{"id":1189,"date":"2022-04-14T10:08:01","date_gmt":"2022-04-14T10:08:01","guid":{"rendered":"https:\/\/www.infocare.org.cn\/?page_id=1189"},"modified":"2025-11-20T16:58:35","modified_gmt":"2025-11-20T08:58:35","slug":"security","status":"publish","type":"page","link":"https:\/\/www.infocare.org.cn\/zh\/security\/","title":{"rendered":"\u7f51\u7edc\u5b89\u5168"},"content":{"rendered":"<h1>\n<div data-zone-id=\"0\" data-line-index=\"0\">\n<h1 class=\"elementor-heading-title elementor-size-default\">\u7f51\u7edc\u5b89\u5168<\/h1>\n<\/div>\n<\/h1>\n<div>\n<div data-zone-id=\"0\" data-line-index=\"0\"><span>\u901a\u8fc7Infocare\u7684\u670d\u52a1\uff0c\u6211\u4eec\u53ef\u4ee5\u5c06\u60a8\u7684\u57fa\u7840\u67b6\u6784\u91c7\u7528\u5b89\u5168\u7684\u65b9\u5f0f\u8fdb\u884c\u6539\u9020\u548c\u73b0\u4ee3\u5316\u3002<\/span><\/div>\n<\/div>\n<h2>\u6211\u4eec<span class=\"uk-text-primary\"> \u53ef\u63d0\u4f9b\u7684\u5e2e\u52a9<\/span><\/h2>\n<div>\n<div class=\"elementor-element elementor-element-9db51d0 elementor-widget elementor-widget-text-editor\" data-id=\"9db51d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-text-editor elementor-clearfix\">\n<p>\u6211\u4eec\u4e3a\u4efb\u4f55\u89c4\u6a21\u7684\u4f01\u4e1a\u63d0\u4f9b\u884c\u4e1a\u9886\u5148\u7684\u4f01\u4e1a\u7ea7\u5b89\u5168\u4ea7\u54c1\uff0c\u5e76\u63d0\u4f9b\u5168\u9762\u7684\u53ef\u89c6\u5316\u670d\u52a1\u548c\u5a01\u80c1\u4fdd\u62a4\u3002\u4f01\u4e1a\u53ef\u4ee5\u5c06\u5b89\u5168\u6df1\u5165\u5230\u6df7\u5408IT\u67b6\u6784\u4e2d\uff0c\u6784\u5efa\u5b89\u5168\u9a71\u52a8\u7684\u7f51\u7edc\uff0c\u4ee5\u5b9e\u73b0\uff1a<\/p>\n<ul>\n<li>\u7efc\u5408\u5b89\u5168\u9632\u5fa1<\/li>\n<li>\u8d85\u5feb\u5b89\u5168\uff0c\u6781\u901f\u54cd\u5e94<\/li>\n<li>\u7528\u5b89\u5168\u670d\u52a1\u8fdb\u884c\u5b9e\u65f6\u9632\u5fa1<\/li>\n<li>\u4f18\u79c0\u7684\u7528\u6237\u4f53\u9a8c\u00a0<\/li>\n<li>\u9ad8\u8fd0\u8425\u6548\u7387\u548c\u81ea\u52a8\u5316\u7684\u5de5\u4f5c\u6d41\u7a0b<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5b3418d elementor-widget elementor-widget-spacer\" data-id=\"5b3418d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-spacer\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2>\n<h4 class=\"elementor-heading-title elementor-size-default\">\u6211\u4eec\u8fd8\u63d0\u4f9b\u5b89\u5168\u65b9\u9762\u7684\u7f51\u7edc\u5a01\u80c1\u8bc4\u4f30\uff1a<\/h4>\n<\/h2>\n<ul>\n<li>\n<div>\n<p>\u6bcf\u5468\u5b9a\u5236\u7684\u5b89\u5168\u5a01\u80c1\u62a5\u544a<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>\u5728\u60a8\u7684\u7f51\u7edc\u4e2d\u90e8\u7f72\u8bbe\u5907\uff0cAI\u68c0\u6d4b\u7f51\u7edc\u5a01\u80c1<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>\u8bbe\u5907\u81ea\u52a8\u5b66\u4e60\u4ec0\u4e48\u662f\u6bcf\u4e2a\u8bbe\u5907\u3001\u7528\u6237\u548c\u7f51\u7edc\u7684 \"\u6b63\u5e38 \"\u60c5\u51b5<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>\u5206\u6790\u95ee\u9898\u662f\u4ec0\u4e48\uff0c\u5982\u4f55\u53d1\u73b0\u7684<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>\u5bf9\u5a01\u80c1\u8fdb\u884c\u5171\u540c\u8c03\u67e5\uff0c\u4ee5\u786e\u5b9a\u5546\u8bae\u7684\u53ef\u80fd\u6027<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h2>\n<\/h2>\n<p><img src=\"\/wp-content\/uploads\/2022\/04\/side-view-dangerous-cyber-criminal-with-white-mask-dangerous-virus-scaled.jpg\" alt=\"\"><\/p>\n<h2>\u6211\u4eec<span class=\"uk-text-primary\">\u00a0\u63d0\u4f9b<\/span><\/h2>\n<ul>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/organized-female-hacker-her-team-stealing-information-from-government-server-using-super-computers-scaled.jpg\" alt=\"\"><\/p>\n<h3>\u7f51\u7edc\u5b89\u5168<\/h3>\n<div>\n<p>\u6e17\u900f\u6d4b\u8bd5\u662f\u4e00\u79cd\u4f18\u79c0\u7684\u89c4\u5212\u6280\u672f\uff0c\u53ef\u4ee5\u786e\u5b9a\u5b89\u5168\u6001\u52bf\u7684\u53ef\u91cf\u5316\u6c34\u5e73\u3002\u6211\u4eec\u7684\u6e17\u900f\u6d4b\u8bd5\u4e13\u5bb6\u4f7f\u7528\u5404\u79cd\u590d\u6742\u7684\u5de5\u5177\u3002<\/p>\n<p>\u7136\u540e\uff0c\u6211\u4eec\u5c06\u4ea4\u4ed8\u4e00\u4efd\u5173\u4e8e\u6211\u4eec\u8c03\u67e5\u7ed3\u679c\u7684\u6700\u7ec8\u62a5\u544a\uff0c\u5e76\u5e2e\u52a9\u60a8\u6539\u5584\u6211\u4eec\u53d1\u73b0\u7684\u5b89\u5168\u95ee\u9898\u3002<\/p>\n<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/cp.png\" alt=\"\"><\/p>\n<h3>\u7aef\u70b9\u5b89\u5168<\/h3>\n<div>\n<p>\u6211\u4eec\u5c06\u534f\u52a9\u60a8\u4fdd\u62a4\u7528\u6237\u8bbe\u5907\u548c\u4ea7\u751f\u7684\u6570\u636e\uff0c\u786e\u4fdd\u5458\u5de5\u80fd\u591f\u6b63\u5e38\u5de5\u4f5c\u3002\u6211\u4eec\u8fd8\u81f4\u529b\u4e8e\u5bf9\u5de5\u4f5c\u6570\u636e\u8fdb\u884c\u52a0\u5bc6\uff0c\u9632\u6b62\u91cd\u8981\u6570\u636e\u7684\u6cc4\u9732\u5bfc\u81f4\u88ab\u6076\u610f\u4f7f\u7528\u3002<\/p>\n<ul><\/ul>\n<\/div>\n<\/li>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/storage.png\" alt=\"\"><\/p>\n<h3>\u6570\u636e\u5b89\u5168<\/h3>\n<div>Your Enterprise Data: Available, Scalable, and Protected. Legacy data protection costs time and money while putting your data at risk. You deserve to have confidence in your data across all platforms is fully protected and can be quickly recovered. You will have a platform that will grow and scale with your future needs. We help you protect it.<\/div>\n<\/li>\n<\/ul>\n<h2>\u6211\u4eec<span class=\"uk-text-primary\"> \u7684\u670d\u52a1<\/span><\/h2>\n<div>\n<p>\u57fa\u4e8e\u6574\u4f53\u5206\u6790\uff0c\u6211\u4eec\u5e0c\u671b\u80fd\u5e2e\u52a9\u60a8\u4f01\u4e1a\u63d0\u9ad8\u5b89\u5168\u6c34\u5e73\u548c\u6570\u636e\u707e\u96be\u6062\u590d\u7684\u80fd\u529b\u3002<\/p>\n<\/div>\n<ul>\n<li>\n<div>\n<p class=\"p1\">\u63d0\u524d\u8bc6\u522b\u6f5c\u5728\u7684\u5b89\u5168\u95ee\u9898<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>\u8f93\u51fa\u7f51\u7edc\u5b89\u5168\u9632\u5fa1\u80fd\u529b<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>\u57fa\u4e8e\u4e1a\u52a1\u573a\u666f\u7684\u5b89\u5168\u89e3\u51b3\u65b9\u6848<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<div>\n<p>\u52a8\u6001\u667a\u80fd\u5b89\u5168\u89e3\u51b3\u65b9\u6848<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>\u65f6\u95f4\u7ebf\u89c4\u5212<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>\u964d\u4f4e\u6210\u672c<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h2>\u6211\u4eec<span class=\"uk-text-primary\"> \u5408\u4f5c\u4f19\u4f34<\/span><\/h2>\n<ul>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/sophos-1.png\" alt=\"\"><\/p>\n<h3>Dell<\/h3>\n<p><a href=\"\/index.php?page_id=25\"><\/a><\/p>\n<\/li>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/fortinet.png\" alt=\"\"><\/p>\n<h3>Management Consulting<\/h3>\n<p><a href=\"\/index.php?page_id=25\"><\/a><\/p>\n<\/li>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/huawei.png\" alt=\"\"><\/p>\n<h3>Investments &#038; Consulting<\/h3>\n<p><a href=\"\/index.php?page_id=25\"><\/a><\/p>\n<\/li>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/juniper.png\" alt=\"\"><\/p>\n<h3>XIIO<\/h3>\n<p><a href=\"\/index.php?page_id=25\"><\/a><\/p>\n<\/li>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/veeam.png\" alt=\"\"><\/p>\n<h3>sangfor<\/h3>\n<p><a href=\"\/index.php?page_id=25\"><\/a><\/p>\n<\/li>\n<li>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/sangfor.png\" alt=\"\"><\/p>\n<h3>Supplement<\/h3>\n<p>https:\/\/www.infocare.org.cn\/wp-admin\/edit.php?post_type=page<\/p>\n<p><a href=\"\/index.php?page_id=25\"><\/a><\/p>\n<\/li>\n<\/ul>\n<div>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/fortinet.png\" alt=\"\"><\/p>\n<div>\n<p><strong>FortiGate NGFWs\u4e3a\u4efb\u4f55\u89c4\u6a21\u7684\u4f01\u4e1a\u63d0\u4f9b\u884c\u4e1a\u9886\u5148\u7684\u4f01\u4e1a\u5b89\u5168\u4ea7\u54c1\uff0c\u5177\u6709\u5b8c\u5168\u7684\u53ef\u89c6\u6027\u548c\u5a01\u80c1\u4fdd\u62a4\u80fd\u529b\u3002<\/strong><\/p>\n<\/div>\n<p><a href=\"https:\/\/www.infocare.org.cn\/zh\/security-fortigate\/\"><\/a><\/p>\n<\/div>\n<div>\n<p>        <img src=\"\/wp-content\/uploads\/2022\/04\/sophos-1.png\" alt=\"\"><\/p>\n<div>\n<p class=\"light\"><strong>\u5f3a\u5927\u7684\u4fdd\u62a4\u548c\u6027\u80fd NGFWs<\/strong><\/p>\n<p><strong>\u62e5\u6709\u4e16\u754c\u4e0a\u6700\u597d\u7684\u7aef\u70b9\u4fdd\u62a4<\/strong><\/p>\n<\/div>\n<p><a href=\"https:\/\/www.infocare.org.cn\/zh\/securty-sophos\/\"><\/a><\/p>\n<\/div>\n<ul>\n<li>\n<p><a href=\"mailto:help@infocare.org.cn\"><\/p>\n<p>\u670d\u52a1\u53f0\uff1ahelp@infocare.org.cn<\/p>\n<p><\/a><\/p>\n<\/li>\n<li>\n<div>\n<\/div>\n<\/li>\n<li>\n<div>\u4e1a\u52a1\u5408\u4f5c\uff1abd@infocare.org.cn<\/div>\n<\/li>\n<li>\n<div>\n<\/div>\n<\/li>\n<li>\n<p><a href=\"tel:4000581099\"><\/p>\n<p><span>400-058-1099<\/span><\/p>\n<p><\/a><\/p>\n<\/li>\n<\/ul>\n<div>\n<p>\u63d0\u4f9b7\u00d724\u5c0f\u65f6\u670d\u52a1\u3002<\/p>\n<\/div>\n<h2>\u90ae\u4ef6\u8ba2\u9605<\/h2>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Computing\",\"type\":\"layout\",\"children\":[{\"name\":\"Bannar\",\"type\":\"section\",\"props\":{\"width\":\"expand\",\"padding\":\"small\",\"style\":\"secondary\",\"media\":\"images\\\/home-header.jpg\",\"height_viewport\":true,\"header_overlay\":\"light\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/wallhaven-4y3ep7.png\",\"media_advanced\":true,\"image_size\":\"cover\",\"media_background\":null,\"media_overlay\":null,\"animation\":\"fade\",\"image_position\":\"top-center\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_width\":\"1560\"},\"children\":[{\"name\":\"\",\"type\":\"row\",\"props\":{\"layout\":\"large,expand\",\"match\":false,\"vertical_align\":false,\"divider\":false,\"column_gap\":\"collapse\",\"row_gap\":\"collapse\"},\"children\":[{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"style\":\"secondary\",\"padding\":\"xlarge\",\"preserve_color\":false,\"media_overlay_gradient\":\"\",\"width_medium\":\"2xlarge\",\"position_sticky_breakpoint\":\"m\",\"width_default\":\"\",\"width_large\":\"\"},\"children\":[{\"name\":\"\",\"type\":\"headline\",\"props\":{\"title_element\":\"h1\",\"content\":\"\n\n<div data-zone-id=\\\"0\\\" data-line-index=\\\"0\\\">\\n\n\n<h1 class=\\\"elementor-heading-title elementor-size-default\\\">Security<\\\/h1>\\n<\\\/div>\",\"title_style\":\"h2\",\"margin_remove_bottom\":true,\"maxwidth\":\"large\",\"block_align\":\"center\"}},{\"name\":\"\",\"type\":\"text\",\"props\":{\"margin\":\"small\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<div data-zone-id=\\\"0\\\" data-line-index=\\\"0\\\"><span>With Infocare\\u2019s services, we can transform and modernize your infrastructure adoption for security.<\\\/span><\\\/div>\",\"maxwidth\":\"large\",\"block_align\":\"center\"}}]},{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"expand\",\"position_sticky_breakpoint\":\"m\"}}]}]},{\"name\":\"Text &Pic\",\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\",\"padding\":\"large\"},\"children\":[{\"name\":\"\",\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"\"},\"children\":[{\"name\":\"\",\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"content\":\"We<span class=\\\"uk-text-primary\\\"> Can Help<\\\/span>\",\"text_align\":\"left\",\"margin\":\"large\",\"title_decoration\":\"bullet\"}},{\"name\":\"\",\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<div class=\\\"elementor-element elementor-element-9db51d0 elementor-widget elementor-widget-text-editor\\\" data-id=\\\"9db51d0\\\" data-element_type=\\\"widget\\\" data-widget_type=\\\"text-editor.default\\\">\\n\n\n<div class=\\\"elementor-widget-container\\\">\\n\n\n<div class=\\\"elementor-text-editor elementor-clearfix\\\">\\n\n\n<p>We provide security products to deliver industry-leading enterprise security for any edge at any scale with full visibility and threat protection. Organizations can weave security deep into the hybrid IT architecture and build security-driven networks to achieve:<\\\/p>\\n\n\n<ul>\\n\n\n<li>Integrated Security Defense<\\\/li>\\n\n\n<li>Ultra-fast Security, Rapid Response<\\\/li>\\n\n\n<li>Real-time Defense With Security Services<\\\/li>\\n\n\n<li>Excellent User Experience\\u00a0<\\\/li>\\n\n\n<li>Operational Efficiency and Automated Workflows<\\\/li>\\n<\\\/ul>\\n<\\\/div>\\n<\\\/div>\\n<\\\/div>\\n\n\n<div class=\\\"elementor-element elementor-element-5b3418d elementor-widget elementor-widget-spacer\\\" data-id=\\\"5b3418d\\\" data-element_type=\\\"widget\\\" data-widget_type=\\\"spacer.default\\\">\\n\n\n<div class=\\\"elementor-widget-container\\\">\\n\n\n<div class=\\\"elementor-spacer\\\"><\\\/div>\\n<\\\/div>\\n<\\\/div>\"}}]}]}]},{\"type\":\"section\",\"props\":{\"style\":\"muted\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"position_sticky_breakpoint\":\"m\",\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"2-3\"},\"children\":[{\"name\":\"\",\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"content\":\"\n\n<h4 class=\\\"elementor-heading-title elementor-size-default\\\">We also provide Cyber Threat Assessment for Security<\\\/h4>\",\"margin\":\"large\",\"margin_remove_top\":false,\"margin_remove_bottom\":true,\"title_style\":\"h3\"}},{\"name\":\"\",\"type\":\"list\",\"props\":{\"show_image\":true,\"show_link\":true,\"image_align\":\"left\",\"list_size\":\"large\",\"link_style\":\"text\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"list_element\":\"ul\",\"column_breakpoint\":\"m\",\"icon\":\"arrow-right\",\"icon_color\":\"primary\",\"list_type\":\"vertical\",\"list_horizontal_separator\":\", \"},\"children\":[{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Weekly custom-made threat intelligence<\\\/p>\",\"link\":\"\",\"icon\":\"\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>An appliance is deployed in your network that uses AI to detect cyber threats<\\\/p>\",\"link\":\"\",\"icon\":\"\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Device automatically learns what is \\u2018normal\\u2019 for every device, user, and network<\\\/p>\",\"link\":\"\",\"icon\":\"\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Analysis of what was found and how<\\\/p>\",\"link\":\"\",\"icon\":\"\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Joint commitment where threats are investigated together to determine the likelihood of compromise<\\\/p>\",\"link\":\"\",\"icon\":\"\"}}]}]},{\"type\":\"column\",\"props\":{\"position_sticky_breakpoint\":\"m\",\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-3\"},\"children\":[{\"name\":\"\",\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"content\":\"<br \\\/><br \\\/>\",\"margin\":\"large\",\"margin_remove_top\":false,\"margin_remove_bottom\":true,\"title_style\":\"h3\"}},{\"type\":\"image\",\"props\":{\"margin\":\"\",\"image_svg_color\":\"emphasis\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/side-view-dangerous-cyber-criminal-with-white-mask-dangerous-virus-scaled.jpg\",\"image_border\":\"rounded\",\"image_box_shadow\":\"xlarge\",\"text_align\":\"center\"}}]}]}]},{\"name\":\"We can bring\",\"type\":\"section\",\"props\":{\"width\":\"large\",\"style\":\"default\",\"media\":\"\",\"height_viewport\":false,\"header_overlay\":\"light\",\"animation\":\"slide-top-small\",\"padding_remove_top\":false,\"image_size\":\"cover\",\"image_position\":\"center-center\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"title\":\"\",\"animation_delay\":false},\"children\":[{\"name\":\"\",\"type\":\"row\",\"props\":{\"match\":true,\"column_gap\":\"small\",\"row_gap\":\"small\"},\"children\":[{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-1\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"content\":\"We<span class=\\\"uk-text-primary\\\">\\u00a0Provide<\\\/span>\",\"text_align\":\"left\",\"margin\":\"large\",\"title_decoration\":\"bullet\"}},{\"type\":\"grid\",\"props\":{\"show_title\":true,\"show_meta\":true,\"show_content\":true,\"show_image\":true,\"show_link\":true,\"grid_default\":\"1\",\"grid_medium\":\"1\",\"filter_style\":\"tab\",\"filter_all\":false,\"filter_position\":\"top\",\"filter_align\":\"left\",\"filter_grid_width\":\"auto\",\"filter_grid_breakpoint\":\"m\",\"title_hover_style\":\"reset\",\"title_element\":\"h3\",\"title_align\":\"top\",\"title_grid_width\":\"1-2\",\"title_grid_breakpoint\":\"m\",\"meta_style\":\"meta\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_width\":\"1-2\",\"image_grid_breakpoint\":\"m\",\"image_svg_color\":\"emphasis\",\"link_text\":\"Read more\",\"link_style\":\"default\",\"margin\":\"default\",\"item_animation\":true,\"grid_masonry\":false,\"grid_large\":\"3\",\"lightbox\":false,\"filter\":false,\"filter_animation\":\"false\",\"filter_reverse\":true,\"title_display\":\"lightbox\",\"content_display\":\"lightbox\",\"panel_padding\":\"small\",\"grid_column_gap\":\"large\",\"grid_xlarge\":\"3\",\"content_align\":true},\"children\":[{\"type\":\"grid_item\",\"props\":{\"title\":\"Network Security\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/organized-female-hacker-her-team-stealing-information-from-government-server-using-super-computers-scaled.jpg\",\"content\":\"\n\n<p>Penetration testing is an excellent planning technique to determine a quantifiable level of security posture. Our penetration testing experts use a variety of sophisticated tools.<\\\/p>\\n\n\n<p>Then we will deliver a final report on our findings and help you improve the security issues we found.<\\\/p>\\n\n\n<p><\\\/p>\",\"panel_style\":\"card-default\"}},{\"type\":\"grid_item\",\"props\":{\"title\":\"Endpoint Security\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/cp.png\",\"content\":\"\n\n<p>We will assist you to protect user devices and the data generated to ensure that employees can work properly. We are also committed to the encryption of work data to prevent the leakage of important data from being used maliciously.<\\\/p>\\n\n\n<ul><\\\/ul>\",\"panel_style\":\"card-default\"}},{\"type\":\"grid_item\",\"props\":{\"title\":\"Data Security\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/storage.png\",\"content\":\"Your Enterprise Data: Available, Scalable, and Protected. Legacy data protection costs time and money while putting your data at risk. You deserve to have confidence in your data across all platforms is fully protected and can be quickly recovered. You will have a platform that will grow and scale with your future needs. We help you protect it.\",\"panel_style\":\"card-default\"}}]}]}]}]},{\"name\":\"List\",\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\",\"padding\":\"xsmall\",\"padding_remove_bottom\":false,\"animation_delay\":false},\"children\":[{\"name\":\"\",\"type\":\"row\",\"children\":[{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-1\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"content\":\"We<span class=\\\"uk-text-primary\\\"> Focus on<\\\/span>\",\"text_align\":\"left\",\"margin\":\"large\",\"title_decoration\":\"bullet\"}},{\"name\":\"\",\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Based on the overall analysis, we hope to help you improve your security and data disaster recovery capabilities.<\\\/p>\"}}]}]},{\"name\":\"\",\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"column_gap\":\"large\",\"row_gap\":\"small\",\"margin\":\"large\"},\"children\":[{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-2\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"list\",\"props\":{\"show_image\":true,\"show_link\":true,\"image_align\":\"left\",\"list_style\":\"divider\",\"content_style\":null,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"list_size\":\"\",\"list_element\":\"ul\",\"column_breakpoint\":\"m\",\"list_type\":\"vertical\",\"list_horizontal_separator\":\", \",\"icon_color\":\"primary\"},\"children\":[{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p class=\\\"p1\\\">Identify potential security issues in advance<\\\/p>\",\"icon\":\"check\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Output the network security defense capability<\\\/p>\",\"icon\":\"check\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Security solutions for business scenarios<\\\/p>\",\"icon\":\"check\"}}]}]},{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-2\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"list\",\"props\":{\"show_image\":true,\"show_link\":true,\"image_align\":\"left\",\"list_style\":\"divider\",\"content_style\":null,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"list_size\":\"\",\"list_element\":\"ul\",\"column_breakpoint\":\"m\",\"margin\":\"small\",\"list_type\":\"vertical\",\"list_horizontal_separator\":\", \",\"icon_color\":\"primary\"},\"children\":[{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Dynamic intelligent security solutions<\\\/p>\",\"icon\":\"check\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Timelines to success<\\\/p>\",\"icon\":\"check\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Cost Impacts and Improvements<\\\/p>\",\"icon\":\"check\"}}]}]}]}]},{\"name\":\"Our Partner\",\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\",\"padding\":\"large\",\"animation\":\"fade\",\"animation_delay\":\"200\"},\"children\":[{\"name\":\"\",\"type\":\"row\",\"children\":[{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-1\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"content\":\"We<span class=\\\"uk-text-primary\\\"> Work With<\\\/span>\",\"text_align\":\"left\",\"margin\":\"large\",\"title_decoration\":\"bullet\"}},{\"name\":\"\",\"type\":\"gallery\",\"props\":{\"show_title\":false,\"show_meta\":false,\"show_content\":true,\"show_link\":true,\"show_hover_image\":false,\"grid_default\":\"2\",\"grid_medium\":\"3\",\"overlay_mode\":\"caption\",\"overlay_hover\":false,\"overlay_style\":\"\",\"text_color\":\"light\",\"overlay_position\":\"center\",\"overlay_transition\":\"fade\",\"title_element\":\"h3\",\"meta_style\":\"meta\",\"meta_align\":\"below-title\",\"text_align\":\"center\",\"margin\":\"medium\",\"grid_small\":\"3\",\"item_animation\":true,\"filter_style\":\"tab\",\"filter_all\":true,\"filter_position\":\"top\",\"filter_align\":\"left\",\"filter_grid_width\":\"auto\",\"grid_column_gap\":\"large\",\"grid_row_gap\":\"large\",\"filter_grid_breakpoint\":\"m\",\"overlay_link\":true,\"link_text\":\"\",\"title_hover_style\":\"reset\",\"meta_element\":\"div\",\"link_style\":\"default\",\"animation\":\"none\"},\"children\":[{\"name\":\"\",\"type\":\"gallery_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/sophos-1.png\",\"link\":\"index.php?page_id=25\",\"title\":\"Dell\",\"hover_image\":null}},{\"name\":\"\",\"type\":\"gallery_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/fortinet.png\",\"link\":\"index.php?page_id=25\",\"title\":\"Management Consulting\",\"hover_image\":null}},{\"name\":\"\",\"type\":\"gallery_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/huawei.png\",\"link\":\"index.php?page_id=25\",\"title\":\"Investments & Consulting\",\"hover_image\":null}},{\"name\":\"\",\"type\":\"gallery_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/juniper.png\",\"link\":\"index.php?page_id=25\",\"title\":\"XIIO\",\"hover_image\":null}},{\"name\":\"\",\"type\":\"gallery_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/veeam.png\",\"link\":\"index.php?page_id=25\",\"title\":\"sangfor\",\"hover_image\":null}},{\"name\":\"\",\"type\":\"gallery_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/sangfor.png\",\"link\":\"index.php?page_id=25\",\"title\":\"Supplement\",\"hover_image\":null,\"meta\":\"https:\\\/\\\/www.infocare.org.cn\\\/wp-admin\\\/edit.php?post_type=page\"}}]}]}]}]},{\"name\":\"project\",\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\",\"padding\":\"xsmall\",\"padding_remove_bottom\":false,\"animation\":\"fade\",\"animation_delay\":\"200\"},\"children\":[{\"name\":\"\",\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin\":\"default\",\"match\":false,\"column_gap\":\"medium\",\"row_gap\":\"medium\"},\"children\":[{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/veeambannar.png\",\"image_size\":\"cover\",\"image_width\":\"960\",\"text_color\":\"light\",\"padding\":\"xlarge\",\"style\":\"default\",\"media_background\":null,\"media_overlay\":\"rgba(41, 69, 164, 0.8)\",\"width_medium\":\"1-2\",\"media_overlay_gradient\":\"\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"panel\",\"props\":{\"link_text\":\"\",\"title_element\":\"h3\",\"meta_style\":\"meta\",\"meta_align\":\"below-title\",\"image_align\":\"top\",\"image_grid_width\":\"1-2\",\"link_style\":\"text\",\"margin\":\"default\",\"content\":\"\n\n<p><strong>FortiGate NGFWs deliver industry-leading enterprise security for any edge at any scale with full visibility and threat protection.<\\\/strong><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/fortinet.png\",\"maxwidth\":\"large\",\"text_align\":\"left\",\"link\":\"security-fortigate\\\/\",\"block_align\":\"center\",\"image_grid_breakpoint\":\"m\",\"icon_width\":80,\"title_hover_style\":\"reset\",\"title_align\":\"top\",\"title_grid_width\":\"1-2\",\"title_grid_breakpoint\":\"m\",\"meta_element\":\"div\",\"content_column_breakpoint\":\"m\",\"image_svg_color\":\"emphasis\",\"image_width\":\"200\",\"link_target\":true,\"panel_link\":true,\"image_transition\":\"scale-up\"}}]},{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/test-drive-computer_0.png\",\"image_size\":\"cover\",\"text_color\":\"dark\",\"padding\":\"xlarge\",\"image_width\":\"960\",\"style\":\"default\",\"media_overlay\":\"rgba(255, 255, 255, 0.9)\",\"width_medium\":\"1-2\",\"media_overlay_gradient\":\"\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"panel\",\"props\":{\"link_text\":\"\",\"title_element\":\"h3\",\"meta_style\":\"meta\",\"meta_align\":\"below-title\",\"image_align\":\"top\",\"image_grid_width\":\"1-2\",\"link_style\":\"text\",\"margin\":\"default\",\"content\":\"\n\n<p class=\\\"light\\\"><strong>Powerful Protection and Performance NGFWs<\\\/strong><\\\/p>\\n\n\n<p><strong>With The World\\u2019s Best Endpoint Protection<\\\/strong><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/04\\\/sophos-1.png\",\"maxwidth\":\"large\",\"text_align\":\"left\",\"link\":\"securty-sophos\\\/\",\"block_align\":\"center\",\"image_grid_breakpoint\":\"m\",\"icon_width\":80,\"title_hover_style\":\"reset\",\"title_align\":\"top\",\"title_grid_width\":\"1-2\",\"title_grid_breakpoint\":\"m\",\"meta_element\":\"div\",\"content_column_breakpoint\":\"m\",\"image_svg_color\":\"emphasis\",\"image_width\":\"200\",\"link_target\":true,\"panel_link\":true,\"image_transition\":\"scale-up\"}}]}]}]},{\"name\":\"newcontact\",\"type\":\"section\",\"props\":{\"style\":\"muted\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-left\",\"padding\":\"large\",\"image\":\"\"},\"children\":[{\"name\":\"\",\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"vertical_align\":false,\"column_gap\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"width_medium\":\"1-2\",\"media_overlay_gradient\":\"\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"list\",\"props\":{\"show_image\":true,\"show_link\":true,\"image_align\":\"left\",\"content_style\":\"h5\",\"link_style\":\"text\",\"text_align\":\"left\",\"maxwidth\":\"large\",\"list_size\":\"\",\"list_element\":\"ul\",\"column_breakpoint\":\"m\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"list_type\":\"vertical\",\"list_horizontal_separator\":\", \"},\"children\":[{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Helpdesk\\uff1ahelp@infocare.org.cn<\\\/p>\",\"link\":\"mailto:help@infocare.org.cn\",\"link_target\":true}},{\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p><\\\/p>\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"Business Coopeartion\\uff1abd@infocare.org.cn\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p><\\\/p>\"}},{\"name\":\"\",\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p><span>400-058-1099<\\\/span><\\\/p>\",\"link\":\"tel:4000581099\"}}]},{\"name\":\"\",\"type\":\"text\",\"props\":{\"margin\":\"\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>7x24 Hours Service Available.<\\\/p>\",\"text_align\":\"left\",\"text_color\":\"muted\",\"maxwidth\":\"large\"}}]},{\"name\":\"\",\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"width_medium\":\"1-2\",\"media_overlay_gradient\":\"\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"\",\"type\":\"headline\",\"props\":{\"title_element\":\"h2\",\"content\":\"Newsletter\",\"text_align\":\"left\",\"maxwidth\":\"small\",\"title_style\":\"h3\"}},{\"name\":\"\",\"type\":\"newsletter\",\"props\":{\"layout\":\"grid\",\"show_name\":false,\"label_first_name\":\"First name\",\"label_last_name\":\"Last name\",\"label_email\":\"Email address\",\"label_button\":\"Subscribe\",\"provider\":{\"name\":\"mailchimp\",\"after_submit\":\"message\",\"message\":\"You've been subscribed successfully.\",\"redirect\":\"\"},\"mailchimp\":{\"client_id\":\"\",\"list_id\":\"\"},\"cmonitor\":{\"client_id\":\"\",\"list_id\":\"\"},\"button_mode\":\"button\",\"button_style\":\"primary\",\"button_icon\":\"mail\",\"gap\":\"medium\"}}]}]}]}],\"version\":\"2.7.19\",\"yooessentialsVersion\":\"1.6.8\"} --><\/p>","protected":false},"excerpt":{"rendered":"<p>Security With Infocare\u2019s services, we can transform and modernize your infrastructure adoption for security. We Can Help We provide security products to deliver industry-leading enterprise security for any edge at any scale with full visibility and threat protection. Organizations can weave security deep into the hybrid IT architecture and build security-driven networks to achieve: Integrated [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.infocare.org.cn\/zh\/wp-json\/wp\/v2\/pages\/1189"}],"collection":[{"href":"https:\/\/www.infocare.org.cn\/zh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocare.org.cn\/zh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocare.org.cn\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocare.org.cn\/zh\/wp-json\/wp\/v2\/comments?post=1189"}],"version-history":[{"count":72,"href":"https:\/\/www.infocare.org.cn\/zh\/wp-json\/wp\/v2\/pages\/1189\/revisions"}],"predecessor-version":[{"id":3835,"href":"https:\/\/www.infocare.org.cn\/zh\/wp-json\/wp\/v2\/pages\/1189\/revisions\/3835"}],"wp:attachment":[{"href":"https:\/\/www.infocare.org.cn\/zh\/wp-json\/wp\/v2\/media?parent=1189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}