{"id":753,"date":"2024-09-10T17:41:18","date_gmt":"2024-09-10T14:41:18","guid":{"rendered":"https:\/\/www.dremsoc.com\/?page_id=753"},"modified":"2026-03-22T17:35:39","modified_gmt":"2026-03-22T15:35:39","slug":"home","status":"publish","type":"page","link":"https:\/\/www.dremsoc.com\/he\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"753\" class=\"elementor elementor-753\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f724df e-flex e-con-boxed e-con e-parent\" data-id=\"6f724df\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/www.socrates-cyber.co\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/29.4.25_2-1-1.mp4&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div>\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500.2,94.7L0,0v100h1000V0L500.2,94.7z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f1ef70 e-con-full e-flex e-con e-child\" data-id=\"2f1ef70\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83ef961 text-center elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"83ef961\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Security Services &amp; SIEM\/SOC Monitoring<br>\n<span style=\"font-size:0.75em;font-weight:500;opacity:0.9\">for Businesses<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9373c5 elementor-mobile-align-center elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c9373c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.dremsoc.com\/he\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Free Consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-921ae34 e-con-full e-flex e-con e-child\" data-id=\"921ae34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe1e74 text-center elementor-widget elementor-widget-heading\" data-id=\"4fe1e74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Next-Gen SIEM &amp; SOC Monitoring Solution<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da73aae text-center elementor-widget elementor-widget-heading\" data-id=\"da73aae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"font-size:0.75em;display:block;margin-top:12px\">\nReal-Time Threat Detection, Security Monitoring &amp; Response\n<\/span>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aeef099 e-flex e-con-boxed e-con e-parent\" data-id=\"aeef099\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56b6ddb e-con-full e-flex e-con e-child\" data-id=\"56b6ddb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af4c3ee elementor-widget elementor-widget-image\" data-id=\"af4c3ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1902\" height=\"2054\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Shape-_27-1.png\" class=\"attachment-full size-full wp-image-766\" alt=\"\" srcset=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Shape-_27-1.png 1902w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Shape-_27-1-278x300.png 278w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Shape-_27-1-948x1024.png 948w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Shape-_27-1-768x829.png 768w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Shape-_27-1-1422x1536.png 1422w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Shape-_27-1-1896x2048.png 1896w\" sizes=\"(max-width: 1902px) 100vw, 1902px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20411b6 e-con-full e-flex e-con e-child\" data-id=\"20411b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c0c37b elementor-widget elementor-widget-heading\" data-id=\"1c0c37b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About Our Cyber Security &amp; SIEM\/SOC Experts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d54c96 elementor-widget-divider--view-line_icon elementor-widget-divider--element-align-right div-one elementor-view-default elementor-widget elementor-widget-divider\" data-id=\"8d54c96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e51ea44 elementor-widget elementor-widget-html\" data-id=\"e51ea44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n\n p, h1,h2,h3, h4{\n    direction: ltr ;\n\n    \n}\n\nhtml[lang=\"iw\"] .a-right p, html[lang=\"iw\"] h1, html[lang=\"iw\"] h2, html[lang=\"iw\"] h3, html[lang=\"iw\"] h4 {\n   \/* Set text direction to RTL \n    -to-right *\/\n      direction: rtl !important ;\n    text-align: right !important;\n      \/*direction: rtl !important;*\/\n}\n.hebShow{\n    display: none;\n    \n}\n.hebShow p{\n      direction: rtl !important\n}\n\nhtml[lang=\"iw\"] .hebShow{\n    display: block !important;\n}\n\nhtml[lang=\"iw\"] .midP {\n   display: none;\n}\n\nhtml[lang=\"iw\"] .div-one .elementor-divider{\n    flex-direction: column-reverse;\n   \n}\n\nhtml[lang=\"iw\"] .div-one .elementor-divider-separator{\n     margin: 0 !important;\n}\n\nhtml[lang=\"iw\"] .mitta h2{\n    text-align: center !important;\n} \n\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffc136b a-right elementor-widget elementor-widget-text-editor\" data-id=\"ffc136b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The company Secterious (Eitan Freimovich and Rony Atias) and the company ShvoIT (Moshe Shvo) used their extensive experience as CISOs and penetration testers for a wide range of organizations to develop a managed and innovative cyber security service, including SIEM solutions and SOC monitoring services. This service, designed specifically for small and medium-sized businesses, is based on strong open source technologies and is tailored to meet the unique security needs of each customer.<\/p><p>Our team, which boasts over 20 years of experience in cyber security, threat detection, and digital investigations, is made up of leading experts trained in leading cyber security companies and the IDF&#8217;s elite cyber units. We operate according to a customized methodology, which provides a response not only to the immediate needs of your organization but also prepares it to proactively deal with future cyber threats.<\/p><p>Understanding that the field of cyber security is constantly evolving, we undertake to keep our SIEM and SOC monitoring services updated according to the latest technological advances, to provide real-time protection and maximum security for your organization.<\/p><p>By combining innovation, deep expertise and a personalized approach, we provide comprehensive solutions for security incident management, continuous monitoring, and cyber threat prevention. Our mission is to strengthen your organization&#8217;s capabilities in detecting, responding to and preventing cyber attacks, and to ensure its stability in the face of evolving threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9011cc elementor-mobile-align-center elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c9011cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.dremsoc.com\/he\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff8b2ee e-flex e-con-boxed e-con e-parent\" data-id=\"ff8b2ee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500.2,94.7L0,0v100h1000V0L500.2,94.7z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-96317e3 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"96317e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29077cc elementor-widget elementor-widget-html\" data-id=\"29077cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n    .info-box{\n        backdrop-filter: blur(5px);\n    }\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dcf6da elementor-widget elementor-widget-heading\" data-id=\"6dcf6da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why we are experts for small and medium businesses<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4f14f4 elementor-widget-divider--view-line_icon elementor-widget-divider--element-align-right elementor-view-default elementor-widget elementor-widget-divider\" data-id=\"e4f14f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-936bf8c e-con-full e-flex e-con e-child\" data-id=\"936bf8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f59ce44 e-con-full info-box e-flex e-con e-child\" data-id=\"f59ce44\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbbf1ed elementor-widget elementor-widget-heading\" data-id=\"bbbf1ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">01<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bac079a elementor-widget elementor-widget-heading\" data-id=\"bac079a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Economic Optimization And Cost Maximization in Cyber Security:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4181d0 elementor-widget elementor-widget-text-editor\" data-id=\"b4181d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Reducing costs while improving cyber security and SIEM\/SOC monitoring capabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ef13c6 e-con-full e-flex e-con e-child\" data-id=\"8ef13c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ba1f652 e-con-full info-box e-flex e-con e-child\" data-id=\"ba1f652\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-079d3d4 elementor-widget elementor-widget-heading\" data-id=\"079d3d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">02<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f060049 elementor-widget elementor-widget-heading\" data-id=\"f060049\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expansion Of Your Cyber Security &amp; SOC Team:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ed07db elementor-widget elementor-widget-text-editor\" data-id=\"2ed07db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enhances your organization\u2019s ability to handle cyber threats efficiently through advanced SOC monitoring services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-504076a e-con-full e-flex e-con e-child\" data-id=\"504076a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5cad218 e-con-full info-box e-flex e-con e-child\" data-id=\"5cad218\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cc8c75 elementor-widget elementor-widget-heading\" data-id=\"7cc8c75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">03<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09964ba elementor-widget elementor-widget-heading\" data-id=\"09964ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Real-Time Security Recommendations And Threat Intelligence:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac2b83b elementor-widget elementor-widget-text-editor\" data-id=\"ac2b83b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Provides actionable cyber threat intelligence and indicators to protect against potential cyber attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aebd379 e-con-full e-flex e-con e-child\" data-id=\"aebd379\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-eeda5d2 e-con-full info-box e-flex e-con e-child\" data-id=\"eeda5d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3b045b elementor-widget elementor-widget-heading\" data-id=\"e3b045b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">04<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8dab56 elementor-widget elementor-widget-heading\" data-id=\"b8dab56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">24\/7 SOC Monitoring <br>\nSecurity Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8b76f0 elementor-widget elementor-widget-text-editor\" data-id=\"d8b76f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Facilitates threat management and detection through an advanced SIEM system. When a cyber team is trained and available to you 24 hours a day<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e84011 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"6e84011\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ba178a elementor-widget elementor-widget-html\" data-id=\"6ba178a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n    .info-box{\n        backdrop-filter: blur(5px);\n    }\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd079ef elementor-widget elementor-widget-heading\" data-id=\"fd079ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Why we are experts for small and medium businesses<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f61dc2 elementor-widget-divider--view-line_icon elementor-widget-divider--element-align-right elementor-view-default elementor-widget elementor-widget-divider\" data-id=\"6f61dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c4fbe9 e-con-full e-flex e-con e-child\" data-id=\"6c4fbe9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-40f0824 e-con-full info-box e-flex e-con e-child\" data-id=\"40f0824\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-013cb7f elementor-widget elementor-widget-heading\" data-id=\"013cb7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">05<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c85421 elementor-widget elementor-widget-heading\" data-id=\"4c85421\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Cyber Threat Monitoring System:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b50969f elementor-widget elementor-widget-text-editor\" data-id=\"b50969f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An advanced SIEM-based monitoring system that identifies and handles cyber threats proactively and in real time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d48b8bb e-con-full e-flex e-con e-child\" data-id=\"d48b8bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-acc05f8 e-con-full info-box e-flex e-con e-child\" data-id=\"acc05f8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c06e5c7 elementor-widget elementor-widget-heading\" data-id=\"c06e5c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">06<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ddd5a4 elementor-widget elementor-widget-heading\" data-id=\"4ddd5a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Professional Incident Response (IR) Team<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-912daa3 elementor-widget elementor-widget-text-editor\" data-id=\"912daa3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A professional cyber security response team for fast handling of cyber incidents and minimizing security risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-932dab9 e-con-full e-flex e-con e-child\" data-id=\"932dab9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bf5deb9 e-con-full info-box e-flex e-con e-child\" data-id=\"bf5deb9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6892e4e elementor-widget elementor-widget-heading\" data-id=\"6892e4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">07<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21cba7e elementor-widget elementor-widget-heading\" data-id=\"21cba7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automated Vulnerability Management &amp; Security Scanning<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78a6246 elementor-widget elementor-widget-text-editor\" data-id=\"78a6246\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Provides automated vulnerability scanning and management to quickly detect and resolve security weaknesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ed5f63 e-con-full e-flex e-con e-child\" data-id=\"9ed5f63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8388b98 e-con-full info-box e-flex e-con e-child\" data-id=\"8388b98\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34d7911 elementor-widget elementor-widget-heading\" data-id=\"34d7911\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">08<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15c7c74 elementor-widget elementor-widget-heading\" data-id=\"15c7c74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Personalized Cyber Security Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0575e84 elementor-widget elementor-widget-text-editor\" data-id=\"0575e84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tailored cyber security services designed to match your organization\u2019s specific needs and infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d013a1 e-flex e-con-boxed e-con e-parent\" data-id=\"2d013a1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5997687 e-con-full e-flex e-con e-child\" data-id=\"5997687\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f3b149b e-con-full e-flex e-con e-child\" data-id=\"f3b149b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c250cf8 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"c250cf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"925\" height=\"900\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Layer-1-6.png\" class=\"attachment-full size-full wp-image-778\" alt=\"\" srcset=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Layer-1-6.png 925w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Layer-1-6-300x292.png 300w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/Layer-1-6-768x747.png 768w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b594176 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b594176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Let\u2019s Secure Your Business with Advanced SIEM &amp; SOC Solutions<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-357bdbf elementor-align-center elementor-widget elementor-widget-button\" data-id=\"357bdbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.dremsoc.com\/he\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2e9c9b e-flex e-con-boxed e-con e-parent\" data-id=\"a2e9c9b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-839b589 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"839b589\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">MITRE ATT&amp;CK Framework for Cyber Threat Detection<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83066dc a-right midP elementor-widget elementor-widget-text-editor\" data-id=\"83066dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The MITRE ATT&amp;CK Matrix is a modular cyber security framework that presents a wide range of attack techniques used to achieve pre-defined objectives and support cyber threat detection and incident response.<\/p><p>The tactics are classified by objectives in a structured matrix, illustrating the full lifecycle of a cyber attack\u00a0 from initial access to its final impact.<\/p><p>The extended MITRE ATT&amp;CK for Enterprise framework covers multiple environments, including Windows, macOS, Linux, PRE, Azure AD, Office 365, Google Workspace, SaaS, IaaS, networks, and containers. The techniques described in MITRE ATT&amp;CK include common cyber attack methods such as spear phishing, command and control (C2), and credential dumping.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f3937c hebShow elementor-widget elementor-widget-text-editor\" data-id=\"7f3937c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MITRE ATT&amp;CK \u05d4\u05d9\u05d0 \u05ea\u05e9\u05ea\u05d9\u05ea \u05de\u05d5\u05d3\u05d5\u05dc\u05e8\u05d9\u05ea \u05d4\u05de\u05e6\u05d9\u05d2\u05d4 \u05e1\u05d8 \u05e8\u05d7\u05d1 \u05e9\u05dc \u05d8\u05db\u05e0\u05d9\u05e7\u05d5\u05ea \u05ea\u05e7\u05d9\u05e4\u05d4 \u05d4\u05de\u05e9\u05de\u05e9\u05d5\u05ea \u05dc\u05d4\u05e9\u05d2\u05ea\u05d9\u05e2\u05d3\u05d9\u05dd \u05de\u05d5\u05d2\u05d3\u05e8\u05d9\u05dd \u05de\u05e8\u05d0\u05e9.<\/p><p>\u05d4\u05d8\u05e7\u05d8\u05d9\u05e7\u05d5\u05ea \u05de\u05e1\u05d5\u05d5\u05d2\u05d5\u05ea \u05dc\u05e4\u05d9 \u05d9\u05e2\u05d3\u05d9\u05dd \u05d1\u05de\u05d8\u05e8\u05d9\u05e6\u05d4, \u05d4\u05de\u05e6\u05d9\u05d2\u05d4 \u05d0\u05ea \u05ea\u05d4\u05dc\u05d9\u05da \u05d4\u05d4\u05ea\u05e7\u05e4\u05d4 \u05de\u05e0\u05e7\u05d5\u05d3\u05ea \u05d4\u05d4\u05ea\u05d7\u05dc\u05d4 \u05d5\u05e2\u05d3 \u05d4\u05d0\u05e4\u05e7\u05d8 \u05d4\u05e1\u05d5\u05e4\u05d9.<\/p><p>\u05d4\u05d2\u05e8\u05e1\u05d4 \u05d4\u05de\u05d5\u05e8\u05d7\u05d1\u05ea \u05e9\u05dc CK&amp;ATT MITRE \u05dc\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e0\u05d5\u05ea\u05e0\u05ea \u05de\u05e2\u05e0\u05d4 \u05dc\u05e1\u05d1\u05d9\u05d1\u05d5\u05ea \u05e8\u05d1\u05d5\u05ea \u05db\u05d2\u05d5\u05df:<\/p><p><span translate=\"no\">Windows, macOS, Linux, PRE, Azure AD, Office 365, Google Workspace, SaaS, IaaS,<\/span><\/p><p>Network, Containers<br \/>\u05d4\u05d8\u05e7\u05d8\u05d9\u05e7\u05d5\u05ea \u05d4\u05e9\u05d5\u05e0\u05d5\u05ea \u05d1\u05d4\u05df \u05e0\u05d9\u05ea\u05df \u05dc\u05d4\u05e9\u05ea\u05de\u05e9 \u05d1\u05d4\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05de\u05e4\u05d5\u05e8\u05d8\u05d5\u05ea \u05d1-CK&amp;ATT MITER \u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05dc\u05d4\u05d9\u05d5\u05ea:<\/p><p><span translate=\"no\">spear phishing, command and control, and credential dumping<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2636e5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"b2636e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.dremsoc.com\/he\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to a Security Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b7fbfa e-con-full e-flex e-con e-child\" data-id=\"7b7fbfa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b88135b e-con-full info-box e-flex e-con e-child\" data-id=\"b88135b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c596461 mitta elementor-widget elementor-widget-heading\" data-id=\"c596461\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Reconnaissance<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed6072b elementor-widget elementor-widget-text-editor\" data-id=\"ed6072b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gathering information about the target for planning future operations<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc83be0 e-con-full info-box e-flex e-con e-child\" data-id=\"bc83be0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef72704 mitta elementor-widget elementor-widget-heading\" data-id=\"ef72704\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Resource Development<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9478721 elementor-widget elementor-widget-text-editor\" data-id=\"9478721\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0Establishment of resources to support operations, which includes the establishment of a command and control infrastructure<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f082a61 e-con-full info-box e-flex e-con e-child\" data-id=\"f082a61\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48c6f70 mitta elementor-widget elementor-widget-heading\" data-id=\"48c6f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Initial access<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-410fde6 elementor-widget elementor-widget-text-editor\" data-id=\"410fde6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An attempt to enter the network, such as phishing<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a88b17 e-con-full e-flex e-con e-child\" data-id=\"6a88b17\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-41211e3 e-con-full info-box e-flex e-con e-child\" data-id=\"41211e3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c646f3 mitta elementor-widget elementor-widget-heading\" data-id=\"4c646f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Execution<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b4e068 elementor-widget elementor-widget-text-editor\" data-id=\"9b4e068\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Running malicious code, such as running a remote access tool<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4af41d3 e-con-full info-box e-flex e-con e-child\" data-id=\"4af41d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0155a7 mitta elementor-widget elementor-widget-heading\" data-id=\"b0155a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Persistence<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7078000 elementor-widget elementor-widget-text-editor\" data-id=\"7078000\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Changing formations and maintaining the foothold of the attackers<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a9efc5 e-con-full info-box e-flex e-con e-child\" data-id=\"6a9efc5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f000455 mitta elementor-widget elementor-widget-heading\" data-id=\"f000455\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Escalation of privileges (Privilege Escalation)<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e426d24 elementor-widget elementor-widget-text-editor\" data-id=\"e426d24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>an attempt to obtain privileges at a higher level<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb468ae e-con-full elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"bb468ae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ccefaab e-con-full info-box e-flex e-con e-child\" data-id=\"ccefaab\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb0fcf7 elementor-widget elementor-widget-heading\" data-id=\"cb0fcf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">06<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e40057c elementor-widget elementor-widget-heading\" data-id=\"e40057c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Escalation of privileges (Privilege Escalation)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c77bc0 elementor-widget elementor-widget-text-editor\" data-id=\"2c77bc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>an attempt to obtain privileges at a higher level<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aec486c e-con-full info-box e-flex e-con e-child\" data-id=\"aec486c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1dfaff3 elementor-widget elementor-widget-heading\" data-id=\"1dfaff3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">07<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbaa28d elementor-widget elementor-widget-heading\" data-id=\"dbaa28d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Defense Evasion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c67819 elementor-widget elementor-widget-text-editor\" data-id=\"0c67819\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The use of trusted processes to hide malware<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d689cdf e-con-full info-box e-flex e-con e-child\" data-id=\"d689cdf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d7bf73 elementor-widget elementor-widget-heading\" data-id=\"1d7bf73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">08<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5f2d27 elementor-widget elementor-widget-heading\" data-id=\"f5f2d27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Access to credentials (Credential Access)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3179b9b elementor-widget elementor-widget-text-editor\" data-id=\"3179b9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Stealing identical data and account passwords<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a9e38f e-con-full info-box e-flex e-con e-child\" data-id=\"4a9e38f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f55a6a0 elementor-widget elementor-widget-heading\" data-id=\"f55a6a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">09<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b5a1d4 elementor-widget elementor-widget-heading\" data-id=\"1b5a1d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Discovery<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-846b9ed elementor-widget elementor-widget-text-editor\" data-id=\"846b9ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>investigation and perception of the opponents&#8217; environment<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fefe17c e-con-full info-box e-flex e-con e-child\" data-id=\"fefe17c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7673f4 elementor-widget elementor-widget-heading\" data-id=\"c7673f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">10<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f959118 elementor-widget elementor-widget-heading\" data-id=\"f959118\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">investigation and perception of the opponents' environment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b147ad1 elementor-widget elementor-widget-text-editor\" data-id=\"b147ad1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Using normal credentials to move between systems<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd663f0 e-con-full elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"fd663f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bb23304 e-con-full info-box e-flex e-con e-child\" data-id=\"bb23304\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-376484a elementor-widget elementor-widget-heading\" data-id=\"376484a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">11<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1078a9 elementor-widget elementor-widget-heading\" data-id=\"c1078a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Collection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef829b elementor-widget elementor-widget-text-editor\" data-id=\"2ef829b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Access and collection of relevant data for the purpose of an attack<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-89b002c e-con-full info-box e-flex e-con e-child\" data-id=\"89b002c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1b04cc elementor-widget elementor-widget-heading\" data-id=\"c1b04cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">12<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8278dc elementor-widget elementor-widget-heading\" data-id=\"a8278dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Command and Control<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-299b2c8 elementor-widget elementor-widget-text-editor\" data-id=\"299b2c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Communication with affected systems for the purpose of control<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4504df8 e-con-full info-box e-flex e-con e-child\" data-id=\"4504df8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e152c2 elementor-widget elementor-widget-heading\" data-id=\"7e152c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">13<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31c3921 elementor-widget elementor-widget-heading\" data-id=\"31c3921\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Exfiltration<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dad88b2 elementor-widget elementor-widget-text-editor\" data-id=\"dad88b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Stealing data from the affected network<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e560721 e-con-full info-box e-flex e-con e-child\" data-id=\"e560721\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d55500 elementor-widget elementor-widget-heading\" data-id=\"3d55500\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">14<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62cd4f7 elementor-widget elementor-widget-heading\" data-id=\"62cd4f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Impact<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd1047c elementor-widget elementor-widget-text-editor\" data-id=\"bd1047c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Activation, disruption or destruction of systems and data<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd9119a e-flex e-con-boxed e-con e-parent\" data-id=\"cd9119a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e3de25 e-con-full e-flex e-con e-child\" data-id=\"4e3de25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da9da37 elementor-widget elementor-widget-heading\" data-id=\"da9da37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the DREM SOC solution<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50f1cb8 elementor-widget-divider--view-line_icon elementor-widget-divider--element-align-right div-one elementor-view-default elementor-widget elementor-widget-divider\" data-id=\"50f1cb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79aba9e a-right elementor-widget elementor-widget-text-editor\" data-id=\"79aba9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An advanced and unified enterprise SIEM monitoring platform provides a comprehensive solution for persistent cyber threats and end-to-end hardening of enterprise systems.<\/p><p>The system is suitable for local, cloud and hybrid environments and guarantees comprehensive protection in the field of information security.<\/p><p>Especially in light of the transition to a routine of war, these areas are being re-invigorated due to the new challenges that include new attacks, vulnerabilities and weaknesses that are published daily.<\/p><p>This is a critical component that allows the organization to continue to function in a continuous business manner, when the SIEM platform supports a SOC system that operates 24\/7 by the talented analysts working in a FLAT TIER configuration (also know how to identify and operate) even in emergency situations.<\/p><p>DREM Hybrid Cloud Observability is a modular, scalable and easy-to-implement system that provides full monitoring of all the organization&#8217;s infrastructure &#8211; endpoints, servers, switches, storage arrays, existing security solutions, Office 365 and more.<br \/>DREM&#8217;s monitoring platform provides advanced control capabilities, smart monitors, hardening and anomaly detection, and enables proactive detection of attack attempts or cyber incidents at all layers of the organization&#8217;s network.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fb4043 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"4fb4043\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-063a4a0 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"063a4a0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a3c326 e-con-full e-flex e-con e-parent\" data-id=\"4a3c326\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1968b2d elementor-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1968b2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Our customers<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-448c622 elementor-widget elementor-widget-spacer\" data-id=\"448c622\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3e982a elementor-widget elementor-widget-image-carousel\" data-id=\"c3e982a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;7&quot;,&quot;navigation&quot;:&quot;none&quot;,&quot;autoplay_speed&quot;:0,&quot;speed&quot;:5000,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:40,&quot;sizes&quot;:[]},&quot;slides_to_show_mobile&quot;:&quot;2&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"rtl\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png\" alt=\"WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.28.25_af5e5b74-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.28.25_af5e5b74-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.27.52_a4bbee45-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.27.52_a4bbee45-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.26.42_ed6677c5-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.26.42_ed6677c5-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-11-at-19.25.56_d7831a6d.png\" alt=\"WhatsApp Image 2024-09-11 at 19.25.56_d7831a6d\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-03_at_19.19.14_b79ae2b1-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-03_at_19.19.14_b79ae2b1-removebg-preview.png\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.29.20_49185322-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.29.20_49185322-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.29.44_3c0c902a-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.29.44_3c0c902a-removebg-preview\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef802b8 e-flex e-con-boxed e-con e-parent\" data-id=\"ef802b8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dcc73fd e-con-full e-flex e-con e-child\" data-id=\"dcc73fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c05c1b4 elementor-widget__width-initial logo elementor-widget elementor-widget-image\" data-id=\"c05c1b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"765\" src=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2025\/05\/socrates_logo_png-1024x979.png\" class=\"attachment-large size-large wp-image-1412\" alt=\"\" srcset=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2025\/05\/socrates_logo_png-1024x979.png 1024w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2025\/05\/socrates_logo_png-300x287.png 300w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2025\/05\/socrates_logo_png-768x735.png 768w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2025\/05\/socrates_logo_png-1536x1469.png 1536w, https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2025\/05\/socrates_logo_png.png 1585w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ef360d elementor-widget elementor-widget-html\" data-id=\"0ef360d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"gtranslate_wrapper\"><\/div>\r\n<script>window.gtranslateSettings = {\"default_language\":\"en\",\"languages\":[\"en\",\"iw\",\"es\"],\"wrapper_selector\":\".gtranslate_wrapper\",\"flag_style\":\"3d\"}<\/script>\r\n<script src=\"https:\/\/cdn.gtranslate.net\/widgets\/latest\/float.js\" defer><\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c733919 elementor-widget elementor-widget-heading\" data-id=\"c733919\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\u00a9 Copyright 2024, Socrates cyber. All rights reserved<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dc93a0 elementor-widget elementor-widget-html\" data-id=\"0dc93a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n    \/*.logo img{*\/\n    \/*    filter: invert(1);*\/\n    \/*}*\/\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d9ca51 e-flex e-con-boxed e-con e-parent\" data-id=\"9d9ca51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba6cfb6 elementor-widget elementor-widget-spacer\" data-id=\"ba6cfb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Services &amp; SIEM\/SOC Monitoring for Businesses Free Consultation Next-Gen SIEM &amp; SOC Monitoring Solution Real-Time Threat Detection, Security Monitoring &amp; Response About Our Cyber Security &amp; SIEM\/SOC Experts The company Secterious (Eitan Freimovich and Rony Atias) and the company ShvoIT (Moshe Shvo) used their extensive experience as CISOs and penetration testers for a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1390,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"footnotes":""},"class_list":["post-753","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Home - Socrates-Cyber.co<\/title>\n<meta name=\"description\" content=\"Protect your business with DREM SOC 360\u00b0, offering 24\/7 cybersecurity monitoring, threat detection, and proactive defense for small and medium businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.socrates-cyber.co\/\" \/>\n<meta property=\"og:locale\" content=\"he_IL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - Socrates-Cyber.co\" \/>\n<meta property=\"og:description\" content=\"Protect your business with DREM SOC 360\u00b0, offering 24\/7 cybersecurity monitoring, threat detection, and proactive defense for small and medium businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.socrates-cyber.co\/\" \/>\n<meta property=\"og:site_name\" content=\"Socrates-Cyber.co\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-22T15:35:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2025\/05\/logo-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u05d6\u05de\u05df \u05e7\u05e8\u05d9\u05d0\u05d4 \u05de\u05d5\u05e2\u05e8\u05da\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 \u05d3\u05e7\u05d5\u05ea\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.socrates-cyber.co\/\",\"url\":\"https:\/\/www.socrates-cyber.co\/\",\"name\":\"Home - Socrates-Cyber.co\",\"isPartOf\":{\"@id\":\"https:\/\/3.76.219.35\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.socrates-cyber.co\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.socrates-cyber.co\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/05\/logo-scaled.jpg\",\"datePublished\":\"2024-09-10T14:41:18+00:00\",\"dateModified\":\"2026-03-22T15:35:39+00:00\",\"description\":\"Protect your business with DREM SOC 360\u00b0, offering 24\/7 cybersecurity monitoring, threat detection, and proactive defense for small and medium businesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.socrates-cyber.co\/#breadcrumb\"},\"inLanguage\":\"he-IL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.socrates-cyber.co\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/www.socrates-cyber.co\/#primaryimage\",\"url\":\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/05\/logo-scaled.jpg\",\"contentUrl\":\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/05\/logo-scaled.jpg\",\"width\":2560,\"height\":1810},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.socrates-cyber.co\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.socrates-cyber.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/3.76.219.35\/#website\",\"url\":\"https:\/\/3.76.219.35\/\",\"name\":\"DREM SOC\",\"description\":\"Managed SIEM\/ SOC\",\"publisher\":{\"@id\":\"https:\/\/3.76.219.35\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/3.76.219.35\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"he-IL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/3.76.219.35\/#organization\",\"name\":\"DREM SOC\",\"url\":\"https:\/\/3.76.219.35\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/3.76.219.35\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2023\/11\/Logo-Transparent.png\",\"contentUrl\":\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2023\/11\/Logo-Transparent.png\",\"width\":511,\"height\":488,\"caption\":\"DREM SOC\"},\"image\":{\"@id\":\"https:\/\/3.76.219.35\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - Socrates-Cyber.co","description":"Protect your business with DREM SOC 360\u00b0, offering 24\/7 cybersecurity monitoring, threat detection, and proactive defense for small and medium businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.socrates-cyber.co\/","og_locale":"he_IL","og_type":"article","og_title":"Home - Socrates-Cyber.co","og_description":"Protect your business with DREM SOC 360\u00b0, offering 24\/7 cybersecurity monitoring, threat detection, and proactive defense for small and medium businesses.","og_url":"https:\/\/www.socrates-cyber.co\/","og_site_name":"Socrates-Cyber.co","article_modified_time":"2026-03-22T15:35:39+00:00","og_image":[{"width":2560,"height":1810,"url":"https:\/\/www.socrates-cyber.co\/wp-content\/uploads\/2025\/05\/logo-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u05d6\u05de\u05df \u05e7\u05e8\u05d9\u05d0\u05d4 \u05de\u05d5\u05e2\u05e8\u05da":"12 \u05d3\u05e7\u05d5\u05ea"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.socrates-cyber.co\/","url":"https:\/\/www.socrates-cyber.co\/","name":"Home - Socrates-Cyber.co","isPartOf":{"@id":"https:\/\/3.76.219.35\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.socrates-cyber.co\/#primaryimage"},"image":{"@id":"https:\/\/www.socrates-cyber.co\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/05\/logo-scaled.jpg","datePublished":"2024-09-10T14:41:18+00:00","dateModified":"2026-03-22T15:35:39+00:00","description":"Protect your business with DREM SOC 360\u00b0, offering 24\/7 cybersecurity monitoring, threat detection, and proactive defense for small and medium businesses.","breadcrumb":{"@id":"https:\/\/www.socrates-cyber.co\/#breadcrumb"},"inLanguage":"he-IL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.socrates-cyber.co\/"]}]},{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/www.socrates-cyber.co\/#primaryimage","url":"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/05\/logo-scaled.jpg","contentUrl":"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/05\/logo-scaled.jpg","width":2560,"height":1810},{"@type":"BreadcrumbList","@id":"https:\/\/www.socrates-cyber.co\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.socrates-cyber.co\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/3.76.219.35\/#website","url":"https:\/\/3.76.219.35\/","name":"DREM SOC","description":"Managed SIEM\/ SOC","publisher":{"@id":"https:\/\/3.76.219.35\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3.76.219.35\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"he-IL"},{"@type":"Organization","@id":"https:\/\/3.76.219.35\/#organization","name":"DREM SOC","url":"https:\/\/3.76.219.35\/","logo":{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/3.76.219.35\/#\/schema\/logo\/image\/","url":"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2023\/11\/Logo-Transparent.png","contentUrl":"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2023\/11\/Logo-Transparent.png","width":511,"height":488,"caption":"DREM SOC"},"image":{"@id":"https:\/\/3.76.219.35\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/pages\/753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/comments?post=753"}],"version-history":[{"count":379,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/pages\/753\/revisions"}],"predecessor-version":[{"id":1730,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/pages\/753\/revisions\/1730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/media\/1390"}],"wp:attachment":[{"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/media?parent=753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}