{"id":1934,"date":"2022-04-18T19:26:04","date_gmt":"2022-04-18T19:26:04","guid":{"rendered":"https:\/\/smartit.ws\/?page_id=1934"},"modified":"2022-10-18T09:36:02","modified_gmt":"2022-10-18T09:36:02","slug":"vulnerabilty-management-solutions","status":"publish","type":"page","link":"https:\/\/smartit.ws\/ru\/solutions\/vulnerabilty-management-solutions\/","title":{"rendered":"\u0420\u0435\u0448\u0435\u043d\u0438\u044f \u043f\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1934\" class=\"elementor elementor-1934\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b98651 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b98651\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9d103d7\" data-id=\"9d103d7\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-910b64a elementor-widget elementor-widget-cz_title\" data-id=\"910b64a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"cz_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\r\n\t\t<div>\r\n\t\t\t<div class=\"cz_title clr cz_mobile_text_center cz_title_pos_inline\"><div class=\"cz_title_content\"><div class=\"cz_wpe_content\"><h2>\u0420\u0435\u0448\u0435\u043d\u0438\u044f \u043f\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438<\/h2><\/div><\/div><\/div>\r\n\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1b7afda\" data-id=\"1b7afda\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63d009d elementor-widget elementor-widget-cz_stylish_list\" data-id=\"63d009d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"cz_stylish_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"cz_stylish_list clr center_on_mobile cz_sl_icon_hover_blur\"><li class=\"elementor-repeater-item-11e7155 clr\"><a href=\"https:\/\/smartit.ws\/ru\/services\/vulnerabilty-management-solutions\/vulnerability-scanners\/\"><div class=\"cz_sl_icon cz_sl_image\"><i class=\"mr10\"><img decoding=\"async\" width=\"36\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/Vulnerability-Scanners.png\" class=\"attachment-full size-full wp-image-2899\" alt=\"\" \/><\/i><\/div><div><span>\u0421\u043a\u0430\u043d\u043d\u0435\u0440\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439<\/span><\/div><\/a><\/li><li class=\"elementor-repeater-item-0ec6998 clr\"><a href=\"https:\/\/smartit.ws\/ru\/services\/vulnerabilty-management-solutions\/application-security-testing-sast-dast\/\"><div class=\"cz_sl_icon cz_sl_image\"><i class=\"mr10\"><img decoding=\"async\" width=\"37\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/Application-Security-Testing.png\" class=\"attachment-full size-full wp-image-2897\" alt=\"\" \/><\/i><\/div><div><span>\u0422\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 (SAST, DAST)<\/span><\/div><\/a><\/li><li class=\"elementor-repeater-item-593286d clr\"><a href=\"https:\/\/smartit.ws\/ru\/services\/vulnerabilty-management-solutions\/application-security-assessment\/\"><div class=\"cz_sl_icon cz_sl_image\"><i class=\"mr10\"><img decoding=\"async\" width=\"37\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/Application-Security-Assessment.png\" class=\"attachment-full size-full wp-image-2896\" alt=\"\" \/><\/i><\/div><div><span>\u041f\u043e\u0438\u0441\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445<\/span><\/div><\/a><\/li><li class=\"elementor-repeater-item-079703e clr\"><a href=\"https:\/\/smartit.ws\/ru\/services\/vulnerabilty-management-solutions\/it-infrastructure-security-assessment\/\"><div class=\"cz_sl_icon cz_sl_image\"><i class=\"mr10\"><img loading=\"lazy\" decoding=\"async\" width=\"37\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/IT-Infrastructure-Security-Assessment.png\" class=\"attachment-full size-full wp-image-2898\" alt=\"\" \/><\/i><\/div><div><span>\u041f\u043e\u0438\u0441\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0418\u0422 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0435<\/span><\/div><\/a><\/li><\/ul>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Vulnerabilty management solutions Vulnerability Scanners Application Security Testing (SAST, DAST) Application &#8230; <\/p>","protected":false},"author":1,"featured_media":0,"parent":11,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1934","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/pages\/1934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/comments?post=1934"}],"version-history":[{"count":3,"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/pages\/1934\/revisions"}],"predecessor-version":[{"id":3668,"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/pages\/1934\/revisions\/3668"}],"up":[{"embeddable":true,"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/pages\/11"}],"wp:attachment":[{"href":"https:\/\/smartit.ws\/ru\/wp-json\/wp\/v2\/media?parent=1934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}