{"id":144,"date":"2020-08-21T14:19:21","date_gmt":"2020-08-21T12:19:21","guid":{"rendered":"https:\/\/uunify.io\/?page_id=144"},"modified":"2021-12-02T12:25:56","modified_gmt":"2021-12-02T11:25:56","slug":"cyber-security-partners-uunify","status":"publish","type":"page","link":"https:\/\/uunify.io\/?page_id=144","title":{"rendered":"Security Partners"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull is-light\"><span aria-hidden=\"true\" class=\"has-background-dim-0 wp-block-cover__gradient-background has-background-dim\"><\/span><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"750\" height=\"499\" data-attachment-id=\"165\" data-permalink=\"https:\/\/uunify.io\/?attachment_id=165\" data-orig-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/08\/pexels-photo-830891.jpeg?fit=1880%2C1252&amp;ssl=1\" data-orig-size=\"1880,1252\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"low angle photo of four high rise curtain wall buildings under white clouds and blue sky\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Photo by Philipp Birmes on &lt;a href=&quot;https:\/\/www.pexels.com\/photo\/low-angle-photo-of-four-high-rise-curtain-wall-buildings-under-white-clouds-and-blue-sky-830891\/&quot; rel=&quot;nofollow&quot;&gt;Pexels.com&lt;\/a&gt;&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/08\/pexels-photo-830891.jpeg?fit=750%2C499&amp;ssl=1\" class=\"wp-block-cover__image-background wp-image-165\" src=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/08\/pexels-photo-830891.jpeg?resize=750%2C499&#038;ssl=1\" data-object-fit=\"cover\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size wp-block-paragraph\"><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-secondary-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-jetpack-layout-grid alignfull column1-desktop-grid__span-10 column1-desktop-grid__start-2 column1-desktop-grid__row-1 column1-tablet-grid__span-8 column1-tablet-grid__row-1 column1-mobile-grid__span-4 column1-mobile-grid__row-1\">\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-none\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">IT security is a set of cybersecurity strategies preventing unauthorized access to organisational assets such as endpoint, API, cloud, applications and more. The breadth of risk evolves continuously creating new hurdles\/obstacles for corporate business to overcome.<\/p>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">Traditional security maintenance and policies focused around the datacentre is changing dramatically with the adoption of Public and Hybrid Clouds.&nbsp; With more and more infrastructure moving from hardware to SaaS (software-as-a-service), business owners are realising security is ongoing and continuous.<\/p>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">Protecting the integrity of computer systems, networks and data from attack, damage or unauthorised access is vital to compete and stay ahead of the competition.&nbsp; Network security is a challenge with the exponential growth of endpoints and continuous advancement of applications\/cloud services. The risks are no longer from external hackers, but in many cases, either by accident or malicious intent.<\/p>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">uUnify strongly believe outsourcing to professional suppliers with proven solutions is the safest and easiest way to be supported in specific cyber security areas: \u2013<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-jetpack-layout-grid alignfull column1-desktop-grid__span-4 column1-desktop-grid__row-1 column2-desktop-grid__span-4 column2-desktop-grid__start-5 column2-desktop-grid__row-1 column3-desktop-grid__span-4 column3-desktop-grid__start-9 column3-desktop-grid__row-1 column1-tablet-grid__span-4 column1-tablet-grid__row-1 column2-tablet-grid__span-4 column2-tablet-grid__start-5 column2-tablet-grid__row-1 column3-tablet-grid__span-8 column3-tablet-grid__row-2 column1-mobile-grid__span-4 column1-mobile-grid__row-1 column2-mobile-grid__span-4 column2-mobile-grid__row-2 column3-mobile-grid__span-4 column3-mobile-grid__row-3\">\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-large has-background has-background-background-color\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"750\" height=\"422\" data-attachment-id=\"429\" data-permalink=\"https:\/\/uunify.io\/?attachment_id=429\" data-orig-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/idax.png?fit=2240%2C1260&amp;ssl=1\" data-orig-size=\"2240,1260\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"idax\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/idax.png?fit=750%2C422&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/idax.png?resize=750%2C422&#038;ssl=1\" alt=\"\" class=\"wp-image-429\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-justify has-background-color has-foreground-light-background-color has-text-color has-background has-small-font-size wp-block-paragraph\">According to Verizon Insider Threat Report, 20 % of all cybersecurity incidents and nearly 15% of all data breaches happen from \u201cinsider and privilege misuse\u201d.&nbsp; Employees may cause an incident or data breach accidentally or deliberately, depending on their motives \u2013 financial, malicious or just for the enjoyment.&nbsp; Organisations need to implement a multi-functional approach in cooperation with the various business areas, for example; HR, legal, datacentre security and of course information technology.  Idax Software&nbsp;enables organisations to manage access changes in real-time making it possible to dynamically enforce the principle of \u201cleast privilege\u201d.&nbsp; Using predictive identity analytics<strong>,&nbsp;<\/strong>the software automatically analyses the access rights for an organisation, quantifies the risk and determines whose permissions require adjustment \u2013 all from a centrally controlled user-friendly dashboard.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-3e41869c wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-primary-color has-text-color\" href=\"https:\/\/uunify.co.uk\/contact-us-uunify\/\" style=\"border-radius:5px;\">Contact for a demo\/intro call<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-large has-background has-background-background-color\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"750\" height=\"422\" data-attachment-id=\"431\" data-permalink=\"https:\/\/uunify.io\/?attachment_id=431\" data-orig-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/secs.png?fit=2240%2C1260&amp;ssl=1\" data-orig-size=\"2240,1260\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"secs\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/secs.png?fit=750%2C422&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/secs.png?resize=750%2C422&#038;ssl=1\" alt=\"\" class=\"wp-image-431\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-justify has-background-color has-foreground-light-background-color has-text-color has-background has-small-font-size wp-block-paragraph\">When organisations collaborate, promote and sell services\/products in conjunction with outside companies, there are elements of risk, including; financial, cybersecurity, information security, operational\/reputational and compliance.  Conducting due diligence with 3rd party vendors is a continuous process and with Security Scorecard, organisations easily find and fix cybersecurity risks.  With over a million companies continuously rated, this global leader is also the only provider of instant risk ratings automatically mapping to vendor cybersecurity questionnaire responses &#8211; proving a true 360 degree view.  Security Scorecard truly believe they can transform the way companies understand, improve and communicate cybersecurity risk to all levels in business.  Let\u00b4s start identifying the risks for your organisation today!<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-3e41869c wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-foreground-color has-text-color\" href=\"https:\/\/uunify.co.uk\/contact-us-uunify\/\" style=\"border-radius:5px;\"><strong>contact for a demo\/intro call<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-large has-background has-background-background-color\">\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"422\" data-attachment-id=\"433\" data-permalink=\"https:\/\/uunify.io\/?attachment_id=433\" data-orig-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/deep.png?fit=2240%2C1260&amp;ssl=1\" data-orig-size=\"2240,1260\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"deep\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/deep.png?fit=750%2C422&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/09\/deep.png?resize=750%2C422&#038;ssl=1\" alt=\"\" class=\"wp-image-433\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-justify has-background-color has-foreground-light-background-color has-text-color has-background has-small-font-size wp-block-paragraph\">Endpoint protection is a collection of security protocols\/solutions defending against attacks from outside sources and inadvertant data leaks from laptops, workstations, servers, mobile devices and other endpoint devices.  Deep Instinct is renowned worldwide and offer a Zero-Time Cyber Security Solution for any environment, any where, any OS and any threat\/attack vector.  This product has an advance subset of AI &#8211; also known as &#8220;deep neural networks&#8221; that intuitively understands new data.  Unlike detection and response based cybersecurity solutions, which wait for the execution of the attack to react, our advanced preventative approach proactively keeps our customers protected by preventing the attack from entering and causing any damage.   This product is changing the way organisations look at cybersecurity to prevent threats in zero time. <\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-3e41869c wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-foreground-color has-secondary-background-color has-text-color has-background\" href=\"https:\/\/uunify.co.uk\/contact-us-uunify\/\">contact for a demo\/intro call<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-jetpack-layout-grid alignfull column1-desktop-grid__span-4 column1-desktop-grid__row-1 column2-desktop-grid__span-4 column2-desktop-grid__start-5 column2-desktop-grid__row-1 column3-desktop-grid__span-4 column3-desktop-grid__start-9 column3-desktop-grid__row-1 column1-tablet-grid__span-4 column1-tablet-grid__row-1 column2-tablet-grid__span-4 column2-tablet-grid__start-5 column2-tablet-grid__row-1 column3-tablet-grid__span-8 column3-tablet-grid__row-2 column1-mobile-grid__span-4 column1-mobile-grid__row-1 column2-mobile-grid__span-4 column2-mobile-grid__row-2 column3-mobile-grid__span-4 column3-mobile-grid__row-3\">\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-none\">\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2021\/12\/cye-pic-3.png?w=750&#038;ssl=1\" alt=\"\" class=\"wp-image-944\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-justify has-text-color has-background wp-block-paragraph\" style=\"background-color:#7a7777;color:#ffffff;\">CYE brings a fact-based approach to organizational cyber defense and takes the guesswork out of cyber risk management. Utilizing\u00a0data from offensive operations, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention. CYE serves as a trusted cybersecurity partner to medium size to CYE brings a fact-based approach to organizational cyber defense and takes the guesswork out of cyber risk management. CYE improves the cybersecurity maturity of its customers by enabling better identification, prioritization, and reduction of cyber risks. CYE&#8217;s cloud-based security optimization platform, Hyver, provides organization-level security assessments, revealing anticipated attack routes, analyzing business risks, and building optimized mitigation plans.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-secondary-background-color has-text-color has-background\" href=\"https:\/\/uunify.co.uk\/contact-us-uunify\/\" style=\"color:#000000;\"><strong>contact for a demo\/intro call<\/strong><\/a><\/div>\n<\/div>\n\n\n<div class=\"crowdsignal-feedback-wrapper\" data-crowdsignal-feedback=\"{&quot;surveyId&quot;:2700109,&quot;emailPlaceholder&quot;:&quot;Your Email&quot;,&quot;emailRequired&quot;:false,&quot;feedbackPlaceholder&quot;:&quot;Please let us know how we can do better\\u2026&quot;,&quot;header&quot;:&quot;\\ud83d\\udc4b Hey there!&quot;,&quot;hideBranding&quot;:false,&quot;hideTriggerShadow&quot;:false,&quot;submitButtonLabel&quot;:&quot;Submit&quot;,&quot;submitText&quot;:&quot;Thanks for letting us know!&quot;,&quot;toggleOn&quot;:&quot;click&quot;,&quot;triggerLabel&quot;:&quot;Feedback&quot;,&quot;x&quot;:&quot;left&quot;,&quot;y&quot;:&quot;bottom&quot;,&quot;status&quot;:&quot;open&quot;,&quot;emailResponses&quot;:true,&quot;nonce&quot;:&quot;7c60f37ba1&quot;}\"><\/div>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-none\">\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2021\/12\/noname-pic-1.png?w=750&#038;ssl=1\" alt=\"\" class=\"wp-image-945\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-justify has-text-color has-background wp-block-paragraph\" style=\"background-color:#7a7777;color:#ffffff;\">Noname Security protects APIs in real-time by providing API security posture management, API runtime security, and active API SDLC testing. Gartner estimates that in 2021, APIs will account for 90% of the attack surface for web-enabled applications, and API abuse will become the most frequent attack vector by 2022.\u00a0 The Noname API Security Platform is an out-of-band solution that doesn\u2019t require agents or network modifications, and offers deeper visibility and security than API gateways, load balancers, and WAFs.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-secondary-background-color has-text-color has-background\" href=\"https:\/\/uunify.co.uk\/contact-us-uunify\/\" style=\"color:#000000;\"><strong>contact for a demo\/intro call<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-none\"><\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-background-light-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-jetpack-layout-grid alignfull column1-desktop-grid__span-8 column1-desktop-grid__start-3 column1-desktop-grid__row-1 column1-tablet-grid__span-8 column1-tablet-grid__row-1 column1-mobile-grid__span-4 column1-mobile-grid__row-1\">\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-none\">\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\" style=\"font-size:18px;\"><em><em>I have known Trude for a while now and she is the type of pre-sales manager that you want to contact you! Trude builds a relationship and understanding with you before trying to sell you a solution. Which means you get what you need, not a solution for a problem that you do not have. She uses the understanding that she has built to advise and recommend, rather than hard sell. This really works with those of us that know what we are doing and see straight through the bold claims of others, and need help to get the right solution, not any solution. I can not speak highly enough of Trude and the way she operates!<\/em><\/em><\/p>\n\n\n\n<h4 class=\"has-text-align-center wp-block-heading\" id=\"alan-hamilton-group-head-of-it-security-at-royal-london\"><strong>Alan Hamilton &#8211; Group Head of IT Security at Royal London<\/strong><\/h4>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\"><span aria-hidden=\"true\" class=\"has-background-dim-30 wp-block-cover__gradient-background has-background-dim\"><\/span><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"1123\" data-attachment-id=\"252\" data-permalink=\"https:\/\/uunify.io\/?attachment_id=252\" data-orig-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/08\/pexels-photo-3184431.jpeg?fit=868%2C1300&amp;ssl=1\" data-orig-size=\"868,1300\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"photo of people near wooden table\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Photo by fauxels on &lt;a href=&quot;https:\/\/www.pexels.com\/photo\/photo-of-people-near-wooden-table-3184431\/&quot; rel=&quot;nofollow&quot;&gt;Pexels.com&lt;\/a&gt;&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/08\/pexels-photo-3184431.jpeg?fit=684%2C1024&amp;ssl=1\" class=\"wp-block-cover__image-background wp-image-252\" src=\"https:\/\/i0.wp.com\/uunify.io\/wp-content\/uploads\/2020\/08\/pexels-photo-3184431.jpeg?resize=750%2C1123&#038;ssl=1\" style=\"object-position:50% 50%;\" data-object-fit=\"cover\" data-object-position=\"50% 50%\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-jetpack-layout-grid alignfull column1-desktop-grid__span-8 column1-desktop-grid__start-3 column1-desktop-grid__row-1 column1-tablet-grid__span-8 column1-tablet-grid__row-1 column1-mobile-grid__span-4 column1-mobile-grid__row-1\">\n<div class=\"wp-block-jetpack-layout-grid-column wp-block-jetpack-layout-grid__padding-none\">\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"would-you-like-to-book-an-introductory-call\">Would you like to book an introductory call?<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-3e41869c wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background-color has-text-color\" href=\"https:\/\/uunify.co.uk\/contact-us-uunify\/\" rel=\"#\">Book Appointment<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IT security is a set of cybersecurity strategies preventing unauthorized access to organisational assets such as endpoint, API, cloud, applications and more. The breadth of risk evolves continuously creating new hurdles\/obstacles for corporate business to overcome. Traditional security maintenance and policies focused around the datacentre is changing dramatically with the adoption of Public and Hybrid<a class=\"more-link\" href=\"https:\/\/uunify.io\/?page_id=144\">Continue reading <span class=\"screen-reader-text\">&#8220;Security Partners&#8221;<\/span><\/a><\/p>\n","protected":false},"author":191189345,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"footnotes":""},"class_list":["post-144","page","type-page","status-publish","hentry","entry"],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/PchH6V-2k","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/uunify.io\/index.php?rest_route=\/wp\/v2\/pages\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uunify.io\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uunify.io\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uunify.io\/index.php?rest_route=\/wp\/v2\/users\/191189345"}],"replies":[{"embeddable":true,"href":"https:\/\/uunify.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=144"}],"version-history":[{"count":25,"href":"https:\/\/uunify.io\/index.php?rest_route=\/wp\/v2\/pages\/144\/revisions"}],"predecessor-version":[{"id":949,"href":"https:\/\/uunify.io\/index.php?rest_route=\/wp\/v2\/pages\/144\/revisions\/949"}],"wp:attachment":[{"href":"https:\/\/uunify.io\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}