{"id":513,"date":"2018-07-01T23:05:54","date_gmt":"2018-07-01T23:05:54","guid":{"rendered":"http:\/\/www1.scnresearch.com\/?page_id=513"},"modified":"2018-07-01T23:05:54","modified_gmt":"2018-07-01T23:05:54","slug":"firewalls","status":"publish","type":"page","link":"https:\/\/www.scnresearch.com\/index.php\/firewalls\/","title":{"rendered":"Firewalls"},"content":{"rendered":"<h1>Firewall Services<\/h1>\n<h2>Firewall Setup and Management<\/h2>\n<p>Cisco PIX setup, monitor, and management<\/p>\n<p>Symantec setup, monitor, and management<\/p>\n<p>Custom Firewall appliance setup, monitor, and management<\/p>\n<p>Firewall logs analyzed locally or remotely<\/p>\n<p>Ongoing rules management, alerts to new security requirements<\/p>\n<p>Repairs, upgrades, and preventative maintenance<\/p>\n<p>Managed Firewall services<\/p>\n<p>Security policy testing<\/p>\n<p>Penetration testing before and after firewall installation\/update<\/p>\n<p>Alerts via pager or email based on firewall incidents<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Firewall Services Firewall Setup and Management Cisco PIX setup, monitor, and management Symantec setup, monitor, and management Custom Firewall appliance setup, monitor, and management Firewall logs analyzed locally or remotely Ongoing rules management, alerts to new security requirements Repairs, upgrades, and preventative maintenance Managed Firewall services Security policy testing Penetration testing before and after firewall &hellip; <a href=\"https:\/\/www.scnresearch.com\/index.php\/firewalls\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Firewalls&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":446,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-513","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.scnresearch.com\/index.php\/wp-json\/wp\/v2\/pages\/513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scnresearch.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.scnresearch.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.scnresearch.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scnresearch.com\/index.php\/wp-json\/wp\/v2\/comments?post=513"}],"version-history":[{"count":0,"href":"https:\/\/www.scnresearch.com\/index.php\/wp-json\/wp\/v2\/pages\/513\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scnresearch.com\/index.php\/wp-json\/wp\/v2\/media\/446"}],"wp:attachment":[{"href":"https:\/\/www.scnresearch.com\/index.php\/wp-json\/wp\/v2\/media?parent=513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}