{"id":12,"date":"2012-06-07T03:52:06","date_gmt":"2012-06-07T03:52:06","guid":{"rendered":"http:\/\/112.109.118.49\/cdr\/wordpress\/?page_id=12"},"modified":"2012-06-07T14:51:44","modified_gmt":"2012-06-07T14:51:44","slug":"network-penetration-testing","status":"publish","type":"page","link":"https:\/\/cyberdefenseresearch.com\/?page_id=12","title":{"rendered":"Network Penetration Testing"},"content":{"rendered":"<p align=\"left\">In an interconnected world, testing your own network for vulnerabilities and to validate compliance to your security policy, is a necessity. Using the latest tools and techniques, specialized network penetration specialists can provide both internal and external assessment of your network. Your organization will be provided a confidential detailed assessment report, including recommendations on mitigating any weaknesses.<\/p>\n<table width=\"100%\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"48%\">To have a CDRI network penetration specialist contact you for a confidential discussion on your vulnerability assessment needs, click on the contact button above or the link below. Why wait until the bad guys find out what you should already know.<\/td>\n<td width=\"5%\"><\/td>\n<td width=\"47%\">\n<div align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyberdefenseresearch.com\/images\/network.jpg\" alt=\"\" width=\"175\" height=\"131\" border=\"1\" \/><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p align=\"left\"><strong>$5,000 in testing services now may save you $5,000,000 in recovery and lost Business later.\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an interconnected world, testing your own network for vulnerabilities and to validate compliance to your security policy, is a necessity. Using the latest tools and techniques, specialized network penetration specialists can provide both internal and external assessment of your &hellip; <a href=\"https:\/\/cyberdefenseresearch.com\/?page_id=12\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":28,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12"}],"version-history":[{"count":0,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/28"}],"wp:attachment":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}