{"id":13912,"date":"2023-01-20T13:36:31","date_gmt":"2023-01-20T13:36:31","guid":{"rendered":"https:\/\/www.esds.co.in\/blog\/?post_type=web-story&#038;p=13912"},"modified":"2023-01-20T13:36:34","modified_gmt":"2023-01-20T13:36:34","slug":"arming-your-soc-with-esds","status":"publish","type":"web-story","link":"https:\/\/www.esds.co.in\/blog\/web-stories\/arming-your-soc-with-esds\/","title":{"rendered":"ARMING YOUR SOC"},"content":{"rendered":"<p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><link href=\"https:\/\/fonts.googleapis.com\/css2?display=swap&amp;family=Roboto%3Awght%40700\" rel=\"stylesheet\"\/><link href=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS.jpg\" rel=\"preload\" as=\"image\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }<\/p>\n<p>              amp-story-captions span {\n                display: inline-block;\n                margin: 0;\n                padding: 6px 12px;\n                vertical-align: middle;\n                border-radius: 15px;\n                background: rgba(11, 11, 11, 0.6);\n                color: rgba(255, 255, 255, 1);\n                font-family: -apple-system, BlinkMacSystemFont, \"Segoe UI\", Roboto, Oxygen-Sans, Ubuntu, Cantarell, \"Helvetica Neue\", sans-serif;;\n                font-size: calc(4 * var(--story-page-vw));\n                line-height: 1.4;\n                word-break: break-word;\n                word-wrap: break-word;\n                overflow-wrap: break-word;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>ARMING YOUR SOC<\/title><link rel=\"canonical\" href=\"https:\/\/www.esds.co.in\/blog\/?post_type=web-story&amp;p=13912\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"India&#x27;s Best Cloud Hosting Service Provider\" publisher-logo-src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2022\/10\/Untitled-design.png\" title=\"ARMING YOUR SOC\" poster-portrait-src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/cropped-Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_.jpg\"><amp-story-page id=\"eccb53cf-15bb-437b-bdc6-3936f93413bc\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#8e8aa3\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-7f1f4697-da40-4bd9-a493-d4ccd22a5f44\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS.jpg\" alt=\"Build a powerful yet cost-effective SOC with ESDS\" srcSet=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS.jpg 1080w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-864x1536.jpg 864w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-576x1024.jpg 576w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-169x300.jpg 169w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-150x267.jpg 150w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-84x150.jpg 84w\" sizes=\"(min-width: 1024px) 45vh, 101vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:69.41748%;width:100%;height:6.47249%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.48543689320388345% 0.48543689320388345% 0.48543689320388345% 0.48543689320388345% \/ 5% 5% 5% 5%\" id=\"el-0a6fd057-b102-42c5-8217-b13a2b50c33e\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.1194629854368932% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.566343em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">ARMING YOUR SOC<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.8932%;top:81.39159%;width:76.45631%;height:18.60841%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 1.7391304347826086% 1.7391304347826086% 1.7391304347826086% 1.7391304347826086%\" id=\"el-1cf8da88-8875-4525-9853-eb8f05e8d87e\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.14285714285714263% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.517799em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Build a powerful yet cost-effective SOC with ESDS<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"65f43cfe-804c-4499-9669-1e94f90bcc0f\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#b0c1cf\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-0ddf445a-6598-403d-84e7-02920ddf3445\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1.jpg\" alt=\"Our Cyber Security Team gathers threat intelligence data 24x7\" srcSet=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1.jpg 1080w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-864x1536.jpg 864w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-576x1024.jpg 576w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-169x300.jpg 169w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-150x267.jpg 150w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-84x150.jpg 84w\" sizes=\"(min-width: 1024px) 45vh, 101vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:7.52427%;top:81.5534%;width:92.47573%;height:17.47573%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5249343832020997% 0.5249343832020997% 0.5249343832020997% 0.5249343832020997% \/ 1.8518518518518516% 1.8518518518518516% 1.8518518518518516% 1.8518518518518516%\" id=\"el-5d297fb8-7c26-4c02-bfdc-26d13d4f842f\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.11072834645669291% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Our Cyber Security Team gathers threat intelligence data 24&#215;7<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"f11a5f34-3e06-4431-8a0b-57cf406169c1\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#274e74\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-117f5fc3-cd6c-4fbf-860c-952c0cc0027d\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_.jpg\" alt=\"We use cutting-edge tools for faster incident response time_\" srcSet=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_.jpg 1080w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-864x1536.jpg 864w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-576x1024.jpg 576w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-169x300.jpg 169w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-150x267.jpg 150w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-84x150.jpg 84w\" sizes=\"(min-width: 1024px) 45vh, 101vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.8932%;top:77.02265%;width:76.45631%;height:23.13916%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 1.3986013986013985% 1.3986013986013985% 1.3986013986013985% 1.3986013986013985%\" id=\"el-2d1b507f-909d-483f-9b19-86d693f4cfc5\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13392857142857142% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">We use cutting-edge tools for faster incident response time&nbsp;<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"693d8b1d-9f1d-4a04-a7d1-2b782ba35f9b\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#1b395d\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-e7d1b4fb-cdfb-4280-a192-28d89cf9babd\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis.jpg\" alt=\"Alerts are triggered to mitigate risks via Machine Learning &amp; behavior analysis\" srcSet=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis.jpg 1080w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-864x1536.jpg 864w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-576x1024.jpg 576w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-169x300.jpg 169w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-150x267.jpg 150w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-84x150.jpg 84w\" sizes=\"(min-width: 1024px) 45vh, 101vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.8932%;top:76.86084%;width:76.45631%;height:23.13916%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 1.3986013986013985% 1.3986013986013985% 1.3986013986013985% 1.3986013986013985%\" id=\"el-3879df11-14fd-4a43-84c3-bc26d797c2a3\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13392857142857142% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Alerts are triggered to mitigate risks via Machine Learning &amp; behavior analysis<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"533388eb-d874-4937-bddf-165101aa252f\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#112c4d\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-a0c5ff51-4702-47c3-add7-cb5212e4ceef\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_.jpg\" alt=\"Complete data security, with data securely hosted in Indian data centers_\" srcSet=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_.jpg 1080w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-864x1536.jpg 864w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-576x1024.jpg 576w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-169x300.jpg 169w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-150x267.jpg 150w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-84x150.jpg 84w\" sizes=\"(min-width: 1024px) 45vh, 101vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.8932%;top:77.02265%;width:76.45631%;height:23.13916%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 1.3986013986013985% 1.3986013986013985% 1.3986013986013985% 1.3986013986013985%\" id=\"el-4fbd0c35-8cec-4370-89a9-3ea22ea5c581\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13392857142857142% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Complete data security, with data securely hosted in Indian data centers&nbsp;<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"74b790b9-734e-4c13-abe6-4cfcab786fcd\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#1e4062\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-0b683c1b-fd52-4352-8817-a78b68070ec6\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model.jpg\" alt=\"Subscription-based SOC services operating on an OPEX Model\" srcSet=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model.jpg 1080w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-864x1536.jpg 864w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-576x1024.jpg 576w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-169x300.jpg 169w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-150x267.jpg 150w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-84x150.jpg 84w\" sizes=\"(min-width: 1024px) 45vh, 101vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:12.13592%;top:76.86084%;width:76.45631%;height:23.13916%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 1.3986013986013985% 1.3986013986013985% 1.3986013986013985% 1.3986013986013985%\" id=\"el-ddc3432e-50b3-4bc7-b0b4-7afb78deb9fd\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13392857142857142% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Subscription-based SOC services operating on an OPEX Model<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"f0d83721-dcb2-4093-ad47-30b6aab49cc7\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#0a243e\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-af2000b8-c5c6-4566-bb70-e32984bd32ec\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last.jpg\" alt=\"The experts at ESDS are on your side, doing everything to protect your business\" srcSet=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last.jpg 1080w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-864x1536.jpg 864w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-576x1024.jpg 576w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-169x300.jpg 169w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-150x267.jpg 150w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-84x150.jpg 84w\" sizes=\"(min-width: 1024px) 45vh, 101vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.8932%;top:68.77023%;width:76.45631%;height:11.48867%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 2.8169014084507045% 2.8169014084507045% 2.8169014084507045% 2.8169014084507045%\" id=\"el-dbd560cf-bca6-498d-953a-fa7e4b1f1803\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13392857142857142% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">We are ready to assist you with our expertise.<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:12.13592%;top:87.54045%;width:76.45631%;height:5.98706%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 5.405405405405405% 5.405405405405405% 5.405405405405405% 5.405405405405405%\" id=\"el-f2157f41-1bb9-456b-b5a3-a3a8f0a43ab0\"><a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\" data-tooltip-icon=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/cropped-esds-1.png\" data-tooltip-text=\"Managed Security Services and SOC Compliance for Your Business Assets \" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13392857142857142% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #dbca09\">Secure yourself today!<\/span><\/span><\/h2>\n<p><\/a><\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:9.70874%;top:15.69579%;width:80.09709%;height:40.7767%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-d9023e65-d468-46c6-93ae-42b51c454e47\">\n<div style=\"position:absolute;width:100%;height:100.22581%;left:0%;top:-0.11291%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R.png\" alt=\"esds-logo-white-text R\" srcSet=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R.png 9342w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-2048x1567.png 2048w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-1536x1176.png 1536w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-1024x784.png 1024w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-300x230.png 300w,https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-150x115.png 150w\" sizes=\"(min-width: 1024px) 36vh, 80vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Build a powerful yet cost-effective SOC with ESDS<\/p>\n","protected":false},"author":81,"featured_media":13923,"template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"web_stories_products":[],"web_stories_publisher_logo":13632,"web_stories_poster":[],"footnotes":""},"web_story_category":[],"web_story_tag":[],"class_list":["post-13912","web-story","type-web-story","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"story_data":{"version":46,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1080,"height":1920,"sizes":{"medium":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-169x300.jpg","width":169,"height":300,"filesize":9437,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-169x300.jpg"},"large":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-576x1024.jpg","width":576,"height":1024,"filesize":44750,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-576x1024.jpg"},"thumbnail":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-84x150.jpg","width":84,"height":150,"filesize":5543,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-84x150.jpg"},"1536x1536":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-864x1536.jpg","width":864,"height":1536,"filesize":80156,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-864x1536.jpg"},"post-thumbnail-size":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-750x330.jpg","width":750,"height":330,"filesize":24906,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-750x330.jpg"},"round-personnel-size":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-400x400.jpg","width":400,"height":400,"filesize":19456,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-400x400.jpg"},"small-grid-size":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-400x300.jpg","width":400,"height":300,"filesize":16375,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-400x300.jpg"},"portrait":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-440x550.jpg","width":440,"height":550,"filesize":25292,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-440x550.jpg"},"post-slider-side":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-750x480.jpg","width":750,"height":480,"filesize":33768,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-750x480.jpg"},"full-slider":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-980x380.jpg","width":980,"height":380,"filesize":32237,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-980x380.jpg"},"portfolio-portrait":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-500x550.jpg","width":500,"height":550,"filesize":28270,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-500x550.jpg"},"blog-grid":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-700x400.jpg","width":700,"height":400,"filesize":27903,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-700x400.jpg"},"yarpp-thumbnail":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-120x120.jpg","width":120,"height":120,"filesize":5937,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-120x120.jpg"},"web-stories-poster-portrait":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-640x853.jpg","width":640,"height":853,"filesize":45592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-640x853.jpg"},"web-stories-publisher-logo":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-96x96.jpg","width":96,"height":96,"filesize":5186,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-96x96.jpg"},"web-stories-thumbnail":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS-150x267.jpg","width":150,"height":267,"filesize":8509,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS-150x267.jpg"},"full":{"file":"Build-a-powerful-yet-cost-effective-SOC-with-ESDS.jpg","width":1080,"height":1920,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#8e8aa3","blurHash":"UG9aRCxuRikD~XtRRjWCZ~WVR*RjIUM{aeWC","creationDate":1674220496000,"src":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Build-a-powerful-yet-cost-effective-SOC-with-ESDS.jpg","id":13914,"alt":"Build a powerful yet cost-effective SOC with ESDS","local":false},"type":"image","x":-2,"y":-57,"width":415,"height":730,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"7f1f4697-da40-4bd9-a493-d4ccd22a5f44","isBackground":true},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":35,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"type":"text","content":"<span style=\"font-weight: 700; color: #fff\">ARMING YOUR SOC<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":0,"y":429,"width":412,"height":40,"id":"0a6fd057-b102-42c5-8217-b13a2b50c33e","marginOffset":1.0968749999999971578290569595992565155029296875},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":32,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"type":"text","content":"<span style=\"font-weight: 700; color: #fff\">Build a powerful yet cost-effective SOC with ESDS<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":49,"y":503,"width":315,"height":115,"id":"1cf8da88-8875-4525-9853-eb8f05e8d87e"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"eccb53cf-15bb-437b-bdc6-3936f93413bc","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b7923421-fb14-4dc2-9ce5-f18abec9bca9"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1080,"height":1920,"sizes":{"medium":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-169x300.jpg","width":169,"height":300,"filesize":9343,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-169x300.jpg"},"large":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-576x1024.jpg","width":576,"height":1024,"filesize":45749,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-576x1024.jpg"},"thumbnail":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-84x150.jpg","width":84,"height":150,"filesize":5455,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-84x150.jpg"},"1536x1536":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-864x1536.jpg","width":864,"height":1536,"filesize":80877,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-864x1536.jpg"},"post-thumbnail-size":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-750x330.jpg","width":750,"height":330,"filesize":33839,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-750x330.jpg"},"round-personnel-size":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-400x400.jpg","width":400,"height":400,"filesize":23713,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-400x400.jpg"},"small-grid-size":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-400x300.jpg","width":400,"height":300,"filesize":20431,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-400x300.jpg"},"portrait":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-440x550.jpg","width":440,"height":550,"filesize":29339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-440x550.jpg"},"post-slider-side":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-750x480.jpg","width":750,"height":480,"filesize":44572,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-750x480.jpg"},"full-slider":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-980x380.jpg","width":980,"height":380,"filesize":43472,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-980x380.jpg"},"portfolio-portrait":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-500x550.jpg","width":500,"height":550,"filesize":34127,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-500x550.jpg"},"blog-grid":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-700x400.jpg","width":700,"height":400,"filesize":38270,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-700x400.jpg"},"yarpp-thumbnail":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-120x120.jpg","width":120,"height":120,"filesize":6391,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-120x120.jpg"},"web-stories-poster-portrait":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-640x853.jpg","width":640,"height":853,"filesize":50981,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-640x853.jpg"},"web-stories-publisher-logo":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-96x96.jpg","width":96,"height":96,"filesize":5514,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-96x96.jpg"},"web-stories-thumbnail":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-150x267.jpg","width":150,"height":267,"filesize":8396,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1-150x267.jpg"},"full":{"file":"Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1.jpg","width":1080,"height":1920,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#b0c1cf","blurHash":"UF9tv8IT4T%N%2f5NGof00x].TMxMxbItRWB","creationDate":"2023-01-20T13:15:03.000Z","src":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Our-Cyber-Security-Team-gathers-threat-intelligence-data-24x7-1.jpg","id":13916,"alt":"Our Cyber Security Team gathers threat intelligence data 24x7","local":false},"x":-2,"y":-57,"width":415,"height":730,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"0ddf445a-6598-403d-84e7-02920ddf3445","isBackground":true,"type":"image","basedOn":"7f1f4697-da40-4bd9-a493-d4ccd22a5f44"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">Our Cyber Security Team gathers threat intelligence data 24x7<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":31,"y":504,"width":381,"height":108,"id":"5d297fb8-7c26-4c02-bfdc-26d13d4f842f","marginOffset":1.0968749999999971578290569595992565155029296875,"type":"text","basedOn":"0a6fd057-b102-42c5-8217-b13a2b50c33e"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"65f43cfe-804c-4499-9669-1e94f90bcc0f","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b7923421-fb14-4dc2-9ce5-f18abec9bca9"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1080,"height":1920,"sizes":{"medium":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-169x300.jpg","width":169,"height":300,"filesize":9778,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-169x300.jpg"},"large":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-576x1024.jpg","width":576,"height":1024,"filesize":49967,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-576x1024.jpg"},"thumbnail":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-84x150.jpg","width":84,"height":150,"filesize":5473,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-84x150.jpg"},"1536x1536":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-864x1536.jpg","width":864,"height":1536,"filesize":90169,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-864x1536.jpg"},"post-thumbnail-size":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-750x330.jpg","width":750,"height":330,"filesize":30825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-750x330.jpg"},"round-personnel-size":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-400x400.jpg","width":400,"height":400,"filesize":22688,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-400x400.jpg"},"small-grid-size":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-400x300.jpg","width":400,"height":300,"filesize":18692,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-400x300.jpg"},"portrait":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-440x550.jpg","width":440,"height":550,"filesize":29188,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-440x550.jpg"},"post-slider-side":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-750x480.jpg","width":750,"height":480,"filesize":39710,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-750x480.jpg"},"full-slider":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-980x380.jpg","width":980,"height":380,"filesize":40872,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-980x380.jpg"},"portfolio-portrait":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-500x550.jpg","width":500,"height":550,"filesize":33146,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-500x550.jpg"},"blog-grid":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-700x400.jpg","width":700,"height":400,"filesize":33383,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-700x400.jpg"},"yarpp-thumbnail":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-120x120.jpg","width":120,"height":120,"filesize":6074,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-120x120.jpg"},"web-stories-poster-portrait":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-640x853.jpg","width":640,"height":853,"filesize":51897,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-640x853.jpg"},"web-stories-publisher-logo":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-96x96.jpg","width":96,"height":96,"filesize":5280,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-96x96.jpg"},"web-stories-thumbnail":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_-150x267.jpg","width":150,"height":267,"filesize":8707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_-150x267.jpg"},"full":{"file":"We-use-cutting-edge-tools-for-faster-incident-response-time_.jpg","width":1080,"height":1920,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#274e74","blurHash":"UO9*v3t6D*WYyZayWBfQ4oRj%LoeVXjskCkC","creationDate":"2023-01-20T13:15:07.000Z","src":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/We-use-cutting-edge-tools-for-faster-incident-response-time_.jpg","id":13918,"alt":"We use cutting-edge tools for faster incident response time_","local":false},"x":-2,"y":-57,"width":415,"height":730,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"117f5fc3-cd6c-4fbf-860c-952c0cc0027d","isBackground":true,"basedOn":"0ddf445a-6598-403d-84e7-02920ddf3445","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">We use cutting-edge tools for faster incident response time&nbsp;<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":49,"y":476,"width":315,"height":143,"id":"2d1b507f-909d-483f-9b19-86d693f4cfc5","marginOffset":1.0968749999999971578290569595992565155029296875,"basedOn":"5d297fb8-7c26-4c02-bfdc-26d13d4f842f","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"f11a5f34-3e06-4431-8a0b-57cf406169c1","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b7923421-fb14-4dc2-9ce5-f18abec9bca9"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1080,"height":1920,"sizes":{"medium":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-169x300.jpg","width":169,"height":300,"filesize":8949,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-169x300.jpg"},"large":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-576x1024.jpg","width":576,"height":1024,"filesize":36046,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-576x1024.jpg"},"thumbnail":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-84x150.jpg","width":84,"height":150,"filesize":5524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-84x150.jpg"},"1536x1536":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-864x1536.jpg","width":864,"height":1536,"filesize":62108,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-864x1536.jpg"},"post-thumbnail-size":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-750x330.jpg","width":750,"height":330,"filesize":20889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-750x330.jpg"},"round-personnel-size":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-400x400.jpg","width":400,"height":400,"filesize":18871,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-400x400.jpg"},"small-grid-size":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-400x300.jpg","width":400,"height":300,"filesize":16995,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-400x300.jpg"},"portrait":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-440x550.jpg","width":440,"height":550,"filesize":22673,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-440x550.jpg"},"post-slider-side":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-750x480.jpg","width":750,"height":480,"filesize":31937,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-750x480.jpg"},"full-slider":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-980x380.jpg","width":980,"height":380,"filesize":24851,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-980x380.jpg"},"portfolio-portrait":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-500x550.jpg","width":500,"height":550,"filesize":25712,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-500x550.jpg"},"blog-grid":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-700x400.jpg","width":700,"height":400,"filesize":25861,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-700x400.jpg"},"yarpp-thumbnail":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-120x120.jpg","width":120,"height":120,"filesize":6153,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-120x120.jpg"},"web-stories-poster-portrait":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-640x853.jpg","width":640,"height":853,"filesize":37784,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-640x853.jpg"},"web-stories-publisher-logo":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-96x96.jpg","width":96,"height":96,"filesize":5377,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-96x96.jpg"},"web-stories-thumbnail":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-150x267.jpg","width":150,"height":267,"filesize":8150,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis-150x267.jpg"},"full":{"file":"Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis.jpg","width":1080,"height":1920,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#1b395d","blurHash":"U88#BKxY02Rk-=RiIps:00Io~U%2M|t7?Fbb","creationDate":"2023-01-20T13:14:54.000Z","src":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Alerts-are-triggered-to-mitigate-risks-via-Machine-Learning-behavior-analysis.jpg","id":13913,"alt":"Alerts are triggered to mitigate risks via Machine Learning & behavior analysis","local":false},"x":-2,"y":-57,"width":415,"height":730,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"e7d1b4fb-cdfb-4280-a192-28d89cf9babd","isBackground":true,"basedOn":"117f5fc3-cd6c-4fbf-860c-952c0cc0027d","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">Alerts are triggered to mitigate risks via Machine Learning &amp; behavior analysis<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":49,"y":475,"width":315,"height":143,"id":"3879df11-14fd-4a43-84c3-bc26d797c2a3","marginOffset":1.0968749999999971578290569595992565155029296875,"basedOn":"2d1b507f-909d-483f-9b19-86d693f4cfc5","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"693d8b1d-9f1d-4a04-a7d1-2b782ba35f9b","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b7923421-fb14-4dc2-9ce5-f18abec9bca9"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1080,"height":1920,"sizes":{"medium":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-169x300.jpg","width":169,"height":300,"filesize":12737,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-169x300.jpg"},"large":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-576x1024.jpg","width":576,"height":1024,"filesize":90064,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-576x1024.jpg"},"thumbnail":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-84x150.jpg","width":84,"height":150,"filesize":6147,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-84x150.jpg"},"1536x1536":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-864x1536.jpg","width":864,"height":1536,"filesize":181783,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-864x1536.jpg"},"post-thumbnail-size":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-750x330.jpg","width":750,"height":330,"filesize":52459,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-750x330.jpg"},"round-personnel-size":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-400x400.jpg","width":400,"height":400,"filesize":31319,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-400x400.jpg"},"small-grid-size":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-400x300.jpg","width":400,"height":300,"filesize":25937,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-400x300.jpg"},"portrait":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-440x550.jpg","width":440,"height":550,"filesize":41747,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-440x550.jpg"},"post-slider-side":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-750x480.jpg","width":750,"height":480,"filesize":68084,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-750x480.jpg"},"full-slider":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-980x380.jpg","width":980,"height":380,"filesize":73947,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-980x380.jpg"},"portfolio-portrait":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-500x550.jpg","width":500,"height":550,"filesize":48876,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-500x550.jpg"},"blog-grid":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-700x400.jpg","width":700,"height":400,"filesize":55667,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-700x400.jpg"},"yarpp-thumbnail":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-120x120.jpg","width":120,"height":120,"filesize":6660,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-120x120.jpg"},"web-stories-poster-portrait":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-640x853.jpg","width":640,"height":853,"filesize":82274,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-640x853.jpg"},"web-stories-publisher-logo":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-96x96.jpg","width":96,"height":96,"filesize":5646,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-96x96.jpg"},"web-stories-thumbnail":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-150x267.jpg","width":150,"height":267,"filesize":10919,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-150x267.jpg"},"full":{"file":"Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_.jpg","width":1080,"height":1920,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#112c4d","blurHash":"UK7.5tWBRjV@?wayRiWBx^j[RPa}WAj[M{ae","creationDate":"2023-01-20T13:14:59.000Z","src":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_.jpg","id":13915,"alt":"Complete data security, with data securely hosted in Indian data centers_","local":false},"x":-2,"y":-57,"width":415,"height":730,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"a0c5ff51-4702-47c3-add7-cb5212e4ceef","isBackground":true,"basedOn":"e7d1b4fb-cdfb-4280-a192-28d89cf9babd","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">Complete data security, with data securely hosted in Indian data centers&nbsp;<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":49,"y":476,"width":315,"height":143,"id":"4fbd0c35-8cec-4370-89a9-3ea22ea5c581","marginOffset":1.0968749999999971578290569595992565155029296875,"basedOn":"3879df11-14fd-4a43-84c3-bc26d797c2a3","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"533388eb-d874-4937-bddf-165101aa252f","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b7923421-fb14-4dc2-9ce5-f18abec9bca9"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1080,"height":1920,"sizes":{"medium":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-169x300.jpg","width":169,"height":300,"filesize":9379,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-169x300.jpg"},"large":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-576x1024.jpg","width":576,"height":1024,"filesize":42161,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-576x1024.jpg"},"thumbnail":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-84x150.jpg","width":84,"height":150,"filesize":5547,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-84x150.jpg"},"1536x1536":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-864x1536.jpg","width":864,"height":1536,"filesize":73450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-864x1536.jpg"},"post-thumbnail-size":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-750x330.jpg","width":750,"height":330,"filesize":27164,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-750x330.jpg"},"round-personnel-size":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-400x400.jpg","width":400,"height":400,"filesize":20082,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-400x400.jpg"},"small-grid-size":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-400x300.jpg","width":400,"height":300,"filesize":17100,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-400x300.jpg"},"portrait":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-440x550.jpg","width":440,"height":550,"filesize":24850,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-440x550.jpg"},"post-slider-side":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-750x480.jpg","width":750,"height":480,"filesize":34291,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-750x480.jpg"},"full-slider":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-980x380.jpg","width":980,"height":380,"filesize":33987,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-980x380.jpg"},"portfolio-portrait":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-500x550.jpg","width":500,"height":550,"filesize":28108,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-500x550.jpg"},"blog-grid":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-700x400.jpg","width":700,"height":400,"filesize":29246,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-700x400.jpg"},"yarpp-thumbnail":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-120x120.jpg","width":120,"height":120,"filesize":6136,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-120x120.jpg"},"web-stories-poster-portrait":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-640x853.jpg","width":640,"height":853,"filesize":42169,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-640x853.jpg"},"web-stories-publisher-logo":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-96x96.jpg","width":96,"height":96,"filesize":5332,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-96x96.jpg"},"web-stories-thumbnail":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model-150x267.jpg","width":150,"height":267,"filesize":8414,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model-150x267.jpg"},"full":{"file":"Subscription-based-SOC-services-operating-on-an-OPEX-Model.jpg","width":1080,"height":1920,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#1e4062","blurHash":"UK9[15MxIAo}_4aeD*xuIAozIV%LMxM|f5%2","creationDate":"2023-01-20T13:15:05.000Z","src":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Subscription-based-SOC-services-operating-on-an-OPEX-Model.jpg","id":13917,"alt":"Subscription-based SOC services operating on an OPEX Model","local":false},"x":-2,"y":-57,"width":415,"height":730,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"0b683c1b-fd52-4352-8817-a78b68070ec6","isBackground":true,"basedOn":"a0c5ff51-4702-47c3-add7-cb5212e4ceef","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">Subscription-based SOC services operating on an OPEX Model<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":50,"y":475,"width":315,"height":143,"id":"ddc3432e-50b3-4bc7-b0b4-7afb78deb9fd","marginOffset":1.0968749999999971578290569595992565155029296875,"basedOn":"4fbd0c35-8cec-4370-89a9-3ea22ea5c581","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"74b790b9-734e-4c13-abe6-4cfcab786fcd","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b7923421-fb14-4dc2-9ce5-f18abec9bca9"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1080,"height":1920,"sizes":{"medium":{"file":"06-last-169x300.jpg","width":169,"height":300,"filesize":6275,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-169x300.jpg"},"large":{"file":"06-last-576x1024.jpg","width":576,"height":1024,"filesize":42750,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-576x1024.jpg"},"thumbnail":{"file":"06-last-84x150.jpg","width":84,"height":150,"filesize":2289,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-84x150.jpg"},"1536x1536":{"file":"06-last-864x1536.jpg","width":864,"height":1536,"filesize":85856,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-864x1536.jpg"},"post-thumbnail-size":{"file":"06-last-750x330.jpg","width":750,"height":330,"filesize":26521,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-750x330.jpg"},"round-personnel-size":{"file":"06-last-400x400.jpg","width":400,"height":400,"filesize":18045,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-400x400.jpg"},"small-grid-size":{"file":"06-last-400x300.jpg","width":400,"height":300,"filesize":14681,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-400x300.jpg"},"portrait":{"file":"06-last-440x550.jpg","width":440,"height":550,"filesize":23513,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-440x550.jpg"},"post-slider-side":{"file":"06-last-750x480.jpg","width":750,"height":480,"filesize":36810,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-750x480.jpg"},"full-slider":{"file":"06-last-980x380.jpg","width":980,"height":380,"filesize":37591,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-980x380.jpg"},"portfolio-portrait":{"file":"06-last-500x550.jpg","width":500,"height":550,"filesize":27595,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-500x550.jpg"},"blog-grid":{"file":"06-last-700x400.jpg","width":700,"height":400,"filesize":29126,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-700x400.jpg"},"yarpp-thumbnail":{"file":"06-last-120x120.jpg","width":120,"height":120,"filesize":2848,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-120x120.jpg"},"web-stories-poster-portrait":{"file":"06-last-640x853.jpg","width":640,"height":853,"filesize":45650,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-640x853.jpg"},"web-stories-publisher-logo":{"file":"06-last-96x96.jpg","width":96,"height":96,"filesize":2097,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-96x96.jpg"},"web-stories-thumbnail":{"file":"06-last-150x267.jpg","width":150,"height":267,"filesize":5195,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last-150x267.jpg"},"full":{"file":"06-last.jpg","width":1080,"height":1920,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#0a243e","blurHash":"U44oZ-5nM{-W%%OYRit80J={nhJ89E$jofNa","creationDate":"2023-01-20T12:27:33.000Z","src":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/06-last.jpg","id":13898,"alt":"The experts at ESDS are on your side, doing everything to protect your business","local":false},"x":-2,"y":-57,"width":415,"height":730,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"af2000b8-c5c6-4566-bb70-e32984bd32ec","isBackground":true,"basedOn":"0b683c1b-fd52-4352-8817-a78b68070ec6","type":"image","overlay":null},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">We are ready to assist you with our expertise.<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":49,"y":425,"width":315,"height":71,"id":"dbd560cf-bca6-498d-953a-fa7e4b1f1803","marginOffset":1.0968749999999971578290569595992565155029296875,"basedOn":"ddc3432e-50b3-4bc7-b0b4-7afb78deb9fd","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1999999999999999555910790149937383830547332763671875,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #dbca09\">Secure yourself today!<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":50,"y":541,"width":315,"height":37,"marginOffset":1.0968749999999971578290569595992565155029296875,"basedOn":"dbd560cf-bca6-498d-953a-fa7e4b1f1803","id":"f2157f41-1bb9-456b-b5a3-a3a8f0a43ab0","type":"text","link":{"needsProxy":false,"url":"https:\/\/www.esds.co.in\/soc-as-a-service","rel":[],"icon":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/cropped-esds-1.png","desc":"Managed Security Services and SOC Compliance for Your Business Assets "}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":9342,"height":7150,"sizes":{"medium":{"file":"esds-logo-white-text-R-300x230.png","width":300,"height":230,"filesize":34399,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-300x230.png"},"large":{"file":"esds-logo-white-text-R-1024x784.png","width":1024,"height":784,"filesize":154680,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-1024x784.png"},"thumbnail":{"file":"esds-logo-white-text-R-150x115.png","width":150,"height":115,"filesize":14441,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-150x115.png"},"1536x1536":{"file":"esds-logo-white-text-R-1536x1176.png","width":1536,"height":1176,"filesize":259308,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-1536x1176.png"},"2048x2048":{"file":"esds-logo-white-text-R-2048x1567.png","width":2048,"height":1567,"filesize":381636,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-2048x1567.png"},"post-thumbnail-size":{"file":"esds-logo-white-text-R-750x330.png","width":750,"height":330,"filesize":61298,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-750x330.png"},"round-personnel-size":{"file":"esds-logo-white-text-R-400x400.png","width":400,"height":400,"filesize":46065,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-400x400.png"},"small-grid-size":{"file":"esds-logo-white-text-R-400x300.png","width":400,"height":300,"filesize":48724,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-400x300.png"},"portrait":{"file":"esds-logo-white-text-R-440x550.png","width":440,"height":550,"filesize":50638,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-440x550.png"},"post-slider-side":{"file":"esds-logo-white-text-R-750x480.png","width":750,"height":480,"filesize":87985,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-750x480.png"},"full-slider":{"file":"esds-logo-white-text-R-980x380.png","width":980,"height":380,"filesize":77338,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-980x380.png"},"portfolio-portrait":{"file":"esds-logo-white-text-R-500x550.png","width":500,"height":550,"filesize":59839,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-500x550.png"},"blog-grid":{"file":"esds-logo-white-text-R-700x400.png","width":700,"height":400,"filesize":76014,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-700x400.png"},"yarpp-thumbnail":{"file":"esds-logo-white-text-R-120x120.png","width":120,"height":120,"filesize":10900,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-120x120.png"},"web-stories-poster-portrait":{"file":"esds-logo-white-text-R-640x853.png","width":640,"height":853,"filesize":80673,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-640x853.png"},"web-stories-publisher-logo":{"file":"esds-logo-white-text-R-96x96.png","width":96,"height":96,"filesize":8174,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-96x96.png"},"web-stories-thumbnail":{"file":"esds-logo-white-text-R-150x115.png","width":150,"height":115,"filesize":14441,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R-150x115.png"},"full":{"file":"esds-logo-white-text-R.png","width":9342,"height":7150,"mimeType":"image\/png","sourceUrl":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#d9edee","blurHash":"U8M*N,4m00_3014T00_3009F00_3~pRk~o?c","creationDate":"2023-01-20T12:33:31","src":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/esds-logo-white-text-R.png","id":13900,"alt":"esds-logo-white-text R","local":false},"type":"image","x":40,"y":97,"width":330,"height":252,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"d9023e65-d468-46c6-93ae-42b51c454e47"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"f0d83721-dcb2-4093-ad47-30b6aab49cc7","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b7923421-fb14-4dc2-9ce5-f18abec9bca9"}}],"fonts":{"Roboto":{"family":"Roboto","weights":[100,300,400,500,700,900],"styles":["italic","regular"],"variants":[[0,100],[1,100],[0,300],[1,300],[0,400],[1,400],[0,500],[1,500],[0,700],[1,700],[0,900],[1,900]],"fallbacks":["Helvetica Neue","Helvetica","sans-serif"],"service":"fonts.google.com","metrics":{"upm":2048,"asc":1900,"des":-500,"tAsc":1536,"tDes":-512,"tLGap":102,"wAsc":1946,"wDes":512,"xH":1082,"capH":1456,"yMin":-555,"yMax":2163,"hAsc":1900,"hDes":-500,"lGap":0}}},"autoAdvance":true,"defaultPageDuration":7,"currentStoryStyles":{"colors":[]}},"story_poster":{"id":13923,"url":"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/cropped-Complete-data-security-with-data-securely-hosted-in-Indian-data-centers_-640x853.jpg","width":640,"height":853,"needsProxy":false},"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/web-story\/13912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/users\/81"}],"version-history":[{"count":5,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/web-story\/13912\/revisions"}],"predecessor-version":[{"id":13924,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/web-story\/13912\/revisions\/13924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/media\/13923"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/media?parent=13912"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/web_story_category?post=13912"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/web_story_tag?post=13912"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/web-story\/13912\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/web-stories\/v1\/media\/13632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}