{"id":1833,"date":"2024-11-27T16:45:11","date_gmt":"2024-11-27T09:45:11","guid":{"rendered":"https:\/\/www.bizcon.co.th\/cyber-security\/"},"modified":"2025-01-12T22:49:05","modified_gmt":"2025-01-12T15:49:05","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n\t<section class=\"section hide-for-medium\" id=\"section_1793658343\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t<img decoding=\"async\" width=\"2048\" height=\"888\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/12\/Cyber-Security-banner-2048x888.webp\" class=\"bg attachment-2048x2048 size-2048x2048\" alt=\"\" \/>\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\t<div class=\"ux-shape-divider ux-shape-divider--bottom ux-shape-divider--style-waves-opacity-3\">\n\t\t<svg viewBox=\"0 0 1000 300\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" preserveAspectRatio=\"none\">\n\t<path class=\"ux-shape-fill\" opacity=\"0.05\" d=\"M1014 264V386H206L34 300C34 300 344.42 277.16 436 221C542 156 590 160 704 209C811 255 899.11 214.94 979 346L1014 264Z\"\/>\n\t<path class=\"ux-shape-fill\" opacity=\"0.1\" d=\"M-302 55C-302 55 -66.73 263.25 50 214C178 160 283 116 353 141C445.68 174.1 534.28 256.19 588 249C692.9 235 764.52 75.94 855 131C940.61 183.09 1000 254 1000 254V328L-306 338L-302 55Z\"\/>\n\t<path class=\"ux-shape-fill\" opacity=\"0.15\" d=\"M-286 255C-286 255 -72 152 52 126C176 100 255 155 436 227C581.57 284.91 614.7 277.79 708 227C787 184 1009 3.0001 1093 164C1146 265.63 1031 293 1031 293L924 377L-288 389L-286 255Z\"\/>\n\t<path class=\"ux-shape-fill\" opacity=\"0.3\" d=\"M-24 69C-24 69 275.68 370.66 389 314C397 310 622 316 673 356C690.47 369.7 845 224 890 182C944.8 130.85 1018 92 1078 143C1154.12 207.7 1196 242 1196 242L1184 374L-28 386L-24 69Z\"\/>\n\t<path class=\"ux-shape-fill\" d=\"M-12 201C-12 201 58 284 182 258C306 232 342.29 221.23 456 264C565 305 640.82 288.36 721 249C776 222 837.5 191.31 935 253C984 284 1030 279 1030 279L1024 430L-12 440V201Z\"\/>\n<\/svg>\n\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row\"  id=\"row-949347134\">\n\n\t<div id=\"col-624909264\" class=\"col small-12 large-12\"  data-animate=\"bounceIn\">\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-1936026893\" class=\"text\">\n\t\t\n<h2><span style=\"font-weight: 600;color:#fff\">Cyber Security<\/h2>\n\t\t\n<style>\n#text-1936026893 {\n  font-size: 1.2rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-1936026893 {\n    font-size: 1.4rem;\n  }\n}\n@media (min-width:850px) {\n  #text-1936026893 {\n    font-size: 1.7rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3773999699\" class=\"text\">\n\t\t\n<h2><span style=\"font-weight: 500;color:#fff\">Protect your organization with next-gen firewall, endpoint security,<br \/>\n and advanced vulnerability management solutions.<\/h2>\n\t\t\n<style>\n#text-3773999699 {\n  font-size: 0.75rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-3773999699 {\n    font-size: 0.9rem;\n  }\n}\n@media (min-width:850px) {\n  #text-3773999699 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"gap-175475733\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-175475733 {\n  padding-top: 10px;\n}\n@media (min-width:550px) {\n  #gap-175475733 {\n    padding-top: 15px;\n  }\n}\n@media (min-width:850px) {\n  #gap-175475733 {\n    padding-top: 15px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<a href=\"https:\/\/www.bizcon.co.th\/en\/contact-us\/\" class=\"button alert lowercase\"  >\n\t\t<span>Get Started<\/span>\n\t<i class=\"icon-angle-right\" aria-hidden=\"true\" ><\/i><\/a>\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-624909264 > .col-inner {\n  margin: -10px 0px -41px 0px;\n}\n@media (min-width:550px) {\n  #col-624909264 > .col-inner {\n    margin: 0px 0px -6px 0px;\n  }\n}\n@media (min-width:850px) {\n  #col-624909264 > .col-inner {\n    margin: 10px 0px 30px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1793658343 {\n  padding-top: 50px;\n  padding-bottom: 50px;\n}\n#section_1793658343 .section-bg-overlay {\n  background-color: rgba(0, 0, 0, 0.587);\n}\n#section_1793658343 .section-bg img {\n  object-position: 50% 50%;\n}\n#section_1793658343 .ux-shape-divider--bottom svg {\n  height: 100px;\n  --divider-width: 300%;\n}\n@media (min-width:550px) {\n  #section_1793658343 .section-bg-overlay {\n    background-color: rgba(0, 0, 0, 0.331);\n  }\n  #section_1793658343 .ux-shape-divider--bottom svg {\n    height: 150px;\n    --divider-width: 248%;\n  }\n}\n@media (min-width:850px) {\n  #section_1793658343 {\n    padding-top: 100px;\n    padding-bottom: 100px;\n  }\n  #section_1793658343 .ux-shape-divider--bottom svg {\n    --divider-width: 188%;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section\" id=\"section_1994059934\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"gap-770355390\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-770355390 {\n  padding-top: 0px;\n}\n@media (min-width:550px) {\n  #gap-770355390 {\n    padding-top: 30px;\n  }\n}\n@media (min-width:850px) {\n  #gap-770355390 {\n    padding-top: 50px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-444461746\">\n\n\t<div id=\"col-233506424\" class=\"col hide-for-medium medium-6 small-12 large-4\"  data-animate=\"fadeInLeft\">\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n<div class=\"row\"  id=\"row-1694037155\">\n\n\t<div id=\"col-1764066485\" class=\"col medium-12 small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center box-shadow-3\" style=\"background-color:rgb(255,255,255);\" >\n\t\t\t\n\t\t\t\n<div class=\"row\"  id=\"row-1330966832\">\n\n\t<div id=\"col-263084699\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-2535518027\" class=\"text\">\n\t\t\n<h3><span style=\"color:#031f42\">Cyber Security<\/span><\/h3>\n\t\t\n<style>\n#text-2535518027 {\n  font-size: 1.2rem;\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<hr>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-263084699 > .col-inner {\n  margin: 0px 0px -29px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1169608003\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-692333946\" class=\"text\">\n\t\t\n<p><img decoding=\"async\" class=\"alignnone wp-image-825\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" alt=\"\" width=\"20\" height=\"20\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-150x150.png 150w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003.png 512w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>\u00a0 \u00a0<a href=\"#NextGenFirewall\">Next-Generation Firewall (NGFW)<\/a><br \/><img decoding=\"async\" class=\"alignnone wp-image-825\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" alt=\"\" width=\"20\" height=\"20\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-150x150.png 150w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003.png 512w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>\u00a0 \u00a0<a href=\"#EndpointProtection\">Endpoint Protection<\/a> <br \/><img decoding=\"async\" class=\"alignnone wp-image-825\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" alt=\"\" width=\"20\" height=\"20\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-150x150.png 150w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003.png 512w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>\u00a0 \u00a0<a href=\"#VulnMgmt\">Vulnerability Management<\/a> <br \/><img decoding=\"async\" class=\"alignnone wp-image-825\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" alt=\"\" width=\"20\" height=\"20\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-150x150.png 150w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003.png 512w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>\u00a0 \u00a0<a href=\"#PrivilegedAccess\">Privileged Access Management (PAM)<\/a><\/p>\n\t\t\n<style>\n#text-692333946 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1169608003 > .col-inner {\n  margin: 0px 0px -29px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1764066485 > .col-inner {\n  padding: 20px 20px 20px 20px;\n  border-radius: 10px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"gap-1276634724\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1276634724 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-101140168\">\n\n\t<div id=\"col-1049485409\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"stack-1346239365\" class=\"stack stack-col justify-center items-stretch\">\n\t\t\n<a href=\"https:\/\/www.bizcon.co.th\/en\/enterprise-solutions\/\" class=\"button primary is-gloss\"  >\n\t\t<span>Enterprise Solutions<\/span>\n\t<\/a>\n\n<a href=\"https:\/\/www.bizcon.co.th\/en\/hybrid-solutions\/\" class=\"button primary is-gloss\"  >\n\t\t<span>Hybrid Solutions<\/span>\n\t<\/a>\n\n<a href=\"https:\/\/www.bizcon.co.th\/en\/enterprise-networking\/\" class=\"button primary is-gloss\"  >\n\t\t<span>Enterprise Networking<\/span>\n\t<\/a>\n\n<a href=\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/\" class=\"button primary is-gloss\"  >\n\t\t<span>Cyber Security<\/span>\n\t<\/a>\n\n<a href=\"https:\/\/www.bizcon.co.th\/en\/artificial-intelligent\/\" class=\"button primary is-gloss\"  >\n\t\t<span>Artificial Intelligent<\/span>\n\t<\/a>\n\n<a href=\"https:\/\/www.bizcon.co.th\/en\/services-support\/\" class=\"button primary is-gloss\"  >\n\t\t<span>Services &amp; Support<\/span>\n\t<\/a>\n\n\t\t\n<style>\n#stack-1346239365 > * {\n  --stack-gap: 1rem;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"gap-1682903200\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1682903200 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-1917708356\">\n\n\t<div id=\"col-2132627036\" class=\"col medium-12 small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center box-shadow-3\" style=\"background-color:rgb(51, 49, 50);\" >\n\t\t\t\n\t\t\t\n<div class=\"row\"  id=\"row-524301359\">\n\n\t<div id=\"col-1969543518\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-840185604\" class=\"text\">\n\t\t\n<h2><span style=\"color:#fff\">Have questions about Our Solutions?<\/span><\/h2>\n\t\t\n<style>\n#text-840185604 {\n  font-size: 1.2rem;\n  text-align: center;\n}\n@media (min-width:550px) {\n  #text-840185604 {\n    font-size: 1.2rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1969543518 > .col-inner {\n  margin: 0px 0px -29px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-481266697\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_614096755\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/phone-02.webp\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/phone-02.webp 512w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/phone-02-300x300.webp 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/phone-02-150x150.webp 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_614096755 {\n  width: 21%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2663983132\" class=\"text\">\n\t\t\n<p>Need help? Talk to an expert<\/p>\n\t\t\n<style>\n#text-2663983132 {\n  color: rgb(255,255,255);\n}\n#text-2663983132 > * {\n  color: rgb(255,255,255);\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-481266697 > .col-inner {\n  margin: 0px 0px -39px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"text-1291309179\" class=\"text\">\n\t\t\n<h2><span style=\"color:#fff\">0-2670-6599<\/span><\/h2>\n\t\t\n<style>\n#text-1291309179 {\n  font-size: 1.2rem;\n  text-align: center;\n}\n@media (min-width:550px) {\n  #text-1291309179 {\n    font-size: 1.2rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-2132627036 > .col-inner {\n  padding: 20px 20px 20px 20px;\n  border-radius: 10px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-233506424 > .col-inner {\n  border-radius: 10px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1765555272\" class=\"col medium-12 small-12 large-8\"  data-animate=\"fadeInUp\">\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1646332699\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner image-cover dark\" style=\"padding-top:56.25%;\">\n\t\t\t<img decoding=\"async\" width=\"2000\" height=\"1335\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/Cyber-Security.webp\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/Cyber-Security.webp 2000w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/Cyber-Security-300x200.webp 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/Cyber-Security-1024x684.webp 1024w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/Cyber-Security-768x513.webp 768w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/Cyber-Security-1536x1025.webp 1536w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1646332699 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #NextGenFirewall\" data-bullet=\"false\" data-link=\"#NextGenFirewall\" data-title=\"Next-Generation Firewall (NGFW)\" ><a name=\"NextGenFirewall\"><\/a><\/span>\n\t<div id=\"text-3348190527\" class=\"text\">\n\t\t\n<h2><span style=\"font-weight: 500;color:#002d56\">Cyber Security<\/span><\/h2>\n\t\t\n<style>\n#text-3348190527 {\n  font-size: 1.5rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-3348190527 {\n    font-size: 1.5rem;\n  }\n}\n@media (min-width:850px) {\n  #text-3348190527 {\n    font-size: 1.3rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-1025212123\">\n\n\t<div id=\"col-591061223\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-535792191\" class=\"text text1\">\n\t\t\n<h2><img decoding=\"async\" class=\"alignnone wp-image-825\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" alt=\"\" width=\"20\" height=\"20\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-150x150.png 150w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003.png 512w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>\u00a0 \u00a0Next-Generation Firewall (NGFW)<\/h2>\n<hr>\n\t\t\n<style>\n#text-535792191 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2804890630\" class=\"text\">\n\t\t\n<p><span style=\"color:#031f42\">Next-Generation Firewall (NGFW)<\/span> is a security system that combines the capabilities of a firewall with modern technologies such as <span style=\"color:#031f42\">Deep Packet Inspection (DPI), malware detection, pattern recognition, and application access control.<\/span> Additionally, it includes features for managing and controlling network usage, integrating SD-WAN systems, and preventing DDoS attacks, NGFW is an important tool for maintaining organizational security in the present era. <span style=\"color:#031f42\">BizCon solutions <\/span>can present leading products in the <span style=\"color:#031f42\">Fortinet<\/span> and <span style=\"color:#031f42\">Palo Alto<\/span> markets to customers according to their requirements. Both brands fully support important <span style=\"color:#031f42\">security features.<\/span><\/p>\n\t\t\n<style>\n#text-2804890630 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-1370396716\">\n\n\t<div id=\"col-1888710635\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-3915815439\" class=\"text\">\n\t\t\n<ul>\n<li><strong>Malware virus filtering :<\/strong> Working at the network package scan level, to help reduce the risk of direct network attacks<\/li>\n<li><strong>Intrusion Prevention System (IPS) :<\/strong> a cybersecurity system that detects and stops attacks from threats on the internet. It is responsible for monitoring and blocking intruders without relying on additional software or devices.<\/li>\n<li><strong>Deep Packet Inspection (DPI) :<\/strong> a technology used to examine network traffic and uses packet filtering to identify the location, identity, file type, route changes, or block specific data packets or payload code.<\/li>\n<li><strong>SD-WAN (Software-defined Wide-area Network) :<\/strong> a technology that separates the Data Plane and Control Plane using software to manage connectivity and services between data centers and branches or cloud usage. SD-WAN can support various types of connections such as MPLS, LTE, and Internet, that can dynamically select and segment routes for security within the organization.<\/li>\n<\/ul>\n\t\t\n<style>\n#text-3915815439 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1888710635 > .col-inner {\n  padding: 10px 0px 0px 0px;\n  margin: 0px 0px -25px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n<span class=\"scroll-to\" data-label=\"Scroll to: #EndpointProtection\" data-bullet=\"false\" data-link=\"#EndpointProtection\" data-title=\"Endpoint Protection\" ><a name=\"EndpointProtection\"><\/a><\/span>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-27233164\">\n\n\t<div id=\"col-1135912148\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-677688023\" class=\"text text1\">\n\t\t\n<h2><img decoding=\"async\" class=\"alignnone wp-image-825\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" alt=\"\" width=\"20\" height=\"20\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-150x150.png 150w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003.png 512w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>\u00a0 \u00a0Endpoint Protection<\/h2>\n<hr>\n\t\t\n<style>\n#text-677688023 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-813693109\" class=\"text\">\n\t\t\n<p><span style=\"color:#031f42\">Ransomware<\/span> is a <span style=\"color:#031f42\">cyber-threat<\/span> that damages worldwide organizations by encrypting their critical data and demanding ransom payments. The loss of important information, business disruptions, and reputational damage are the impacts that organizations must face. If not adequately prepared to handle it,<\/p>\n\t\t\n<style>\n#text-813693109 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-574842787\">\n\n\t<div id=\"col-1834483635\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-170338728\" class=\"text\">\n\t\t\n<h3>Important Ransomware prevention solution :<\/h3>\n\t\t\n<style>\n#text-170338728 {\n  font-size: 1.1rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-170338728 {\n    font-size: 1rem;\n  }\n}\n@media (min-width:850px) {\n  #text-170338728 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1973538400\" class=\"text\">\n\t\t\n<ul>\n<li><strong>Network Detection and Response (NDR)<\/strong> detects and responds to network attacks in a formal style.<\/li>\n<li><strong>Endpoint Detection and Response (EDR)<\/strong> detects and responds to threats on endpoint devices.<\/li>\n<li><strong>Security Information and Event Management (SIEM)<\/strong> collects and analyzes security data from various sources.<\/li>\n<\/ul>\n\t\t\n<style>\n#text-1973538400 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1834483635 > .col-inner {\n  margin: 0px 0px -30px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"text-789936921\" class=\"text\">\n\t\t\n<h3>ZTNA and SSE<\/h3>\n\t\t\n<style>\n#text-789936921 {\n  font-size: 1.1rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-789936921 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2813993703\" class=\"text text2\">\n\t\t\n<h5>Zero Trust Network Access (ZTNA)<\/h5>\n\t\t\n<style>\n#text-2813993703 {\n  font-size: 1rem;\n  text-align: left;\n  color: #0067b1;\n}\n#text-2813993703 > * {\n  color: #0067b1;\n}\n@media (min-width:550px) {\n  #text-2813993703 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-4145546644\" class=\"text\">\n\t\t\n<p><span style=\"color:#031f42\">Zero Trust Network Access (ZTNA)<\/span> is a network security system that operates on the principle of <span style=\"color:#031f42\">&#8220;zero trust&#8221;, <\/span>meaning that no trust is granted within the network. Each individual or device accessing the system must undergo continuous verification and validation, whether they are users within the organization or remote users. This system helps mitigate the risk of unauthorized intrusion and access.<\/p>\n\t\t\n<style>\n#text-4145546644 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3148648949\" class=\"text text2\">\n\t\t\n<h5>Security Service Edge (SSE) <\/h5>\n\t\t\n<style>\n#text-3148648949 {\n  font-size: 1rem;\n  text-align: left;\n  color: #0067b1;\n}\n#text-3148648949 > * {\n  color: #0067b1;\n}\n@media (min-width:550px) {\n  #text-3148648949 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3624377277\" class=\"text\">\n\t\t\n<p><span style=\"color:#031f42\">Security Service Edge (SSE)<\/span> is a network security system that emphasizes preventing unauthorized access to data and usage of applications outside the organization&#8217;s network. This system is a part of <span style=\"color:#031f42\">Secure Access Service Edge (SASE),<\/span> which combines encryption and network access in a centralized format.<\/p>\n\t\t\n<style>\n#text-3624377277 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-756166756\">\n\n\t<div id=\"col-754126555\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-509537730\" class=\"text\">\n\t\t\n<h3>Principles of SSE:<\/h3>\n\t\t\n<style>\n#text-509537730 {\n  font-size: 1.1rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-509537730 {\n    font-size: 1rem;\n  }\n}\n@media (min-width:850px) {\n  #text-509537730 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2034591840\" class=\"text\">\n\t\t\n<ul>\n<li>Access prevention: SSE helps prevent unauthorized access to data and applications outside the organization&#8217;s network by using various technologies to verify and authenticate correctness.<\/li>\n<li>Data encryption: SSE uses data encryption to protect information from unauthorized access.<\/li>\n<li>The inspection and analysis: SSE utilizes various tools and technologies to examine and analyze data movement and application usage.<\/li>\n<\/ul>\n\t\t\n<style>\n#text-2034591840 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-754126555 > .col-inner {\n  margin: 0px 0px -30px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n<div class=\"row align-center\"  id=\"row-1063098720\">\n\n\t<div id=\"col-1025373781\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-2631827637\" class=\"text\">\n\t\t\n<h3>Benefits of SSE:<\/h3>\n\t\t\n<style>\n#text-2631827637 {\n  font-size: 1.1rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-2631827637 {\n    font-size: 1rem;\n  }\n}\n@media (min-width:850px) {\n  #text-2631827637 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-4060943600\" class=\"text\">\n\t\t\n<ul>\n<li><strong>High efficiency : SSE<\/strong> helps reduce the risk of intrusion and unauthorized access.<\/li>\n<li><strong>High security : SSE<\/strong> helps improve data and application protection.<\/li>\n<li><strong>Quick access : SSE<\/strong> enables fast and secure access to data and applications outside the organization&#8217;s network.<\/li>\n<\/ul>\n\t\t\n<style>\n#text-4060943600 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #VulnMgmt\" data-bullet=\"false\" data-link=\"#VulnMgmt\" data-title=\"Vulnerability Management\" ><a name=\"VulnMgmt\"><\/a><\/span>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1025373781 > .col-inner {\n  margin: 0px 0px -30px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-1874080190\">\n\n\t<div id=\"col-400242219\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-2078234758\" class=\"text text1\">\n\t\t\n<h2><img decoding=\"async\" class=\"alignnone wp-image-825\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" alt=\"\" width=\"20\" height=\"20\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-150x150.png 150w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003.png 512w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>\u00a0 \u00a0Vulnerability Management <\/h2>\n<hr>\n\t\t\n<style>\n#text-2078234758 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-282166108\" class=\"text\">\n\t\t\n<p><span style=\"color:#031f42\">Vulnerability Management<\/span> is a solution that assists in automatically managing risks from vulnerabilities in the system, which is done by identifying, categorizing, and prioritizing vulnerabilities in the network so these tools can analyze and alert organizations to discovered risks, such as <span style=\"color:#031f42\">zero-day vulnerabilities and recently released CVEs,<\/span> along with comprehensive reporting capabilities and they provide efficient internal system penetration testing scans. These solutions help organizations maintain a secure environment and promptly address vulnerabilities.<\/p>\n\t\t\n<style>\n#text-282166108 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #PrivilegedAccess\" data-bullet=\"false\" data-link=\"#PrivilegedAccess\" data-title=\"Privileged Access Management (PAM)\" ><a name=\"PrivilegedAccess\"><\/a><\/span>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-492027891\">\n\n\t<div id=\"col-1148414572\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-2978234179\" class=\"text text1\">\n\t\t\n<h2><img decoding=\"async\" class=\"alignnone wp-image-825\" src=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" alt=\"\" width=\"20\" height=\"20\" srcset=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png 300w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-150x150.png 150w, https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003.png 512w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>\u00a0 \u00a0Privileged Access Management (PAM) <\/h2>\n<hr>\n\t\t\n<style>\n#text-2978234179 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1756783775\" class=\"text\">\n\t\t\n<p><span style=\"color:#031f42\">Privileged Access Management (PAM)<\/span> is a security approach that helps protect organizations from cyber attacks by monitoring, detecting, and preventing unauthorized access to critical resources. Using PAM ensures privileged access is specific, controlled, and governed by reliable policies. <\/p>\n\t\t\n<style>\n#text-1756783775 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-428355291\">\n\n\t<div id=\"col-197140014\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-2090330067\" class=\"text\">\n\t\t\n<h3>Key features of PAM solutions include :<\/h3>\n\t\t\n<style>\n#text-2090330067 {\n  font-size: 1.1rem;\n  text-align: left;\n}\n@media (min-width:550px) {\n  #text-2090330067 {\n    font-size: 1rem;\n  }\n}\n@media (min-width:850px) {\n  #text-2090330067 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1316104638\" class=\"text\">\n\t\t\n<ul>\n<li><strong>Discover all accounts<\/strong> and manage access to critical systems automatically.<\/li>\n<li><strong>Store and manage credentials store<\/strong> all accounts by using a vaulting system, and access them through a security broker system instead of direct usage to reduce the risk of unauthorized access.<\/li>\n<li><strong>Manage and monitor access to resources<\/strong> including limiting the privileges of super users, to ensure usage aligns with objectives and monitor in real-time and retrospectively for ease of auditing and daily routines.<\/li>\n<\/ul>\n\t\t\n<style>\n#text-1316104638 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-197140014 > .col-inner {\n  margin: 0px 0px -30px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"text-3141002687\" class=\"text text2\">\n\t\t\n<h5>Observability<\/h5>\n\t\t\n<style>\n#text-3141002687 {\n  font-size: 1rem;\n  text-align: left;\n  color: #0067b1;\n}\n#text-3141002687 > * {\n  color: #0067b1;\n}\n@media (min-width:550px) {\n  #text-3141002687 {\n    font-size: 1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2619866665\" class=\"text\">\n\t\t\n<p><span style=\"color:#031f42\">Observability<\/span> is a system used to monitor and measure the performance of a system or application, with the objective of enabling users to better understand and troubleshoot issues. This system is commonly used in the IT and technology industries to provide clear and easily accessible data for inspection.<\/p>\n\t\t\n<style>\n#text-2619866665 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-1049272294\">\n\n\t<div id=\"col-774229239\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-1679940331\" class=\"text\">\n\t\t\n<p><span style=\"color:#031f42\">The principle of Observability<\/span> is to generate useful data from the system&#8217;s operations and use that data to measure success and identify issues. It consists of three main components:<\/p>\n\t\t\n<style>\n#text-1679940331 {\n  text-align: left;\n  color: #0067b1;\n}\n#text-1679940331 > * {\n  color: #0067b1;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-4178965800\" class=\"text\">\n\t\t\n<ul>\n<li><strong>Metrics :<\/strong> Data that can be easily measured and take various forms, such as work speed, memory usage, or connectivity.<\/li>\n<li><strong>Logs :<\/strong> Recorded data from system operations, which can be used for troubleshooting and analysis.<\/li>\n<li><strong>Traces :<\/strong> Data that displays the movement of information or requests within the system used to provide an overview of the system&#8217;s operation.<\/li>\n<\/ul>\n\t\t\n<style>\n#text-4178965800 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-774229239 > .col-inner {\n  margin: 0px 0px -30px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"text-1083932519\" class=\"text\">\n\t\t\n<p>Observability systems allow users to quickly and efficiently detect and troubleshoot issues and it improves system reliability and trustworthiness.<\/p>\n\t\t\n<style>\n#text-1083932519 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1765555272 > .col-inner {\n  padding: 0px 0px 0px 0;\n  margin: 0px 0px -20px 0px;\n}\n@media (min-width:550px) {\n  #col-1765555272 > .col-inner {\n    padding: 0px 20px 0px 20px;\n    margin: 0px 0px -20px 0px;\n  }\n}\n@media (min-width:850px) {\n  #col-1765555272 > .col-inner {\n    margin: 0px 0px -20px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1994059934 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n#section_1994059934 .section-bg-overlay {\n  background-color: rgba(255, 255, 255, 0.8);\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section dark\" id=\"section_1767462952\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\r\n\r\n<div class=\"row align-middle align-center\"  id=\"row-435199754\">\r\n\r\n\n\t<div id=\"col-1456515789\" class=\"col medium-9 small-12 large-7\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n<div class=\"row\"  id=\"row-1381202445\">\r\n\r\n\n\t<div id=\"col-249122160\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\r\n\r\n\t<div id=\"text-4155280330\" class=\"text\">\n\t\t\r\n\r\n<h2><span style=\"font-weight: 600;\">IT Solutions Tailored for Your Business Success<\/h2>\r\n\t\t\n<style>\n#text-4155280330 {\n  font-size: 1.2rem;\n  color: rgb(255,255,255);\n}\n#text-4155280330 > * {\n  color: rgb(255,255,255);\n}\n@media (min-width:550px) {\n  #text-4155280330 {\n    font-size: 1rem;\n  }\n}\n@media (min-width:850px) {\n  #text-4155280330 {\n    font-size: 1.1rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-249122160 > .col-inner {\n  margin: 0px 0px -36px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\r\n\r\n<\/div>\r\n\t<div id=\"text-3513114680\" class=\"text\">\n\t\t\r\n\r\n<p>At BizCon Solutions, we are committed to empowering businesses with IT expertise.<\/p>\r\n\t\t\n<style>\n#text-3513114680 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\r\n\r\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1456515789 > .col-inner {\n  padding: 9px 0px 0px 0px;\n  margin: 10px 0px -30px 0px;\n}\n@media (min-width:850px) {\n  #col-1456515789 > .col-inner {\n    margin: 5px 0px -30px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\r\n\n\t<div id=\"col-1479444513\" class=\"col show-for-small medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\r\n\r\n<a href=\"https:\/\/www.bizcon.co.th\/en\/solutions-services\/\" class=\"button white is-gloss is-small lowercase\"  style=\"padding:5px 20px 5px 20px;\">\n\t\t<span>View All Solutions<\/span>\n\t<\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1479444513 > .col-inner {\n  margin: 10px 0px -30px 0px;\n}\n@media (min-width:850px) {\n  #col-1479444513 > .col-inner {\n    margin: 5px 0px -30px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\r\n\n\t<div id=\"col-402226817\" class=\"col hide-for-small medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner text-right\"  >\n\t\t\t\n\t\t\t\r\n\r\n<a href=\"https:\/\/www.bizcon.co.th\/en\/solutions-services\/\" class=\"button white is-gloss lowercase\"  style=\"padding:5px 20px 5px 20px;\">\n\t\t<span>View All Solutions<\/span>\n\t<\/a>\n\r\n\r\n\r\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-402226817 > .col-inner {\n  padding: 5 0px 0px 0px;\n  margin: 10px 0px -30px 0px;\n}\n@media (min-width:850px) {\n  #col-402226817 > .col-inner {\n    padding: 10px 0px 0px 0px;\n    margin: 5px 0px -30px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\r\n\r\n<\/div>\r\n\r\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1767462952 {\n  padding-top: 20px;\n  padding-bottom: 20px;\n}\n#section_1767462952 .section-bg-overlay {\n  background-color: #002d56;\n}\n<\/style>\n\t<\/section>\n\t\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1833","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security - bizcon<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - bizcon\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"bizcon\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-12T15:49:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/\",\"url\":\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/\",\"name\":\"Cyber Security - bizcon\",\"isPartOf\":{\"@id\":\"https:\/\/www.bizcon.co.th\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\",\"datePublished\":\"2024-11-27T09:45:11+00:00\",\"dateModified\":\"2025-01-12T15:49:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#primaryimage\",\"url\":\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\",\"contentUrl\":\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bizcon.co.th\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bizcon.co.th\/#website\",\"url\":\"https:\/\/www.bizcon.co.th\/\",\"name\":\"bizcon\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.bizcon.co.th\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bizcon.co.th\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bizcon.co.th\/#organization\",\"name\":\"BizCon Solutions\",\"url\":\"https:\/\/www.bizcon.co.th\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bizcon.co.th\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/logo-Bizcon03-1.webp\",\"contentUrl\":\"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/logo-Bizcon03-1.webp\",\"width\":1080,\"height\":1080,\"caption\":\"BizCon Solutions\"},\"image\":{\"@id\":\"https:\/\/www.bizcon.co.th\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - bizcon","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - bizcon","og_url":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/","og_site_name":"bizcon","article_modified_time":"2025-01-12T15:49:05+00:00","og_image":[{"url":"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/","url":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/","name":"Cyber Security - bizcon","isPartOf":{"@id":"https:\/\/www.bizcon.co.th\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png","datePublished":"2024-11-27T09:45:11+00:00","dateModified":"2025-01-12T15:49:05+00:00","breadcrumb":{"@id":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bizcon.co.th\/en\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#primaryimage","url":"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png","contentUrl":"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/up-chevron_4701003-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bizcon.co.th\/en\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bizcon.co.th\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.bizcon.co.th\/#website","url":"https:\/\/www.bizcon.co.th\/","name":"bizcon","description":"","publisher":{"@id":"https:\/\/www.bizcon.co.th\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bizcon.co.th\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bizcon.co.th\/#organization","name":"BizCon Solutions","url":"https:\/\/www.bizcon.co.th\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bizcon.co.th\/#\/schema\/logo\/image\/","url":"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/logo-Bizcon03-1.webp","contentUrl":"https:\/\/www.bizcon.co.th\/wp-content\/uploads\/2024\/11\/logo-Bizcon03-1.webp","width":1080,"height":1080,"caption":"BizCon Solutions"},"image":{"@id":"https:\/\/www.bizcon.co.th\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.bizcon.co.th\/en\/wp-json\/wp\/v2\/pages\/1833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bizcon.co.th\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bizcon.co.th\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bizcon.co.th\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bizcon.co.th\/en\/wp-json\/wp\/v2\/comments?post=1833"}],"version-history":[{"count":2,"href":"https:\/\/www.bizcon.co.th\/en\/wp-json\/wp\/v2\/pages\/1833\/revisions"}],"predecessor-version":[{"id":1966,"href":"https:\/\/www.bizcon.co.th\/en\/wp-json\/wp\/v2\/pages\/1833\/revisions\/1966"}],"wp:attachment":[{"href":"https:\/\/www.bizcon.co.th\/en\/wp-json\/wp\/v2\/media?parent=1833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}