{"id":5333,"date":"2024-07-01T10:07:23","date_gmt":"2024-07-01T08:07:23","guid":{"rendered":"https:\/\/www.opensight.nl\/services\/technology\/"},"modified":"2024-08-05T14:23:11","modified_gmt":"2024-08-05T12:23:11","slug":"technology","status":"publish","type":"page","link":"https:\/\/www.opensight.nl\/en\/services\/technology\/","title":{"rendered":"Technology"},"content":{"rendered":"\n<div class=\"wp-block-group p-block h-screen p-header mb-0 h-overflow1 has-white-transparant-color has-dark-blue-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row gy-5 align-items-center\">\n\t\n\n<div class=\"col-12 col-md-8 col-lg-5 indivaos_zoom-in-up\">\n\t\t\t\n\n<h2 class=\"wp-block-heading\">Technology<\/h2>\n\n\n\n<p>Rely on our innovative technologies tailored to your specific needs. From advanced threat detection to automated response mechanisms, our technology stack provides the tools needed to stay one step ahead in the ever-evolving landscape of cybercrime.<\/p>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-primary indiv-block bsbutton btn-custom\" href=\"\/en\/services\/overview\/\" target=\"_self\"> View all services<\/a>\n  <\/div>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6 offset-lg-1\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n<div class=\"wp-block-image img-overflow2\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"887\" height=\"1024\" src=\"https:\/\/www.opensight.nl\/content\/technology-icon-groen-887x1024.png\" alt=\"\" class=\"wp-image-3917\" style=\"width:300px\" srcset=\"https:\/\/www.opensight.nl\/content\/technology-icon-groen-887x1024.png 887w, https:\/\/www.opensight.nl\/content\/technology-icon-groen-260x300.png 260w, https:\/\/www.opensight.nl\/content\/technology-icon-groen-768x887.png 768w, https:\/\/www.opensight.nl\/content\/technology-icon-groen-1330x1536.png 1330w, https:\/\/www.opensight.nl\/content\/technology-icon-groen-1773x2048.png 1773w, https:\/\/www.opensight.nl\/content\/technology-icon-groen.png 1974w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/figure>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group p-block-mob has-dark-blue-color has-white-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n<div class=\"wp-bootstrap-blocks-row row gx-md-5 justify-content-center\">\n\t\n\n<div class=\"col-5 col-md-3\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"887\" height=\"1024\" src=\"https:\/\/www.opensight.nl\/content\/technology-icon-tekst-blauw-887x1024.png\" alt=\"\" class=\"wp-image-3919\" srcset=\"https:\/\/www.opensight.nl\/content\/technology-icon-tekst-blauw-887x1024.png 887w, https:\/\/www.opensight.nl\/content\/technology-icon-tekst-blauw-260x300.png 260w, https:\/\/www.opensight.nl\/content\/technology-icon-tekst-blauw-768x887.png 768w, https:\/\/www.opensight.nl\/content\/technology-icon-tekst-blauw-1331x1536.png 1331w, https:\/\/www.opensight.nl\/content\/technology-icon-tekst-blauw-1774x2048.png 1774w, https:\/\/www.opensight.nl\/content\/technology-icon-tekst-blauw.png 1975w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-9 col-lg-8 offset-lg-1 text-center text-md-start indivaos_fade-right\">\n\t\t\t\n\n<h2 class=\"wp-block-heading text-center text-md-start\">Protect your digital assets with innovative cyber security technology<\/h2>\n\n\n\n<p class=\"has-text-align-left\">It is crucial to protect your digital assets effectively. That is why we offer a range of innovative technologies tailored to your specific needs.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Our technological stack includes advanced threat detection and automated response mechanisms, enabling your organization to respond proactively and effectively to potential threats. From real-time monitoring to machine learning-powered analysis, these tools enable you to stay one step ahead in the ever-evolving landscape of cybercrime.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Advanced threat detection ensures that suspicious activity is quickly identified, minimizing potential damage. Our automated response mechanisms enable your organization to act quickly and effectively, even in the most dynamic and complex situations.<\/p>\n\n\n\n<p class=\"has-text-align-left\">By relying on innovative cyber security technologies, you can not only strengthen the security of your digital assets, but also increase your resilience against the constant evolution of cyber threats. &#8216;Protect your digital assets with innovative cyber security technology&#8217; is not just a statement, but a promise to provide you with the tools needed to secure your digital environment at a high level.<\/p>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group p-block has-white-transparant-color has-dark-blue-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n\n<h4 class=\"wp-block-heading has-text-align-center h4 also-interesting pb-4\">Services in this category<\/h4>\n\n\n  <div class=\"indiv-block diensten-slider mx-4 mx-md-0\">\n    <div class=\"swiper\" id=\"diensten-slider\">\n      <div class=\"swiper-wrapper\">\n                    <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/microsoft-365-compliance-recovery\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.opensight.nl\/content\/m365-compliance-recovery-header-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"m365 compliance &amp; recovery header\" srcset=\"https:\/\/www.opensight.nl\/content\/m365-compliance-recovery-header-1024x683.webp 1024w, https:\/\/www.opensight.nl\/content\/m365-compliance-recovery-header-300x200.webp 300w, https:\/\/www.opensight.nl\/content\/m365-compliance-recovery-header-768x512.webp 768w, https:\/\/www.opensight.nl\/content\/m365-compliance-recovery-header.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Microsoft 365 Compliance &amp; Recovery<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Microsoft 365 has taken off over the past few years, and with the introduction of Co-Pilot, this is certainly not expected to slow down. While the responsibility for the infrastructure lies with Microsoft, the&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/zero-trust-for-cyber-asset-attack-surface-management\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.opensight.nl\/content\/caasm-1.webp\" class=\"img-fluid wp-post-image\" alt=\"caasm\" srcset=\"https:\/\/www.opensight.nl\/content\/caasm-1.webp 1000w, https:\/\/www.opensight.nl\/content\/caasm-1-300x200.webp 300w, https:\/\/www.opensight.nl\/content\/caasm-1-768x512.webp 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust for Cyber Asset Attack Surface Management<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      CAASM (Cyber Asset Attack Surface Management) enables IT managers to gain insight into coverage and hygiene levels across their entire IT environment.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/zero-trust\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.opensight.nl\/content\/man-achter-bureau-op-kantoor-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"man achter bureau op kantoor\" srcset=\"https:\/\/www.opensight.nl\/content\/man-achter-bureau-op-kantoor-1024x683.webp 1024w, https:\/\/www.opensight.nl\/content\/man-achter-bureau-op-kantoor-300x200.webp 300w, https:\/\/www.opensight.nl\/content\/man-achter-bureau-op-kantoor-768x512.webp 768w, https:\/\/www.opensight.nl\/content\/man-achter-bureau-op-kantoor.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      A major development in the world of cyber security is Zero Trust. However, Zero Trust is not a solution, it is a security model based on the principle of &#8221;never trust, always verify&#8221;. This&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/cyber-resilience-platform\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"https:\/\/www.opensight.nl\/content\/cyber-resiliency-1024x561.webp\" class=\"img-fluid wp-post-image\" alt=\"cyber resiliency\" srcset=\"https:\/\/www.opensight.nl\/content\/cyber-resiliency-1024x561.webp 1024w, https:\/\/www.opensight.nl\/content\/cyber-resiliency-300x165.webp 300w, https:\/\/www.opensight.nl\/content\/cyber-resiliency-768x421.webp 768w, https:\/\/www.opensight.nl\/content\/cyber-resiliency.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Cyber Resilience Platform<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      In recent years, there has been a shift in the backup market. Where backup used to be something to mainly fix human errors or solve hardware issues, it has now become a very important&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/endpoint-and-cloud-protection\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.opensight.nl\/content\/man-achter-computer-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"man achter computer\" srcset=\"https:\/\/www.opensight.nl\/content\/man-achter-computer-1024x683.webp 1024w, https:\/\/www.opensight.nl\/content\/man-achter-computer-300x200.webp 300w, https:\/\/www.opensight.nl\/content\/man-achter-computer-768x512.webp 768w, https:\/\/www.opensight.nl\/content\/man-achter-computer.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Endpoint and Cloud Protection<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      In recent years, the time it takes an for attacker to move further inside the network, from initial infiltration, has decreased dramatically. For example, the average time for a cyber attack was 98 minutes&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/zero-trust-for-users\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"550\" src=\"https:\/\/www.opensight.nl\/content\/zero-trust-voor-gebruikers-1-e1753803035280.webp\" class=\"img-fluid wp-post-image\" alt=\"man met zero trust op zijn telefoon\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust for Users<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      OpenSight offers a comprehensive solution to protect your organization from cyber threats, while enabling seamless and secure access to applications and data.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/zero-trust-for-ot-and-iot\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"553\" src=\"https:\/\/www.opensight.nl\/content\/zero-trust-voor-ot-en-iot.webp\" class=\"img-fluid wp-post-image\" alt=\"zero trust voor ot en iot\" srcset=\"https:\/\/www.opensight.nl\/content\/zero-trust-voor-ot-en-iot.webp 1000w, https:\/\/www.opensight.nl\/content\/zero-trust-voor-ot-en-iot-300x166.webp 300w, https:\/\/www.opensight.nl\/content\/zero-trust-voor-ot-en-iot-768x425.webp 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust for OT and IoT<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Our IoT and OT security solutions can help your organization discover, classify, connect and segment devices to protect your operations.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/zero-trust-for-workloads\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"668\" src=\"https:\/\/www.opensight.nl\/content\/zero-trust-voor-workloads-2-e1753885724111.webp\" class=\"img-fluid wp-post-image\" alt=\"zero trust voor workloads\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust for Workloads<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      OpenSight offers a Zero Trust solution designed to protect your organization&#8217;s workloads from cyber threats.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/protection-recovery-for-your-identity\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.opensight.nl\/content\/identity-protection-and-recovery-1-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"identity protection and recovery 1\" srcset=\"https:\/\/www.opensight.nl\/content\/identity-protection-and-recovery-1-1024x683.webp 1024w, https:\/\/www.opensight.nl\/content\/identity-protection-and-recovery-1-300x200.webp 300w, https:\/\/www.opensight.nl\/content\/identity-protection-and-recovery-1-768x512.webp 768w, https:\/\/www.opensight.nl\/content\/identity-protection-and-recovery-1-1536x1025.webp 1536w, https:\/\/www.opensight.nl\/content\/identity-protection-and-recovery-1-2048x1366.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Protection &amp; Recovery For Your Identity<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Today&#8217;s attacks are no longer just about malware. More and more, your actual identity is being used to carry out an attack. To quickly detect, remediate and recover from these attacks, OpenSight has developed&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/www.opensight.nl\/en\/services\/overview\/cyber-deception\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.opensight.nl\/content\/cyber-deception-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"cyber deception\" srcset=\"https:\/\/www.opensight.nl\/content\/cyber-deception-1024x683.webp 1024w, https:\/\/www.opensight.nl\/content\/cyber-deception-300x200.webp 300w, https:\/\/www.opensight.nl\/content\/cyber-deception-768x512.webp 768w, https:\/\/www.opensight.nl\/content\/cyber-deception-1536x1024.webp 1536w, https:\/\/www.opensight.nl\/content\/cyber-deception.webp 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Cyber Deception<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/www.opensight.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Cyber Deception; with today&#8217;s lightweight agents for Endpoint protection, it almost seems redundant. Yet we still get a lot of people asking about it. And when we get questions, it is time to create&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                <\/div>\n      <div class=\"swiper-pagination\"><\/div>\n    <\/div>\n\n    <div class=\"diensten-slider-pagination\">\n      <div class=\"slider-button button-prev\">\n        <i class=\"fas fa-chevron-left\"><\/i>\n      <\/div>\n      <div class=\"page-info\">\n        <span class=\"current\">1<\/span>\/<span class=\"total\">1<\/span>\n      <\/div>\n      <div class=\"slider-button button-next\">\n        <i class=\"fas fa-chevron-right\"><\/i>\n      <\/div>\n    <\/div>\n  <\/div>\n\n<\/div>\n<\/div><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-2 p-block why-opensight\">\n\t\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-7\">\n\t\t\t\n\n<h2 class=\"wp-block-heading has-text-align-center text-transform-none has-dark-blue-color has-text-color has-link-color wp-elements-4e4f77994340665f1550eefba7ce4288\">Why OpenSight?<\/h2>\n\n\n\n<p class=\"has-text-align-center has-dark-blue-color has-text-color has-link-color wp-elements-5e40db43545baf4982abb080e9bd484e\">Our focus is on delivering appropriate cybersecurity solutions based on the organization&#8217;s risk profile. In our view, cyber security is not in technology alone, but is a combination of people, processes and technology where technology should be supported in achieving the organization&#8217;s objectives. Because we enter into long-term partnerships with clients, we are not interested in short-term revenue, but in taking the journey together to a risk profile that helps the client grow in a sustainable way.<\/p>\n\n\n\n<div class=\"wp-block-group button-group-dienst\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton btn-minwidth\" href=\"https:\/\/www.opensight.nl\/en\/contact\/\" target=\"_self\"> Make an appointment<\/a>\n  <\/div>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton btn-minwidth\" href=\"https:\/\/www.opensight.nl\/certificeringen\/\" target=\"_self\"> Request a demo<\/a>\n  <\/div>\n<\/div><\/div>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n\n\n\n<div class=\"wp-block-group p-block has-white-transparant-color has-dark-blue-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-6 col-lg-4 indivaos_zoom-in-down\">\n\t\t\t\n\n<h2 class=\"wp-block-heading has-text-align-center\">We are at your service!<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Do you have any questions or can we help you with anything? Please contact us.<\/p>\n\n\n  <div class=\"bs-button text-center\">\n        <a class=\"btn btn-primary indiv-block bsbutton mt-4 btn-custom\" href=\"https:\/\/www.opensight.nl\/en\/contact\/\" target=\"_self\"> Contact<\/a>\n  <\/div>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":492,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"Technology | OpenSight","_seopress_titles_desc":"From advanced threat detection to automated response mechanisms, OpenSight provides the tools to stay one step ahead in the ever-evolving landscape of cybercrime.","_seopress_robots_index":"","footnotes":""},"class_list":["post-5333","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/pages\/5333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/comments?post=5333"}],"version-history":[{"count":4,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/pages\/5333\/revisions"}],"predecessor-version":[{"id":5552,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/pages\/5333\/revisions\/5552"}],"up":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/pages\/492"}],"wp:attachment":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media?parent=5333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}