{"id":759,"date":"2019-11-16T19:17:31","date_gmt":"2019-11-16T19:17:31","guid":{"rendered":"http:\/\/controlthreat.com%20Mesh\/?page_id=759"},"modified":"2020-02-14T08:37:58","modified_gmt":"2020-02-14T08:37:58","slug":"security-design","status":"publish","type":"page","link":"https:\/\/controlthreat.com\/index.php\/security-design\/","title":{"rendered":"Security Design"},"content":{"rendered":"<p><section class=\"kc-elm kc-css-36965 kc_row\"><div class=\"kc-row-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-624898 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-666998 kc-raw-code\"><div class=\"motoslider_wrapper \" id=\"motoslider_wrapper69f16702c19f9\" >\r\n        <div data-motoslider style=\"height: 350px; max-height: 350px;\">\r\n    <\/div>\r\n    <div class=\"motoslider\" style=\"display: none;\">\r\n        <div id=\"settings\"  data-full-window-width=\"false\" data-full-height=\"false\" data-full-height-offset=\"px\" data-full-height-offset-container=\"\" data-full-size-grid=\"false\" data-timer=\"false\" data-timer-delay=\"8000\" data-hover-timer=\"false\" data-counter=\"false\" data-slider-layout=\"auto\" data-timer-reverse=\"false\" data-arrows-show=\"false\" data-thumbnails-show=\"false\" data-slideshow-timer-show=\"false\" data-slideshow-ppb-show=\"false\" data-controls-hide-on-leave=\"false\" data-swipe=\"false\" data-delay-init=\"0\" data-scroll-init=\"false\" data-start-slide=\"1\" data-visible-from=\"\" data-visible-till=\"\" data-layout-desktop-width=\"600\" data-layout-desktop-height=\"350\" data-layout-notebook-width=\"1024\" data-layout-notebook-height=\"768\" data-layout-tablet-width=\"778\" data-layout-tablet-height=\"960\" data-layout-mobile-width=\"480\" data-layout-mobile-height=\"110\" data-layout=\"true;false;false;true\" data-custom-class=\"\">\r\n        <\/div>\r\n        <div id=\"slides\">\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                            <div class=\"slide\"  data-class=\"\" data-id=\"\" data-animation=\"msSlide\" data-fade-animation=\"msSlide\" data-duration=\"1000\" data-easing=\"easeOutCirc\">\r\n                    <div class=\"slide_bg\" >\r\n                        <div  data-type=\"gradient\" data-color-initial=\"rgb(255, 255, 255)\" data-color-final=\"rgb(239, 239, 239)\" data-position=\"0deg\"><\/div><div  data-src=\"https:\/\/controlthreat.com\/wp-content\/uploads\/2017\/03\/businessman-analyzing-graphs-with-technologic-devices_33807-645.jpg\" data-type=\"image\" data-fit=\"cover\" data-position=\"center center\" data-repeat=\"no-repeat\"><\/div>                    <\/div>\r\n                    <div class=\"layers\">\r\n                                                            <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;middle\" data-offset-x=\"0;0;0;0\" data-offset-y=\"0;0;0;0\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\";;;\" data-line-height=\";;;\" data-text-align=\";;;\" data-width=\";;;\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-layer\"><\/div>\r\n                                                                    <div class=\"layer\"  data-type=\"html\" data-align-horizontal=\"center;center;center;center\" data-align-vertical=\"middle;middle;middle;top\" data-offset-x=\"16;16;16;0\" data-offset-y=\"-47;-47;-47;10\" data-animation=\"fadeIn\" data-timing-function=\"linear\" data-duration=\"1000\" data-leave-animation=\"auto\" data-leave-timing-function=\"linear\" data-leave-duration=\"1000\" data-delay=\"1000\" data-resizable=\"1\" data-dont-change-position=\"\" data-hide-width=\"\" data-font-size=\"70;70;70;30\" data-line-height=\";;;\" data-text-align=\"center;center;center;center\" data-width=\"547;547;547;547\" data-white-space=\"normal;normal;normal;normal\" data-class=\"mpsl-text-white  mpsl-layer\"><h1 style=\"color: #fff;\">Security Design<\/h1><\/div>\r\n                                                    <\/div>\r\n                <\/div>\r\n                    <\/div>\r\n    <\/div>\r\n<\/div>\r\n<p class=\"motopress-hide-script mpsl-hide-script\">\r\n    <script type=\"text\/javascript\" id='mpsl-fix-height-motoslider_wrapper69f16702c19f9'>\r\n        var aspect = 0.58333333333333;\r\n        var sliderWrapper = document.getElementById('motoslider_wrapper69f16702c19f9');\r\n        var outerWidth = sliderWrapper.offsetWidth;\r\n        var curHeight = outerWidth * aspect;\r\n        sliderWrapper.querySelector('[data-motoslider]').height = curHeight + 'px';\r\n    <\/script>\r\n<\/p>\t<\/div><div class=\"kc-elm kc-css-391378\" style=\"height: 40px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-692358 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-340481 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-506093 kc_text_block\"><\/p>\n<style type=\"text\/css\">@media only screen and (min-width: 1000px) and (max-width: 5000px){body.kc-css-system .kc-css-1344344{width: 100%;}body.kc-css-system .kc-css-2688562{width: 100%;}body.kc-css-system .kc-css-4216583{width: 100%;}body.kc-css-system .kc-css-2671877{width: 100%;}body.kc-css-system .kc-css-925360{width: 100%;}body.kc-css-system .kc-css-76666{width: 100%;}body.kc-css-system .kc-css-1725455{width: 100%;}body.kc-css-system .kc-css-2513500{width: 100%;}body.kc-css-system .kc-css-4260812{width: 100%;}}body.kc-css-system .kc-css-3978090 img{width: 1300px;height: 300px;}body.kc-css-system .kc-css-4058206 .kc-container{max-width: 800px;}body.kc-css-system .kc-css-1668116 .kc-container{max-width: 800px;}body.kc-css-system .kc-css-949196 .kc-container{max-width: 800px;}body.kc-css-system .kc-css-1678975 .kc-container{max-width: 800px;}body.kc-css-system .kc-css-473800 .kc-container{max-width: 800px;}body.kc-css-system .kc-css-3230169 .kc-container{max-width: 800px;}body.kc-css-system .kc-css-3259170 .kc-container{max-width: 800px;}body.kc-css-system .kc-css-2677439 .kc-container{max-width: 800px;}<\/style>\n<section class=\"kc-elm kc-css-197435 kc_row service style-2 sec-padd\">\n<div class=\"kc-row-container\">\n<div class=\"kc-wrap-columns\">\n<div class=\"kc-elm kc-css-1344344 kc_col-sm-12 kc_column kc_col-sm-12\">\n<div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-3978090 kc_shortcode kc_single_image\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"kc-elm kc-css-4058206 kc_row service style-2 sec-padd\">\n<div class=\"kc-row-container kc-container\">\n<div class=\"kc-wrap-columns\">\n<div class=\"kc-elm kc-css-2688562 kc_col-sm-12 kc_column kc_col-sm-12\">\n<div class=\"kc-col-container\">\n<div class=\"row\">\n<div class=\"col-md-7 col-sm-7 col-xs-12\"><\/div>\n<div class=\"col-md-5 col-sm-5 col-xs-12\">\n<div class=\"video-image-box\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"kc-elm kc-css-1668116 kc_row service style-2 sec-padd\">\n<div class=\"kc-row-container kc-container\">\n<div class=\"kc-wrap-columns\">\n<div class=\"kc-elm kc-css-4216583 kc_col-sm-12 kc_column kc_col-sm-12\">\n<div class=\"kc-col-container\">\n<div class=\"text\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"kc-elm kc-css-949196 kc_row service style-2 sec-padd\">\n<div class=\"kc-row-container kc-container\">\n<div class=\"kc-wrap-columns\">\n<div class=\"kc-elm kc-css-2671877 kc_col-sm-12 kc_column kc_col-sm-12\">\n<div class=\"kc-col-container\">\n<div class=\"text\"><\/div>\n<div class=\"section-title\">\n<h3>Security Design<\/h3>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-7 col-sm-7 col-xs-12\">\n<div class=\"text\">\n<p style=\"width: 800px;\">Security is an integeral part of any infrastructure. Security should always be incorporated at design phase as it would be difficult to address once any project or infrastructure has been built. We can assist our customers develop and design solutions putting security in mind. Our expertise can also help design any component of infrastructure which require security and is an integral part of business function.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"kc-elm kc-css-2677439 kc_row service style-2 sec-padd\">\n<div class=\"kc-row-container kc-container\">\n<div class=\"kc-wrap-columns\">\n<div class=\"kc-elm kc-css-4260812 kc_col-sm-12 kc_column kc_col-sm-12\">\n<div class=\"kc-col-container\">\n<div class=\"row\">\n<div class=\"col-md-7 col-sm-7 col-xs-12\">\n<div class=\"text\">\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tpl-king_composer.php","meta":{"footnotes":""},"class_list":["post-759","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Design - Control Threat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/controlthreat.com\/index.php\/security-design\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Design - Control Threat\" \/>\n<meta property=\"og:description\" content=\"Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security is an integeral part of any infrastructure. Security should always be incorporated at design phase as it would be difficult to address once any project or infrastructure has been built. We can\" \/>\n<meta property=\"og:url\" content=\"https:\/\/controlthreat.com\/index.php\/security-design\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Threat\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-14T08:37:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/controlthreat.com\/index.php\/security-design\/\",\"url\":\"https:\/\/controlthreat.com\/index.php\/security-design\/\",\"name\":\"Security Design - Control Threat\",\"isPartOf\":{\"@id\":\"https:\/\/controlthreat.com\/#website\"},\"datePublished\":\"2019-11-16T19:17:31+00:00\",\"dateModified\":\"2020-02-14T08:37:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/controlthreat.com\/index.php\/security-design\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/controlthreat.com\/index.php\/security-design\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/controlthreat.com\/index.php\/security-design\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/controlthreat.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Design\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/controlthreat.com\/#website\",\"url\":\"https:\/\/controlthreat.com\/\",\"name\":\"Control Threat\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/controlthreat.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Design - Control Threat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/controlthreat.com\/index.php\/security-design\/","og_locale":"en_US","og_type":"article","og_title":"Security Design - Control Threat","og_description":"Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security Design Security is an integeral part of any infrastructure. Security should always be incorporated at design phase as it would be difficult to address once any project or infrastructure has been built. We can","og_url":"https:\/\/controlthreat.com\/index.php\/security-design\/","og_site_name":"Control Threat","article_modified_time":"2020-02-14T08:37:58+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/controlthreat.com\/index.php\/security-design\/","url":"https:\/\/controlthreat.com\/index.php\/security-design\/","name":"Security Design - Control Threat","isPartOf":{"@id":"https:\/\/controlthreat.com\/#website"},"datePublished":"2019-11-16T19:17:31+00:00","dateModified":"2020-02-14T08:37:58+00:00","breadcrumb":{"@id":"https:\/\/controlthreat.com\/index.php\/security-design\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/controlthreat.com\/index.php\/security-design\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/controlthreat.com\/index.php\/security-design\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/controlthreat.com\/"},{"@type":"ListItem","position":2,"name":"Security Design"}]},{"@type":"WebSite","@id":"https:\/\/controlthreat.com\/#website","url":"https:\/\/controlthreat.com\/","name":"Control Threat","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/controlthreat.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/controlthreat.com\/index.php\/wp-json\/wp\/v2\/pages\/759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/controlthreat.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/controlthreat.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/controlthreat.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/controlthreat.com\/index.php\/wp-json\/wp\/v2\/comments?post=759"}],"version-history":[{"count":34,"href":"https:\/\/controlthreat.com\/index.php\/wp-json\/wp\/v2\/pages\/759\/revisions"}],"predecessor-version":[{"id":5555,"href":"https:\/\/controlthreat.com\/index.php\/wp-json\/wp\/v2\/pages\/759\/revisions\/5555"}],"wp:attachment":[{"href":"https:\/\/controlthreat.com\/index.php\/wp-json\/wp\/v2\/media?parent=759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}