\" data-id=\"cb86109\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9892f1 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"a9892f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix ePolicy Orchestrator<\/h3><p class=\"elementor-image-box-description\">The single, centralized, and extensible platform for endpoint security policy management that lets you automate daily tasks.<\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5855605c e-flex e-con-boxed e-con e-parent\" data-id=\"5855605c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1c9d06e0 e-con-full e-flex e-con e-child\" data-id=\"1c9d06e0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7416fcf8 elementor-widget elementor-widget-heading\" data-id=\"7416fcf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Revolutionize your cyber resilience\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c9651e5 elementor-widget elementor-widget-text-editor\" data-id=\"3c9651e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Endpoint security is foundational to your security platform, securing the last mile of assets.<br \/>It provides greater insights into user activity than any other part of the security stack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39b634e elementor-widget elementor-widget-image\" data-id=\"39b634e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2266\" height=\"1136\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/trellix-security-platform-horiz.svg\" class=\"attachment-full size-full wp-image-34812\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cab7d3a e-flex e-con-boxed e-con e-parent\" data-id=\"cab7d3a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-56d76b7 e-con-full e-flex e-con e-child\" data-id=\"56d76b7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c72000b elementor-widget elementor-widget-heading\" data-id=\"c72000b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Trellix Endpoint Solution bundles\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b245e6 elementor-widget elementor-widget-image\" data-id=\"5b245e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"1369\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/Trellix-1.png\" class=\"attachment-full size-full wp-image-34903\" alt=\"Trellix\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/Trellix-1.png 1200w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/Trellix-1-263x300.png 263w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/Trellix-1-898x1024.png 898w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/Trellix-1-768x876.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec2c165 e-flex e-con-boxed e-con e-parent\" data-id=\"ec2c165\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f20ebc e-con-full e-flex e-con e-child\" data-id=\"7f20ebc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-faa6adb e-con-full e-flex e-con e-child\" data-id=\"faa6adb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fecf6e elementor-widget elementor-widget-heading\" data-id=\"6fecf6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why endpoint security?\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2fe7965 e-flex e-con-boxed e-con e-child\" data-id=\"2fe7965\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-976bb98 e-con-full e-flex e-con e-child\" data-id=\"976bb98\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c72efa elementor-position-top ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"6c72efa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"27\" height=\"27\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/T0028-grad.svg\" class=\"attachment-full size-full wp-image-34842\" alt=\"T0028-grad\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Prevent ransomware<\/h3><p class=\"elementor-image-box-description\">Prevent ransomware from destroying your organization with unique remediation rollback.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c23f1a7 e-con-full e-flex e-con e-child\" data-id=\"c23f1a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cf2df2 elementor-position-top ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"3cf2df2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"28\" height=\"29\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/T0024-grad.svg\" class=\"attachment-full size-full wp-image-34836\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Empower analysts<\/h3><p class=\"elementor-image-box-description\">Empower analysts to speed through investigations with the help of AI.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df51a24 e-con-full e-flex e-con e-child\" data-id=\"df51a24\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fbbbd5 elementor-position-top ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"4fbbbd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"26\" height=\"26\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/T0104-grad.svg\" class=\"attachment-full size-full wp-image-34830\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Save time<\/h3><p class=\"elementor-image-box-description\">Save time with low false positive rate and high-fidelity alerts using a multi-layered protection stack.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5dbe7d0 e-con-full e-flex e-con e-child\" data-id=\"5dbe7d0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-551160f elementor-position-top ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"551160f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"27\" height=\"23\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/T0025-grad.svg\" class=\"attachment-full size-full wp-image-34824\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Reduce overhead<\/h3><p class=\"elementor-image-box-description\">Reduce operational overhead with a single management console across heterogeneous environments.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0842c61 e-flex e-con-boxed e-con e-parent\" data-id=\"0842c61\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-429c20d e-con-full e-flex e-con e-child\" data-id=\"429c20d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93b409b elementor-widget elementor-widget-image\" data-id=\"93b409b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"989\" height=\"1280\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/cq5dam.web_.1280.1280.jpeg\" class=\"attachment-full size-full wp-image-34851\" alt=\"cq5dam.web.1280.1280\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/cq5dam.web_.1280.1280.jpeg 989w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/cq5dam.web_.1280.1280-232x300.jpeg 232w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/cq5dam.web_.1280.1280-791x1024.jpeg 791w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/cq5dam.web_.1280.1280-768x994.jpeg 768w\" sizes=\"(max-width: 989px) 100vw, 989px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-225d15e e-con-full e-flex e-con e-child\" data-id=\"225d15e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ff1f5e ha-has-bg-overlay elementor-widget elementor-widget-text-editor\" data-id=\"8ff1f5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSolution Brief\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6bd522 elementor-widget elementor-widget-heading\" data-id=\"a6bd522\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Trellix Endpoint Security Suite\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0947491 elementor-widget elementor-widget-text-editor\" data-id=\"0947491\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTrellix Endpoint Security Suite gives your security team the context, visibility, and capabilities to identify, investigate, and remediate threats across your hybrid environment. And it provides the data essential for your extended detection and response.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f278d4 elementor-widget elementor-widget-button\" data-id=\"0f278d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ramsdata.com.pl\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View Solution Brief<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67d14f5 e-flex e-con-boxed e-con e-parent\" data-id=\"67d14f5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5af8468 e-con-full e-flex e-con e-child\" data-id=\"5af8468\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-661d6cb e-flex e-con-boxed e-con e-child\" data-id=\"661d6cb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2e3bd02 e-con-full e-flex e-con e-child\" data-id=\"2e3bd02\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43587d6 elementor-widget elementor-widget-heading\" data-id=\"43587d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Industry recognition\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84c8a27 elementor-widget elementor-widget-text-editor\" data-id=\"84c8a27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTrellix is recognized as an industry leader by key analyst firms\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-98dbac1 e-flex e-con-boxed e-con e-child\" data-id=\"98dbac1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-055e7d7 e-con-full e-flex e-con e-child\" data-id=\"055e7d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-639f59d elementor-widget elementor-widget-image\" data-id=\"639f59d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"131\" height=\"40\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/idc-logo.svg\" class=\"attachment-full size-full wp-image-34876\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f71630 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"1f71630\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Leader in Worldwide Modern Endpoint Endpoint Security for Enterprises, 2024<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bbc7b94 e-con-full e-flex e-con e-child\" data-id=\"bbc7b94\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-894b2b5 elementor-widget elementor-widget-image\" data-id=\"894b2b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"156\" height=\"24\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/forrester-logo.svg\" class=\"attachment-full size-full wp-image-34870\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19ee257 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"19ee257\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Trellix is a Strong Performer in Forrester\u2122\ufe0f: Endpoint Security, Q4 2023<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aabe841 e-con-full e-flex e-con e-child\" data-id=\"aabe841\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad1346a elementor-widget elementor-widget-image\" data-id=\"ad1346a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"162\" height=\"160\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/avc-logo.png\" class=\"attachment-full size-full wp-image-34864\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9690764 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"9690764\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Trellix stopped more malware with less false positives in AV Comparatives<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4eb5ce e-flex e-con-boxed e-con e-parent\" data-id=\"a4eb5ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c5d7da5 e-con-full e-flex e-con e-child\" data-id=\"c5d7da5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-88afd9d e-flex e-con-boxed e-con e-child\" data-id=\"88afd9d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-38fd62e e-con-full e-flex e-con e-child\" data-id=\"38fd62e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e359a0a elementor-widget elementor-widget-heading\" data-id=\"e359a0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security awareness\n\n\n\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a695852 e-flex e-con-boxed e-con e-child\" data-id=\"a695852\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-40a6a86 e-con-full e-flex e-con e-child\" data-id=\"40a6a86\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-969f32e ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"969f32e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">What is EDR?<\/h3><p class=\"elementor-image-box-description\">Endpoint Detection and Response (EDR), also known as Endpoint Threat Detection and Response (ETDR), is an integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities. <\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e056b66 e-con-full e-flex e-con e-child\" data-id=\"e056b66\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c49f63 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"6c49f63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">What is Endpoint Management?<\/h3><p class=\"elementor-image-box-description\">Endpoint management is the practice of authenticating and supervising the access rights of endpoint devices to a network and applying security policies that prevent any external or internal threats posed by that access.<\/br><\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78dfe5e e-con-full e-flex e-con e-child\" data-id=\"78dfe5e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99df2d1 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"99df2d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">What is Next Gen Endpoint Security?<\/h3><p class=\"elementor-image-box-description\">Next-generation endpoint security uses modern artificial intelligence (AI), machine learning, and a tighter integration of network and device security to provide more comprehensive and adaptive protection than traditional endpoint security solutions.<\/br><\/br><\/br><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Modern Endpoint Security One agent for attack surface reduction, protection, detection, forensics, and remediation across your hybrid environment Request a demo Detect, contain, and recover from threats faster Modern endpoint security provides multi-layered protection to reduce your attack surface, detect threats that have bypassed security controls, and rapidly remediate threats. It also includes forensics to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":34733,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-34772","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/34772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/comments?post=34772"}],"version-history":[{"count":70,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/34772\/revisions"}],"predecessor-version":[{"id":34935,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/34772\/revisions\/34935"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/34733"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/media?parent=34772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}