{"id":682,"date":"2022-03-10T21:15:44","date_gmt":"2022-03-10T21:15:44","guid":{"rendered":"http:\/\/cqsintl.com\/?page_id=682"},"modified":"2022-03-29T22:57:19","modified_gmt":"2022-03-29T22:57:19","slug":"mitkat","status":"publish","type":"page","link":"https:\/\/cqsintl.com\/?page_id=682","title":{"rendered":"Security Management"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.14.8&#8243; background_color=&#8221;#0C71C3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004183&#8243; background_color_gradient_end=&#8221;#001f4c&#8221; background_color_gradient_type=&#8221;radial&#8221; background_image=&#8221;http:\/\/cqsintl.com\/wp-content\/uploads\/cyber-security-05-1.png&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;6vw||3px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;3.25.3&#8243; z_index=&#8221;10&#8243; custom_margin=&#8221;-70px|auto||auto||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_font_size=&#8221;56px&#8221; custom_margin=&#8221;-36px|-8px|-97px|||&#8221; custom_padding=&#8221;15px||17px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span style=\"color: #ffffff;\">Digital Facility Security Management<\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/cqsintl.com\/wp-content\/uploads\/Fire-Safety-App.178dccda.webp&#8221; title_text=&#8221;Fire-Safety-App.178dccda&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; width=&#8221;58%&#8221; custom_margin=&#8221;-31px|||||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px|||&#8221; bottom_divider_style=&#8221;wave2&#8243; bottom_divider_color=&#8221;#0C71C3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;37px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Digital Security Management<\/h1>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"text-align: left;\">24\/7 CCTV<strong> Camera monitoring<\/strong> and event reporting<\/li>\n<li style=\"text-align: left;\"><strong>Access control<\/strong> event reporting<\/li>\n<li style=\"text-align: left;\"><strong>Badge access<\/strong> provisioning and deprovisioning<\/li>\n<li style=\"text-align: left;\">Emergency events protocol <strong>Playbook<\/strong><\/li>\n<li style=\"text-align: left;\"><strong>Fire Alarm<\/strong> or intrusion alarm monitoring<\/li>\n<li style=\"text-align: left;\"><strong>Data Center<\/strong> alarm monitoring and reporting<\/li>\n<li style=\"text-align: left;\"><strong>Risk Intelligence<\/strong> monitoring with <strong>MitKat<\/strong> software<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/cqsintl.com\/wp-content\/uploads\/hand-touching-tablet_1134-117.webp&#8221; title_text=&#8221;hand-touching-tablet_1134-117&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;off||86px||70px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_style=&#8221;preset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; header_font=&#8221;|700|||||||&#8221; header_text_color=&#8221;#0C71C3&#8243; header_font_size=&#8221;56px&#8221; header_2_text_color=&#8221;#08398e&#8221; custom_margin=&#8221;-4px|||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\">Mitkat<\/h1>\n<h2 style=\"text-align: center;\">Mitigating Knowledge Age Threats<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;6px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Security Risk Assessment&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe0d9;||divi||400&#8243; icon_color=&#8221;#0C71C3&#8243; image_icon_width=&#8221;62px&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li>Threat Vulnerability Risk Assessment for site<\/li>\n<li>Physical &amp; Environmental<br \/>Security Risk Assessment<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Security Design and Project Management&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf5a1;||fa||900&#8243; icon_color=&#8221;#0C71C3&#8243; image_icon_width=&#8221;62px&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|600|||||||&#8221; body_font=&#8221;Overpass||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li>Security design of<br \/>greenfield or brownfield facilities as per the Organization\u2019s Security Concept of Operations<\/li>\n<li>Cost Optimization<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Physical Security and Safety Audits&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf4fc;||fa||900&#8243; icon_color=&#8221;#0C71C3&#8243; image_icon_width=&#8221;62px&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li><span class=\"markedContent\" id=\"page128R_mcid69\"><span style=\"left: 652.832px; top: 375.932px; font-size: 21.0476px; font-family: sans-serif; transform: scaleX(0.999071);\" role=\"presentation\" dir=\"ltr\"><\/span><\/span>Security Audit and<br \/>Advisory<\/li>\n<li>Fire and Life-Safety<br \/>Audits<\/li>\n<li>App-based Security<br \/>and Safety tools<br \/>and dashboards<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;SOC Design, Staffing and Intel Platform&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf2db;||fa||900&#8243; icon_color=&#8221;#0C71C3&#8243; image_icon_width=&#8221;62px&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li><span class=\"markedContent\" id=\"page128R_mcid69\"><span style=\"left: 652.832px; top: 375.932px; font-size: 21.0476px; font-family: sans-serif; transform: scaleX(0.999071);\" role=\"presentation\" dir=\"ltr\"><\/span><\/span>Custom design for<br \/>client requirements<\/li>\n<li>Embedded Intelligence<br \/>specialists and SOC<br \/>Operators<\/li>\n<li>Risk Intel platform<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Testimonials&#8221; _builder_version=&#8221;4.14.8&#8243; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;0vw||0vw||true|&#8221; custom_margin_tablet=&#8221;0vw||&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;7px||21px|||&#8221; top_divider_style=&#8221;wave2&#8243; top_divider_color=&#8221;#0C71C3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;18px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_color=&#8221;#0C71C3&#8243; header_font_size=&#8221;56px&#8221; header_2_text_color=&#8221;#08398e&#8221; custom_margin=&#8221;61px|||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\">SOC Services<\/h1>\n<h2 style=\"text-align: center;\">Simple, SmartCloud Manage Building<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/cqsintl.com\/wp-content\/uploads\/Risk-Intelligence-Platform.7845ea10-1.png&#8221; title_text=&#8221;Risk Intelligence Platform.7845ea10&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-63px|||||&#8221; custom_padding=&#8221;37px|||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;77px|||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>SOC \u2013 Risk and Intelligence Monitoring Engine (RIME)<\/strong> and Mobile App<\/h3>\n<p>An AI-assisted search engine that enables SOC teams to conduct real-time OSINT monitoring of risk events across information sources &amp; geographies.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Risk mitigation&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x73;||divi||400&#8243; icon_color=&#8221;#0C71C3&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Through custom-made security designs for each client based on their needs.\u00a0 Expertise from your top of the line customers, with our cultural affinity and over 50+ years of experienced agents, it is the perfect combination.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;COVID-19&#8243; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe00a;||divi||400&#8243; icon_color=&#8221;#0C71C3&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Has opened new opportunities for remote operations. It is<strong> paramount<\/strong> that we evolve and expand our portfolio.\u00a0 The world has changed and we have the opportunity to take it all.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Global security&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe0e3;||divi||400&#8243; icon_color=&#8221;#0C71C3&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.13.0&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Operation<\/strong> center for facilities with our SOC.\u00a0 Cost effective solutions for our clients.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.11.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;We provide&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x6f;||divi||400&#8243; icon_color=&#8221;#0C71C3&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.13.0&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Round-the-clock<\/strong> monitoring for threats and the ability to engage immediately in incident response.\u00a0 SD WAN security for our customers.\u00a0 They need to feel protected and trust our operation.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Resources&#8221; _builder_version=&#8221;3.25.3&#8243; custom_margin=&#8221;||&#8221; custom_padding=&#8221;0px|||||&#8221; top_divider_style=&#8221;slant&#8221; top_divider_color=&#8221;#f1fafe&#8221; top_divider_height=&#8221;27vw&#8221; top_divider_flip=&#8221;horizontal&#8221; bottom_divider_height=&#8221;20vw&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; custom_padding_last_edited=&#8221;off|phone&#8221; _builder_version=&#8221;3.25.3&#8243; custom_margin=&#8221;||-6vw&#8221; custom_padding=&#8221;||10vw|||&#8221; custom_padding_tablet=&#8221;||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.3&#8243; transform_scale_tablet=&#8221;&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;0px|156px&#8221; transform_translate_tablet=&#8221;0px|0px&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|tablet&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|tablet&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;What does it do?&#8221; image=&#8221;http:\/\/cqsintl.com\/wp-content\/uploads\/cyber-security-icon-29.png&#8221; _builder_version=&#8221;4.14.8&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;-152px|||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: left;\">AI-assisted platform that monitors events based on pre-determined risk parameters.<\/li>\n<li style=\"text-align: left;\">Real-time access to information by reducing the time lag which is typically taken by various agencies in collecting and processing information.<\/li>\n<li style=\"text-align: left;\">Multiple filters, features for customized<br \/>information access.<\/li>\n<li style=\"text-align: left;\">User-friendly interface.<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Value Proposition&#8221; image=&#8221;http:\/\/cqsintl.com\/wp-content\/uploads\/cyber-security-icon-6.png&#8221; _builder_version=&#8221;4.14.8&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: left;\">RIME enables real-time monitoring, saving<br \/>almost 30 minutes per update.<\/li>\n<li style=\"text-align: left;\">RIME can reduce the effort by command centrer<br \/>resources significantly since manual search can<br \/>be eliminated.<\/li>\n<li style=\"text-align: left;\">Inhouse development team with willingness to<br \/>work collaboratively and incorporate Client&#8217;s<br \/>suggestions.<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;How is it different?&#8221; image=&#8221;http:\/\/cqsintl.com\/wp-content\/uploads\/cyber-security-icon-10.png&#8221; _builder_version=&#8221;4.14.8&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: left;\">Unparalleled search depth with ability to track twitter as well as vernacular news sources. Other similar platforms do not have this level of integration.<\/li>\n<li style=\"text-align: left;\">Auto classification of risk events into category, levels, threshold (sentiment analysis) by inbuilt algorithms.<\/li>\n<li style=\"text-align: left;\">Geo-tagging of asset locations for assessing information relevancy and impact.<\/li>\n<li style=\"text-align: left;\">Feasibility to customize parameters according to Client\u2019s internal procedures.<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Facility Security ManagementDigital Security Management &nbsp; 24\/7 CCTV Camera monitoring and event reporting Access control event reporting Badge access provisioning and deprovisioning Emergency events protocol Playbook Fire Alarm or intrusion alarm monitoring Data Center alarm monitoring and reporting Risk Intelligence monitoring with MitKat software &nbsp;Mitkat Mitigating Knowledge Age Threats Threat Vulnerability Risk Assessment for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_mi_skip_tracking":false},"_links":{"self":[{"href":"https:\/\/cqsintl.com\/index.php?rest_route=\/wp\/v2\/pages\/682"}],"collection":[{"href":"https:\/\/cqsintl.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cqsintl.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cqsintl.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cqsintl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=682"}],"version-history":[{"count":40,"href":"https:\/\/cqsintl.com\/index.php?rest_route=\/wp\/v2\/pages\/682\/revisions"}],"predecessor-version":[{"id":876,"href":"https:\/\/cqsintl.com\/index.php?rest_route=\/wp\/v2\/pages\/682\/revisions\/876"}],"wp:attachment":[{"href":"https:\/\/cqsintl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}