{"id":19,"date":"2019-04-11T23:01:22","date_gmt":"2019-04-11T23:01:22","guid":{"rendered":"https:\/\/demo.themely.com\/serenity\/cart\/"},"modified":"2021-07-08T02:09:23","modified_gmt":"2021-07-08T02:09:23","slug":"cart","status":"publish","type":"page","link":"https:\/\/www.unitedinfosec.com\/?page_id=19","title":{"rendered":"We Consult"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"wp-image-571 aligncenter img-fluid\" src=\"https:\/\/www.unitedinfosec.com\/wp-content\/uploads\/2021\/07\/consulting-300x113.jpg\" alt=\"\" width=\"836\" height=\"315\" srcset=\"https:\/\/www.unitedinfosec.com\/wp-content\/uploads\/2021\/07\/consulting-300x113.jpg 300w, https:\/\/www.unitedinfosec.com\/wp-content\/uploads\/2021\/07\/consulting-768x290.jpg 768w, https:\/\/www.unitedinfosec.com\/wp-content\/uploads\/2021\/07\/consulting.jpg 1024w\" sizes=\"(max-width: 836px) 100vw, 836px\" \/><\/p>\n<p><![CDATA[[woocommerce_cart]]]><\/p>\n\n\n<p>The consultancy approach enables to take part in a development project at its very beginning, in order to include security from the conception phase (security by design), or to further deepen the security analysis following a penetration test.<\/p>\n\n\n\n<ul><li>Securing Web or mobile architecture: United Info-Sec brings its expertise in offensive security (attacker\u2019s point of view) to support the integration of security requirements in your specifications.<\/li><li>White box server audit: In-depth analysis of the security of your servers, to secure at the Web infrastructure as much as possible.<\/li><li>White box application audit: Security oriented code review, to secure the application layer as much as possible.<\/li><li>White box CMS audit: Analysis of the CMS configuration and its plug-ins, completed with tests on specific developments.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\t\t\t\t<![CDATA[]]>\t\t<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":""},"_links":{"self":[{"href":"https:\/\/www.unitedinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/19"}],"collection":[{"href":"https:\/\/www.unitedinfosec.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.unitedinfosec.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.unitedinfosec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.unitedinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19"}],"version-history":[{"count":5,"href":"https:\/\/www.unitedinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/19\/revisions"}],"predecessor-version":[{"id":574,"href":"https:\/\/www.unitedinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/19\/revisions\/574"}],"wp:attachment":[{"href":"https:\/\/www.unitedinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}