{"id":238005,"date":"2022-03-31T13:26:19","date_gmt":"2022-03-31T13:26:19","guid":{"rendered":"https:\/\/deepdataconsultancy.com\/\/?page_id=238005"},"modified":"2022-04-04T14:21:09","modified_gmt":"2022-04-04T14:21:09","slug":"security","status":"publish","type":"page","link":"https:\/\/www.deepdataconsultancy.com\/security\/","title":{"rendered":"Security"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” use_background_color_gradient=”on” background_color_gradient_stops=”rgba(24,26,36,0.85) 0%|#181a24 100%” background_color_gradient_overlays_image=”on” background_color_gradient_start=”rgba(24,26,36,0.85)” background_color_gradient_end=”#181a24″ background_image=”https:\/\/www.deepdataconsultancy.com\/\/\/wp-content\/uploads\/2022\/02\/deep-data-consultancy_13.jpg” width=”100%” max_width=”100%” min_height=”100vh” custom_padding=”||||false|false” da_disable_devices=”off|off|off” global_module=”237958″ global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.16″ _module_preset=”default” positioning=”absolute” position_origin_a=”center_center” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16.0″ text_font=”Futura Book|700|||||||” text_text_color=”#FFFFFF” text_font_size=”50px” custom_margin=”||40px||false|false” hover_enabled=”0″ text_font_size_tablet=”50px” text_font_size_phone=”50px” text_font_size_last_edited=”on|phone” custom_css_main_element=”line-height: normal;” locked=”off” global_colors_info=”{}” text_line_height=”1.1em” sticky_enabled=”0″]<\/p>\n

Security<\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ text_text_color=”#F4F7FC” text_font_size=”26px” text_letter_spacing=”-1px” text_line_height=”1.3em” custom_margin=”||30px|||” locked=”off” global_colors_info=”{}”]<\/p>\n

Data security services are designed to protect critical business data from undesired access and mishandling, and secure a large volume of files from deletion, viruses, and theft. DDC can assist businesses with data protection through recommendations around authorization, authentication, encryption, and password management. Other common methods of data security include data masking and data erasure.<\/p>\n

DDC can also offer data backup services in the event of a loss or file corruption.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” da_disable_devices=”off|off|off” saved_tabs=”all” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ admin_label=”Column” _builder_version=”4.16″ custom_padding=”||||false|false” custom_css_main_element=”margin: auto;” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.16.0″ text_font=”Futura Book|700|||||||” text_font_size=”30px” hover_enabled=”0″ text_font_size_tablet=”50px” text_font_size_phone=”50px” text_font_size_last_edited=”on|tablet” global_colors_info=”{}” text_line_height=”1.1em” sticky_enabled=”0″]<\/p>\n

Let’s Talk Business<\/p>\n

[\/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”4.16.0″ custom_margin=”||30px|||” hover_enabled=”0″ global_colors_info=”{}” text_font=”Open Sans||||||||” sticky_enabled=”0″]<\/p>\n

Our expert team are proud to be leading the way in global big data consultancy. Get in touch today to find out more information.<\/p>\n

[\/et_pb_text][et_pb_button button_url=”\/contact-us” button_text=”Get in touch” _builder_version=”4.16″ _module_preset=”971fd6bf-a76a-4c26-83f4-f41d979a962a” custom_margin_tablet=”||60px||false|false” custom_margin_phone=”||60px||false|false” custom_margin_last_edited=”on|tablet” custom_padding_phone=”||15px||false|true” custom_padding_last_edited=”off|phone” locked=”off” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” custom_css_main_element=”margin: auto;” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”https:\/\/www.deepdataconsultancy.com\/\/wp-content\/uploads\/2022\/03\/mario-gogh-VBLHICVh-lI-unsplash-1-1-scaled.jpg” title_text=”mario-gogh-VBLHICVh-lI-unsplash (1)” align_tablet=”center” align_phone=”center” align_last_edited=”on|desktop” admin_label=”Image” _builder_version=”4.16″ custom_margin_tablet=”40px||||false|false” custom_margin_phone=”40px||||false|false” custom_margin_last_edited=”on|phone” animation_style=”slide” animation_direction=”bottom” animation_duration=”1200ms” animation_intensity_slide=”2%” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

SecurityData security services are designed to protect critical business data from undesired access and mishandling, and secure a large volume of files from deletion, viruses, and theft. DDC can assist businesses with data protection through recommendations around authorization, authentication, encryption, and password management. Other common methods of data security include data masking and data erasure. […]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-238005","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.deepdataconsultancy.com\/wp-json\/wp\/v2\/pages\/238005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deepdataconsultancy.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.deepdataconsultancy.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepdataconsultancy.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepdataconsultancy.com\/wp-json\/wp\/v2\/comments?post=238005"}],"version-history":[{"count":6,"href":"https:\/\/www.deepdataconsultancy.com\/wp-json\/wp\/v2\/pages\/238005\/revisions"}],"predecessor-version":[{"id":238520,"href":"https:\/\/www.deepdataconsultancy.com\/wp-json\/wp\/v2\/pages\/238005\/revisions\/238520"}],"wp:attachment":[{"href":"https:\/\/www.deepdataconsultancy.com\/wp-json\/wp\/v2\/media?parent=238005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}