{"id":7759,"date":"2023-02-20T15:46:24","date_gmt":"2023-02-20T07:46:24","guid":{"rendered":"https:\/\/www.billows.tech\/identifying-protecting\/"},"modified":"2023-04-25T22:21:00","modified_gmt":"2023-04-25T14:21:00","slug":"identifying-protecting","status":"publish","type":"page","link":"https:\/\/www.billows.tech\/en\/billows-tech\/the-solution\/identifying-protecting\/","title":{"rendered":"Identifying &amp; Protecting"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7759\" class=\"elementor elementor-7759 elementor-4832\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54f9f2b7 e-con-boxed e-con\" data-id=\"54f9f2b7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c5f1c06 elementor-widget elementor-widget-heading\" data-id=\"5c5f1c06\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.12.1 - 02-04-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">We offer a four-step approach to help you in deploying Billows UCM:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2f324f e-con-boxed e-con\" data-id=\"c2f324f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb7dadf elementor-nav-menu__align-center elementor-nav-menu--dropdown-tablet elementor-nav-menu__text-align-aside elementor-nav-menu--toggle elementor-nav-menu--burger elementor-widget elementor-widget-nav-menu\" data-id=\"cb7dadf\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;horizontal&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;svg class=\\&quot;e-font-icon-svg e-fas-caret-down\\&quot; viewBox=\\&quot;0 0 320 512\\&quot; xmlns=\\&quot;http:\\\/\\\/www.w3.org\\\/2000\\\/svg\\&quot;&gt;&lt;path d=\\&quot;M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\\&quot;&gt;&lt;\\\/path&gt;&lt;\\\/svg&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;toggle&quot;:&quot;burger&quot;}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/www.billows.tech\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-nav-menu.min.css\">\t\t\t<nav class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-horizontal e--pointer-underline e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-cb7dadf\" class=\"elementor-nav-menu\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5501\"><a href=\"https:\/\/www.billows.tech\/home\/solutions\/ucm-identify\/\" class=\"elementor-item menu-link\">Identifying &amp; Protecting<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5503\"><a href=\"https:\/\/www.billows.tech\/home\/solutions\/ucm-monitor\/\" class=\"elementor-item menu-link\">Threat Detection<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5502\"><a href=\"https:\/\/www.billows.tech\/home\/solutions\/ucm-respond\/\" class=\"elementor-item menu-link\">Adaptive Response<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5500\"><a href=\"https:\/\/www.billows.tech\/home\/solutions\/ucm-tracing\/\" class=\"elementor-item menu-link\">Incident Management<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t<div class=\"elementor-menu-toggle\" role=\"button\" tabindex=\"0\" aria-label=\"Menu Toggle\" aria-expanded=\"false\">\n\t\t\t<svg aria-hidden=\"true\" role=\"presentation\" class=\"elementor-menu-toggle__icon--open e-font-icon-svg e-eicon-menu-bar\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M104 333H896C929 333 958 304 958 271S929 208 896 208H104C71 208 42 237 42 271S71 333 104 333ZM104 583H896C929 583 958 554 958 521S929 458 896 458H104C71 458 42 487 42 521S71 583 104 583ZM104 833H896C929 833 958 804 958 771S929 708 896 708H104C71 708 42 737 42 771S71 833 104 833Z\"><\/path><\/svg><svg aria-hidden=\"true\" role=\"presentation\" class=\"elementor-menu-toggle__icon--close e-font-icon-svg e-eicon-close\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M742 167L500 408 258 167C246 154 233 150 217 150 196 150 179 158 167 167 154 179 150 196 150 212 150 229 154 242 171 254L408 500 167 742C138 771 138 800 167 829 196 858 225 858 254 829L496 587 738 829C750 842 767 846 783 846 800 846 817 842 829 829 842 817 846 804 846 783 846 767 842 750 829 737L588 500 833 258C863 229 863 200 833 171 804 137 775 137 742 167Z\"><\/path><\/svg>\t\t\t<span class=\"elementor-screen-only\">Menu<\/span>\n\t\t<\/div>\n\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-cb7dadf\" class=\"elementor-nav-menu\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5501\"><a href=\"https:\/\/www.billows.tech\/home\/solutions\/ucm-identify\/\" class=\"elementor-item menu-link\" tabindex=\"-1\">Identifying &amp; Protecting<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5503\"><a href=\"https:\/\/www.billows.tech\/home\/solutions\/ucm-monitor\/\" class=\"elementor-item menu-link\" tabindex=\"-1\">Threat Detection<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5502\"><a href=\"https:\/\/www.billows.tech\/home\/solutions\/ucm-respond\/\" class=\"elementor-item menu-link\" tabindex=\"-1\">Adaptive Response<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5500\"><a href=\"https:\/\/www.billows.tech\/home\/solutions\/ucm-tracing\/\" class=\"elementor-item menu-link\" tabindex=\"-1\">Incident Management<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c158516 e-con-boxed e-con\" data-id=\"c158516\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1f48ef1 e-con-full e-con\" data-id=\"1f48ef1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8db0435 elementor-widget elementor-widget-image\" data-id=\"8db0435\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.12.1 - 02-04-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"321\" height=\"321\" src=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u8cc7\u5b89\u5408\u898f\u8f14\u5c0e\u670d\u52d90D0A.png\" class=\"attachment-large size-large wp-image-5004\" alt=\"\" srcset=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u8cc7\u5b89\u5408\u898f\u8f14\u5c0e\u670d\u52d90D0A.png 321w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u8cc7\u5b89\u5408\u898f\u8f14\u5c0e\u670d\u52d90D0A-300x300.png 300w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u8cc7\u5b89\u5408\u898f\u8f14\u5c0e\u670d\u52d90D0A-150x150.png 150w\" sizes=\"(max-width: 321px) 100vw, 321px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9a0c8e e-con-full e-con\" data-id=\"a9a0c8e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c598f27 elementor-widget elementor-widget-heading\" data-id=\"c598f27\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security Compliance Service<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c98e152 elementor-widget elementor-widget-text-editor\" data-id=\"c98e152\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.12.1 - 02-04-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Based on the compliance requirement, security consultant will advise and assist customers to get certified by international standard certification<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a1efeb e-con-boxed e-con\" data-id=\"5a1efeb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-72f30f1 e-con-full e-con\" data-id=\"72f30f1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d2468 elementor-widget elementor-widget-image\" data-id=\"52d2468\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"321\" height=\"321\" src=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u4f01\u696d\u8cc7\u5b89\u8a55\u7d1a\u670d\u52d90D0A.png\" class=\"attachment-large size-large wp-image-5005\" alt=\"\" srcset=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u4f01\u696d\u8cc7\u5b89\u8a55\u7d1a\u670d\u52d90D0A.png 321w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u4f01\u696d\u8cc7\u5b89\u8a55\u7d1a\u670d\u52d90D0A-300x300.png 300w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u4f01\u696d\u8cc7\u5b89\u8a55\u7d1a\u670d\u52d90D0A-150x150.png 150w\" sizes=\"(max-width: 321px) 100vw, 321px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47d062d e-con-full e-con\" data-id=\"47d062d\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c031fde elementor-widget elementor-widget-heading\" data-id=\"c031fde\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Enterprise Security Rating service<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e9913d elementor-widget elementor-widget-text-editor\" data-id=\"6e9913d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Consultant help organizations measure their digital resilience by having interview, questionnaire fills-in and etc, in order to evaluate their existing cybersecurity posture for maturity assessment and provide advice for improvement.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c444af e-con-boxed e-con\" data-id=\"1c444af\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7dd3aed e-con-full e-con\" data-id=\"7dd3aed\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62a1bb1 elementor-widget elementor-widget-image\" data-id=\"62a1bb1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"321\" height=\"321\" src=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u4f9b\u61c9\u93c8\u98a8\u96aa\u7ba1\u7406\u670d\u52d9.png\" class=\"attachment-large size-large wp-image-5008\" alt=\"\" srcset=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u4f9b\u61c9\u93c8\u98a8\u96aa\u7ba1\u7406\u670d\u52d9.png 321w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u4f9b\u61c9\u93c8\u98a8\u96aa\u7ba1\u7406\u670d\u52d9-300x300.png 300w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u4f9b\u61c9\u93c8\u98a8\u96aa\u7ba1\u7406\u670d\u52d9-150x150.png 150w\" sizes=\"(max-width: 321px) 100vw, 321px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-876fd9c e-con-full e-con\" data-id=\"876fd9c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e44096 elementor-widget elementor-widget-heading\" data-id=\"4e44096\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Supply Chain Risk Management Service<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1af673a elementor-widget elementor-widget-text-editor\" data-id=\"1af673a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Assisting organizations to implement an automated third-party supply chain risk and management platform and providing managed service and consulting service.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ffa4037 e-con-boxed e-con\" data-id=\"ffa4037\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-601df18 e-con-full e-con\" data-id=\"601df18\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85ec97c elementor-widget elementor-widget-image\" data-id=\"85ec97c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"321\" height=\"321\" src=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u8cc7\u5b89\u98a8\u96aa\u6aa2\u6e2c\u8a55\u4f30\u670d\u52d90D0A.png\" class=\"attachment-large size-large wp-image-5007\" alt=\"\" srcset=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u8cc7\u5b89\u98a8\u96aa\u6aa2\u6e2c\u8a55\u4f30\u670d\u52d90D0A.png 321w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u8cc7\u5b89\u98a8\u96aa\u6aa2\u6e2c\u8a55\u4f30\u670d\u52d90D0A-300x300.png 300w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u8cc7\u5b89\u98a8\u96aa\u6aa2\u6e2c\u8a55\u4f30\u670d\u52d90D0A-150x150.png 150w\" sizes=\"(max-width: 321px) 100vw, 321px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ff73fe e-con-full e-con\" data-id=\"6ff73fe\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7c193f elementor-widget elementor-widget-heading\" data-id=\"f7c193f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security risk Assessment Service<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20d8877 elementor-widget elementor-widget-text-editor\" data-id=\"20d8877\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul>\n \t<li><b>Penetration Test<\/b>: Utilizing hacker mindset and combining with manually select tools to target customer site to look for potential vulnerabilities in the goal of fully evaluating their security.<\/li>\n \t<li><b>Vulnerability Assessment:<\/b> Using automated vulnerability scanner to detect and classify weaknesses in computers, networks and communications equipment.<\/li>\n \t<li><b>Source Code Analysis<\/b>: Using source code analysis to find potential trouble spots in source code to take a proactive approach to safeguard organizations\u2019 applications and mitigate vulnerabilities.<\/li>\n \t<li><b>Security Health-check<\/b>: Thru manual or partially automated tools to collect data and provide professional advice for the following items to improve organizations\u2019 security status:\n<span>\nNetwork architecture and Topology Analysis\/ Wired Network Malicious Activities\/ User-Side and Server-Side Computer Malicious Codes or Files Check\/ Terminal and Sever Host Software Installation and System Incident Check\/ Wired Network and Private Device Detection Service\/ Password and Account Lockout Policy in Active Directory Server Check\/ Firewall Connecting Policy Check \/ Linux System Security Check\/Wired Network Security Check<\/span><\/li>\n \t<li><b>Social Engineering<\/b>: Email Social Engineering Drill. Simulate hacker phishing emails to test employee and to evaluate their cybersecurity awareness.<\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ac4816 e-con-boxed e-con\" data-id=\"8ac4816\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0a59c93 e-con-full e-con\" data-id=\"0a59c93\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07a7063 elementor-widget elementor-widget-image\" data-id=\"07a7063\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"321\" height=\"321\" src=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u60c5\u8cc7\u8a0a\u606f\u5206\u4eab\u63a8.png\" class=\"attachment-large size-large wp-image-5420\" alt=\"\" srcset=\"https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u60c5\u8cc7\u8a0a\u606f\u5206\u4eab\u63a8.png 321w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u60c5\u8cc7\u8a0a\u606f\u5206\u4eab\u63a8-300x300.png 300w, https:\/\/www.billows.tech\/wp-content\/uploads\/2023\/02\/\u60c5\u8cc7\u8a0a\u606f\u5206\u4eab\u63a8-150x150.png 150w\" sizes=\"(max-width: 321px) 100vw, 321px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c7bec1 e-con-full e-con\" data-id=\"8c7bec1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5408aba elementor-widget elementor-widget-heading\" data-id=\"5408aba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence Push Notification Service<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5025f31 elementor-widget elementor-widget-text-editor\" data-id=\"5025f31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Building a cybersecurity social media to share the latest security news and incidents from time to time to. With the push notifications, customers will receive the most up-to-date information.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We offer a four-step approach to help you in deploying Billows UCM: Security Compliance Service Based on the compliance requirement, security consultant will advise and assist customers to get certified by international standard certification Enterprise Security Rating service Consultant help organizations measure their digital resilience by having interview, questionnaire fills-in and etc, in order to &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.billows.tech\/en\/billows-tech\/the-solution\/identifying-protecting\/\"> <span class=\"screen-reader-text\">Identifying &amp; Protecting<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":7774,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"disabled","ast-featured-img":"disabled","footer-sml-layout":"disabled","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/pages\/7759"}],"collection":[{"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/comments?post=7759"}],"version-history":[{"count":2,"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/pages\/7759\/revisions"}],"predecessor-version":[{"id":8029,"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/pages\/7759\/revisions\/8029"}],"up":[{"embeddable":true,"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/pages\/7774"}],"wp:attachment":[{"href":"https:\/\/www.billows.tech\/en\/wp-json\/wp\/v2\/media?parent=7759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}