{"id":1159,"date":"2020-06-09T04:44:01","date_gmt":"2020-06-09T02:44:01","guid":{"rendered":"https:\/\/www.greystoneitc.co.za\/wordpress\/?page_id=1159"},"modified":"2025-06-28T17:53:25","modified_gmt":"2025-06-28T15:53:25","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.greystoneitc.co.za\/?page_id=1159","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-1\"><h2 style=\"color: #ef3125; font-size: 42px; text-align: left;\">Cyber Security Services<span style=\"color: #000000;\">.<\/span><\/h2>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:30px;width:100%;max-width:10%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#959d9f;border-top-width:5px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><h2 style=\"font-size: 36px; line-height: 1; --fontSize:36;\" data-fusion-font=\"true\" data-fontsize=\"36\" data-lineheight=\"36px\" class=\"fusion-responsive-typography-calculated\">We Secure Your  Business From Potetial Threats<\/h2>\n<\/div><div class=\"fusion-text fusion-text-3\" style=\"line-height:1.1;\"><p>We protect your businesses from cyberattacks by implementing and managing sophisticated cybersecurity solutions. Greystone IT Consulting offers a full-service Information &amp; Cybersecurity solution that identifies, analyses and detects a broad array of cyber threats proatively.<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h3 style=\"text-align: center; --fontSize:42; line-height: 1.3;\" data-fontsize=\"42\" data-lineheight=\"54.6px\" class=\"fusion-responsive-typography-calculated\"><strong style=\"font-size: 28px; color: #ef3125;\" data-fusion-font=\"true\">Our Sophisticated Cyber Security Solutions<\/strong><\/h3>\n<\/div><div class=\"fusion-text fusion-text-5\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first\" style=\"width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-right: 4%;margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><ul class=\"fusion-checklist fusion-checklist-1\" style=\"font-size:20px;line-height:34px;\"><li class=\"fusion-li-item\"><span style=\"background-color:rgba(225,7,7,0);font-size:17.6px;height:34px;width:34px;margin-right:14px;\" class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa fa-check\" style=\"color:#ef3125;\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\" style=\"margin-left:48px;\"><b>Enterprise Protection.<\/b> We recommend only the best Firewalls that protects your business against the latest advanced threats like ransomware, cryptomining, bots, worms, hacks, breaches, and APTs with unique and innovative technology designed to stop unknown threats.<\/div><\/li><li class=\"fusion-li-item\"><span style=\"background-color:rgba(225,7,7,0);font-size:17.6px;height:34px;width:34px;margin-right:14px;\" class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa fa-check\" style=\"color:#ef3125;\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\" style=\"margin-left:48px;\"><strong>SD-WAN and Branch<\/strong>.  Our Firewall solutions integrates the features you need to optimize your SD-WAN connectivity, quality, security, and continuity goals.<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last\" style=\"width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><ul class=\"fusion-checklist fusion-checklist-2\" style=\"font-size:20px;line-height:34px;\"><li class=\"fusion-li-item\"><span style=\"background-color:rgba(225,7,7,0);font-size:17.6px;height:34px;width:34px;margin-right:14px;\" class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa fa-check\" style=\"color:#ef3125;\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\" style=\"margin-left:48px;\"><b>Endpoint<\/b><b> Protection.<\/b> Our award-winning endpoint protection solution elimanates an enormous blind spot, providing extreme visibility and insight into all your network traffic, whether it\u2019s encrypted, evasive, or elusive.<\/div><\/li><li class=\"fusion-li-item\"><span style=\"background-color:rgba(225,7,7,0);font-size:17.6px;height:34px;width:34px;margin-right:14px;\" class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa fa-check\" style=\"color:#ef3125;\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\" style=\"margin-left:48px;\"><strong>Endpoint Integration<\/strong>. We only work with the world\u2019s best cyber security system that integrates with Endpoints in real time. This helps us to provide an automatic response with dynamic firewall rules and lateral movement protection isolating a compromised host to prevent data loss.<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator\" style=\"margin-left: auto;margin-right: auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:25%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-6\"><h4 style=\"font-size: 28px; line-height: 1.4; color: rgb(239, 49, 37); --fontSize:28; --minFontSize:28;\" data-fusion-font=\"true\" data-fontsize=\"28\" data-lineheight=\"39.2px\" class=\"fusion-responsive-typography-calculated\">Persistent Defenses That Protects Your Business<\/h4>\n<\/div><div class=\"fusion-text fusion-text-7\" style=\"line-height:1.1;\"><p>Our sophisticated cyber-security solutions protect businesses from cyber attacks. We only recommend the best<span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\"> next-gen security solutions wich are  engineered to deliver some of the most sophisticated defenses in the world, without compromise!<\/span><\/p>\n<p>We found that most businesses do not have an effecient incident response plan in place, and we believe that every company should be afforded the best possible protection against cyber threats intended to disrupt the productivity of your business.<\/p>\n<p>Give us a call today at 087 148 3110 or <a href=\"https:\/\/www.greystoneitc.co.za\/wordpress\/get-started\/\">send us a message<\/a> to start discussing cyber security solutions to protect your business.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator\" style=\"margin-left: auto;margin-right: auto;margin-top:20px;margin-bottom:40px;width:100%;max-width:10%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#ef3125;border-top-width:5px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-8\"><h2 style=\"color: #ef3125; text-align: center; font-size: 42px;\">Our Partners<span style=\"color: #000000;\">.<\/span><\/h2>\n<\/div><div class=\"fusion-image-carousel fusion-image-carousel-fixed\"><div class=\"fusion-carousel\" data-autoplay=\"no\" data-columns=\"5\" data-itemmargin=\"13\" data-itemwidth=\"180\" data-touchscroll=\"no\" data-imagesize=\"fixed\"><div class=\"fusion-carousel-positioner\"><ul class=\"fusion-carousel-holder\"><li class=\"fusion-carousel-item\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/huawei_transp_300.png\" class=\"attachment-blog-medium size-blog-medium lazyload\" alt=\"\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27300%27%20height%3D%2775%27%20viewBox%3D%270%200%20300%2075%27%3E%3Crect%20width%3D%27300%27%20height%3D%27375%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/huawei_transp_300.png\" data-srcset=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/huawei_transp_300-200x50.png 200w, https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/huawei_transp_300.png 300w\" data-sizes=\"auto\" \/><\/div><\/div><\/li><li class=\"fusion-carousel-item\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"87\" src=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/versa_transp_300.png\" class=\"attachment-blog-medium size-blog-medium lazyload\" alt=\"\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27300%27%20height%3D%2787%27%20viewBox%3D%270%200%20300%2087%27%3E%3Crect%20width%3D%27300%27%20height%3D%27387%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/versa_transp_300.png\" data-srcset=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/versa_transp_300-200x58.png 200w, https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/versa_transp_300.png 300w\" data-sizes=\"auto\" \/><\/div><\/div><\/li><li class=\"fusion-carousel-item\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/sophos_logo.png\" class=\"attachment-blog-medium size-blog-medium lazyload\" alt=\"\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27300%27%20height%3D%27150%27%20viewBox%3D%270%200%20300%20150%27%3E%3Crect%20width%3D%27300%27%20height%3D%273150%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/sophos_logo.png\" data-srcset=\"https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/sophos_logo-200x100.png 200w, https:\/\/www.greystoneitc.co.za\/wordpress\/wp-content\/uploads\/2020\/06\/sophos_logo.png 300w\" data-sizes=\"auto\" \/><\/div><\/div><\/li><\/ul><div class=\"fusion-carousel-nav\"><span class=\"fusion-nav-prev\"><\/span><span class=\"fusion-nav-next\"><\/span><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1159","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.greystoneitc.co.za\/index.php?rest_route=\/wp\/v2\/pages\/1159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.greystoneitc.co.za\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.greystoneitc.co.za\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.greystoneitc.co.za\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.greystoneitc.co.za\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1159"}],"version-history":[{"count":11,"href":"https:\/\/www.greystoneitc.co.za\/index.php?rest_route=\/wp\/v2\/pages\/1159\/revisions"}],"predecessor-version":[{"id":1554,"href":"https:\/\/www.greystoneitc.co.za\/index.php?rest_route=\/wp\/v2\/pages\/1159\/revisions\/1554"}],"wp:attachment":[{"href":"https:\/\/www.greystoneitc.co.za\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}