{"id":20659,"date":"2023-06-30T07:43:01","date_gmt":"2023-06-30T07:43:01","guid":{"rendered":"http:\/\/www.sifytechnologies.com\/us\/?page_id=20659"},"modified":"2023-09-06T08:15:36","modified_gmt":"2023-09-06T08:15:36","slug":"managed-security-services","status":"publish","type":"page","link":"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/","title":{"rendered":"Managed Security Services"},"content":{"rendered":"[vc_section el_class=&#8221;hpc-page&#8221;][vc_row][vc_column]\t\t\t<script type=\"text\/javascript\" src=\"\/\/www.sifytechnologies.com\/us\/wp-content\/plugins\/revslider\/public\/assets\/js\/rbtools.min.js?rev=6.4.11\"><\/script>\t\t\t<script type=\"text\/javascript\" src=\"\/\/www.sifytechnologies.com\/us\/wp-content\/plugins\/revslider\/public\/assets\/js\/rs6.min.js?rev=6.4.11\"><\/script>\t\t\t<!-- START Managed Security Services L3 REVOLUTION SLIDER 6.4.11 --><p class=\"rs-p-wp-fix\"><\/p>\t\t\t<rs-module-wrap id=\"rev_slider_160_1_wrapper\" data-source=\"gallery\" style=\"background:transparent;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\t\t\t\t<rs-module id=\"rev_slider_160_1\" style=\"\" data-version=\"6.4.11\">\t\t\t\t\t<rs-slides>\t\t\t\t\t\t<rs-slide data-key=\"rs-174\" data-title=\"Slide\" data-in=\"o:0;\" data-out=\"a:false;\">\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Managed-security-services-banner.jpg\" title=\"Managed security services banner\" width=\"1920\" height=\"524\" class=\"rev-slidebg tp-rs-img\" data-no-retina><!--\t\t\t\t\t\t\t--><rs-layer\t\t\t\t\t\t\t\tid=\"slider-160-slide-174-layer-0\" \t\t\t\t\t\t\t\tdata-type=\"text\"\t\t\t\t\t\t\t\tdata-color=\"#fff\"\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,l,c;xo:40px,40px,40px,1px;yo:257px,257px,257px,183px;\"\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:30,30,30,21;l:33,33,33,27;\"\t\t\t\t\t\t\t\tdata-dim=\"w:686px,686px,686px,433px;minh:0px,0px,0px,none;\"\t\t\t\t\t\t\t\tdata-basealign=\"slide\"\t\t\t\t\t\t\t\tdata-padding=\"l:16;\"\t\t\t\t\t\t\t\tdata-border=\"bos:solid;boc:#bdd70c;bow:0,0,0,7px;\"\t\t\t\t\t\t\t\tdata-frame_0=\"x:0,0,0,0px;y:0,0,0,0px;\"\t\t\t\t\t\t\t\tdata-frame_1=\"x:0,0,0,0px;y:0,0,0,0px;\"\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\t\t\t\t\t\t\t\tstyle=\"z-index:10;font-family:Source Sans Pro;\"\t\t\t\t\t\t\t>Advanced threat hunting solutions, uninterrupted monitoring, and rapid threat response <br \/> \t\t\t\t\t\t\t<\/rs-layer><!--\t\t\t\t\t\t\t--><h1\t\t\t\t\t\t\t\tid=\"slider-160-slide-174-layer-1\" \t\t\t\t\t\t\t\tclass=\"rs-layer\"\t\t\t\t\t\t\t\tdata-type=\"text\"\t\t\t\t\t\t\t\tdata-color=\"#bdd70c\"\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,l,c;xo:40px,40px,40px,-10px;yo:104px,104px,104px,83px;\"\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:46,46,46,27;l:55,55,55,35;fw:600;\"\t\t\t\t\t\t\t\tdata-dim=\"w:713px,713px,713px,412px;\"\t\t\t\t\t\t\t\tdata-basealign=\"slide\"\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\t\t\t\t\t\t\t\tstyle=\"z-index:9;font-family:Source Sans Pro;\"\t\t\t\t\t\t\t>Protecting your digital assets through Managed Security Services<br \/> \t\t\t\t\t\t\t<\/h1><!--\t\t\t\t\t\t\t--><rs-layer\t\t\t\t\t\t\t\tid=\"slider-160-slide-174-layer-2\" \t\t\t\t\t\t\t\tdata-type=\"image\"\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\t\t\t\t\t\t\t\tdata-xy=\"xo:50px,50px,50px,-1px;yo:150px,150px,150px,-29px;\"\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:20,20,20,7;l:0,0,0,9;\"\t\t\t\t\t\t\t\tdata-dim=\"w:300px,300px,300px,482px;h:180px,180px,180px,723px;\"\t\t\t\t\t\t\t\tdata-vbility=\"f,f,f,t\"\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\t\t\t\t\t\t\t\tstyle=\"z-index:8;\"\t\t\t\t\t\t\t><img loading=\"lazy\" decoding=\"async\" src=\"\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Managed-Security-Services-Mobile-Banner.jpg\" class=\"tp-rs-img\" width=\"400\" height=\"600\" data-no-retina> \t\t\t\t\t\t\t<\/rs-layer><!---->\t\t\t\t\t\t<\/rs-slide>\t\t\t\t\t<\/rs-slides>\t\t\t\t<\/rs-module>\t\t\t<\/rs-module-wrap>\t\t\t<!-- END REVOLUTION SLIDER -->[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_class=&#8221;hpc-page&#8221; css=&#8221;.vc_custom_1688556421412{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h2 class=\"fontweight600\">Secure your business with advanced cyber security solutions 24&#215;7<\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]Businesses of all sizes face challenges in protecting their sensitive data, intellectual properties, and systems from modern-day, sophisticated cyberattacks. For the borderless enterprise with assets accessible on-demand, on any device, and across multiple IT ecosystems, cybersecurity needs to be of paramount importance. Without access to specialized skills, tools and procedures, this can turn into a daunting task that is both effort and cost intensive.<\/p>\n<p>Sify\u2019s Managed Security Services (MSS) protects enterprises and their on-premises, hosted, public, and hybrid cloud environments. Expert support and cutting-edge tools and technologies ensure the security of critical business assets with round-the-clock monitoring, threat detection, and rapid response.<\/p>\n<p>Our advanced security solutions like firewalls, intrusion detection and prevention systems, Security Information and Event Management (SIEM), vulnerability management and Secure Access Service Edge (SASE) which are part of our extensive array of security offerings, supports enterprises in not only meeting industry regulations but also fortifying their security posture. This dual advantage empowers them to simultaneously streamline their emphasis on core business activities.[\/vc_column_text][vc_empty_space height=&#8221;22px&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;&#8221;][vc_single_image image=&#8221;20802&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1688557091043{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #f3f3f3 !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text]\n<h3 class=\"fontweight600\">Our service offerings<\/h3>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1688557624775{margin-top: 30px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text]\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"cws-service-62e39a7a98046 cws-service-module service-type-default disable-shadow icon-shape-hexagon\">\n<p><span class=\"service-image-wrapper\"><img decoding=\"async\" src=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Managed-Network-1.svg\" alt=\"\" data-no-retina=\"\" \/><\/span><\/p>\n<div class=\"service-info-wrapper\">\n<div class=\"service-info-inner\">\n<h6 class=\"service-title\">Managed Cloud Security Services<\/h6>\n<div class=\"service-description\">Protect your assets, including data on any cloud, through Secure Access Service Edge (SASE) a cybersecurity framework encompassing Secure Web gateways (SWG), Data Loss Prevention (DLP), Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Cloud Workload Protection (CWP) and Cloud Security Posture Management (CSPM) which aims to provide secure and efficient access to applications and resources for remote users and branch offices.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"cws-service-62e39a7a98046 cws-service-module service-type-default disable-shadow icon-shape-hexagon\">\n<p><span class=\"service-image-wrapper\"><img decoding=\"async\" src=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Managed-Network-Security-Services.svg\" alt=\"\" data-no-retina=\"\" \/><\/span><\/p>\n<div class=\"service-info-wrapper\">\n<div class=\"service-info-inner\">\n<h6 class=\"service-title\">Managed Network Security Services<\/h6>\n<div class=\"service-description\">Maximize performance and increase productivity while enhancing your network security. Our unified network security management involves web content filtering, intrusion detection and prevention system management, firewall with deep packet inspection, multi-factor authentication and gateway antivirus software. Our modern Security Operation Center (SOC) enables 24\/7 monitoring to ensure you are always protected.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"cws-service-62e39a7a98046 cws-service-module service-type-default disable-shadow icon-shape-hexagon\">\n<p><span class=\"service-image-wrapper\"><img decoding=\"async\" src=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Host-Security.svg\" alt=\"sify cloudinfinit\" data-no-retina=\"\" \/><\/span><\/p>\n<div class=\"service-info-wrapper\">\n<div class=\"service-info-inner\">\n<h6 class=\"service-title\">Host Security<\/h6>\n<div class=\"service-description\">Enable next-gen endpoint security managed services for your workloads across multiple touchpoints. Get access to proactive managed threat hunting, AI\/ML-based detection of zero-day threats in real time, automatic response, integrated firewall, secure work-from-anywhere solutions, and centralized endpoint management platform to improve visibility and simplify operations.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1688557595349{margin-top: 30px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text]\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"cws-service-62e39a7a98046 cws-service-module service-type-default disable-shadow icon-shape-hexagon\">\n<p><span class=\"service-image-wrapper\"><img decoding=\"async\" src=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Data-Security.svg\" alt=\"sify cloudinfinit\" data-no-retina=\"\" \/><\/span><\/p>\n<div class=\"service-info-wrapper\">\n<div class=\"service-info-inner\">\n<h6 class=\"service-title\">Data Security<\/h6>\n<div class=\"service-description\">Expert-level data protection advisory and implementation services to safeguard organizational data with minimal impact on the business. We follow a proven, structured security approach at every stage, involving data gathering, planning, design, deployment, migration, testing, handover, analysis, and improvement.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"cws-service-62e39a7a98046 cws-service-module service-type-default disable-shadow icon-shape-hexagon\">\n<p><span class=\"service-image-wrapper\"><img decoding=\"async\" src=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Vulnerability-Assessment.svg\" alt=\"\" data-no-retina=\"\" \/><\/span><\/p>\n<div class=\"service-info-wrapper\">\n<div class=\"service-info-inner\">\n<h6 class=\"service-title\">Vulnerability Assessment &amp; Penetration Testing (VAPT)<\/h6>\n<div class=\"service-description\">Industry-leading VAPT assessment to meet the compliance needs of businesses, identify security vulnerabilities in applications, network, endpoint, and the cloud. We enable businesses to address the vulnerabilities with actionable and prioritized recommendations to improve their information security posture.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"cws-service-62e39a7a98046 cws-service-module service-type-default disable-shadow icon-shape-hexagon\">\n<p><span class=\"service-image-wrapper\"><img decoding=\"async\" src=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Managed-Detection-Response-MDR.svg\" alt=\"\" data-no-retina=\"\" \/><\/span><\/p>\n<div class=\"service-info-wrapper\">\n<div class=\"service-info-inner\">\n<h6 class=\"service-title\">Managed Detection &amp; Response (MDR)<\/h6>\n<div class=\"service-description\">Offering a unified view for security monitoring across multi-cloud and hybrid infrastructures, harnessing the power of an advanced SIEM platform with AI and ML-driven Security Analytics. This platform encompasses Threat Intelligence, User Entity Behavior Analytics (UEBA), Network Detection and Response (NDR), Threat Hunting, as well as Security Orchestration, Automation, and Response (SOAR), offering a comprehensive approach to security management.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1688106602391{margin-top: 50px !important;padding-top: 10px !important;padding-bottom: 60px !important;}&#8221;][vc_row][vc_column][vc_single_image image=&#8221;20481&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_class=&#8221;hpc-bg-img2&#8243; css=&#8221;.vc_custom_1664265838839{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text]\n<h3 class=\"fontweight600 color-fff\">Why customers choose <span class=\"font-yellow\">Sify<\/span><\/h3>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1688557653086{margin-top: 40px !important;padding-right: 20px !important;padding-left: 20px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951662078{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text]\n<h5 class=\"fontweight600 font-yellow\">Transformation and integration<\/h5>\n<div>\n<div class=\"color-fff\">Robust and resilient security structure delivered through comprehensive consulting assignments that are handled quickly and efficiently with minimal business impact.<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951715794{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text]\n<h5 class=\"fontweight600 font-yellow\">Technical leadership<\/h5>\n<div>\n<div class=\"color-fff\">Our security consultants are highly trained and experienced, with multi-vendor product expertise across multiple technology areas and industries.<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951729019{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text]\n<h5 class=\"fontweight600 font-yellow\">Processes and standards<\/h5>\n<div>\n<div class=\"color-fff\">Our Managed Security Services are based on ITSM industry standards and ITIL processes, delivering an optimum level of service management, including fast incident response, resolution and GRC support.<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1688558148310{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951744352{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text]\n<h5 class=\"fontweight600 font-yellow\">Single partner, OEM-agnostic<\/h5>\n<div>\n<div class=\"color-fff\">We have partnerships with all leading security OEMs and distributors, which enables us to provide fast support or replacements on device-level issues\u200b.<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951755470{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text]\n<h5 class=\"fontweight600 font-yellow\">Continuous improvement and innovation\u200b\u200b<\/h5>\n<div>\n<div class=\"color-fff\">Our Technology Innovation Center works continuously on improving security processes and solutions to keep pace with ever-evolving cyber threats.<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951768976{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text]\n<h5 class=\"fontweight600 font-yellow\">Integrated, industry-certified security<\/h5>\n<div>\n<div class=\"color-fff\">We offer SOC 2 Type 2 certified Managed Security Services, Multi or Hybrid Cloud Management, Data Center, and Network Services to 300+ MSS, MDR captive, shared, and hybrid GRC customers.<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1690203614995{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1688109026899{padding-bottom: 50px !important;}&#8221;]\n<h3 class=\"fontweight600\"><span class=\"font-yellow\">500+ <\/span> certified cloud professionals<\/h3>\n[\/vc_column_text][vc_column_text]\n<h3 class=\"fontweight600\"><span class=\"font-yellow\">150+ <\/span> dedicated, highly skilled resources<\/h3>\n[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]\n","protected":false},"excerpt":{"rendered":"<p>[vc_section el_class=&#8221;hpc-page&#8221;][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_class=&#8221;hpc-page&#8221; css=&#8221;.vc_custom_1688556421412{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text] Secure your business with advanced cyber security solutions 24&#215;7 [\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]Businesses of all sizes face challenges in protecting their sensitive data, intellectual properties, and systems from modern-day, sophisticated cyberattacks. For the borderless enterprise with assets accessible on-demand, on any device, and across multiple IT ecosystems, cybersecurity needs to be of paramount importance. Without access to specialized skills, tools and procedures, this can turn into a daunting task that is both effort and cost intensive. Sify\u2019s Managed Security Services (MSS) protects enterprises and their on-premises, hosted, public, and hybrid cloud environments. Expert support and cutting-edge tools and technologies ensure the security of critical business assets with round-the-clock monitoring, threat detection, and rapid response. Our advanced security solutions like firewalls, intrusion detection and prevention systems, Security Information and Event Management (SIEM), vulnerability management and Secure Access Service Edge (SASE) which are part of our extensive array of security offerings, supports enterprises in not only meeting industry regulations but also fortifying their security posture. This dual advantage empowers them to simultaneously streamline their emphasis on core business activities.[\/vc_column_text][vc_empty_space height=&#8221;22px&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;&#8221;][vc_single_image image=&#8221;20802&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1688557091043{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #f3f3f3 !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text] Our service offerings [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1688557624775{margin-top: 30px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text] Managed Cloud Security Services Protect your assets, including data on any cloud, through Secure Access Service Edge (SASE) a cybersecurity framework encompassing Secure Web gateways (SWG), Data Loss Prevention (DLP), Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Cloud Workload Protection (CWP) and Cloud Security Posture Management (CSPM) which aims to provide secure and efficient access to applications and resources for remote users and branch offices. [\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text] Managed Network Security Services Maximize performance and increase productivity while enhancing your network security. Our unified network security management involves web content filtering, intrusion detection and prevention system management, firewall with deep packet inspection, multi-factor authentication and gateway antivirus software. Our modern Security Operation Center (SOC) enables 24\/7 monitoring to ensure you are always protected. [\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text] Host Security Enable next-gen endpoint security managed services for your workloads across multiple touchpoints. Get access to proactive managed threat hunting, AI\/ML-based detection of zero-day threats in real time, automatic response, integrated firewall, secure work-from-anywhere solutions, and centralized endpoint management platform to improve visibility and simplify operations. [\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1688557595349{margin-top: 30px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text] Data Security Expert-level data protection advisory and implementation services to safeguard organizational data with minimal impact on the business. We follow a proven, structured security approach at every stage, involving data gathering, planning, design, deployment, migration, testing, handover, analysis, and improvement. [\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text] Vulnerability Assessment &amp; Penetration Testing (VAPT) Industry-leading VAPT assessment to meet the compliance needs of businesses, identify security vulnerabilities in applications, network, endpoint, and the cloud. We enable businesses to address the vulnerabilities with actionable and prioritized recommendations to improve their information security posture. [\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text] Managed Detection &amp; Response (MDR) Offering a unified view for security monitoring across multi-cloud and hybrid infrastructures, harnessing the power of an advanced SIEM platform with AI and ML-driven Security Analytics. This platform encompasses Threat Intelligence, User Entity Behavior Analytics (UEBA), Network Detection and Response (NDR), Threat Hunting, as well as Security Orchestration, Automation, and Response (SOAR), offering a comprehensive approach to security management. [\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1688106602391{margin-top: 50px !important;padding-top: 10px !important;padding-bottom: 60px !important;}&#8221;][vc_row][vc_column][vc_single_image image=&#8221;20481&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_class=&#8221;hpc-bg-img2&#8243; css=&#8221;.vc_custom_1664265838839{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text] Why customers choose Sify [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1688557653086{margin-top: 40px !important;padding-right: 20px !important;padding-left: 20px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951662078{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text] Transformation and integration Robust and resilient security structure delivered through comprehensive consulting assignments that are handled quickly and efficiently with minimal business impact. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951715794{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text] Technical leadership Our security consultants are highly trained and experienced, with multi-vendor product expertise across multiple technology areas and industries. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951729019{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text] Processes and standards Our Managed Security Services are based on ITSM industry standards and ITIL processes, delivering an optimum level of service management, including fast incident response, resolution and GRC support. [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1688558148310{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951744352{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text] Single partner, OEM-agnostic We have partnerships with all leading security OEMs and distributors, which enables us to provide fast support or replacements on device-level issues\u200b. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951755470{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text] Continuous improvement and innovation\u200b\u200b Our Technology Innovation Center works continuously on improving security processes and solutions to keep pace with ever-evolving cyber threats. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1687951768976{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;border-left-color: #bdd70c !important;border-left-style: solid !important;border-right-color: #bdd70c !important;border-right-style: solid !important;border-top-color: #bdd70c !important;border-top-style: solid !important;border-bottom-color: #bdd70c !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221; el_class=&#8221;wy-service-box&#8221;][vc_column_text] Integrated, industry-certified security We offer SOC 2 Type 2 certified Managed Security Services, Multi or Hybrid Cloud Management, Data Center, and Network Services to 300+ MSS, MDR captive, shared, and hybrid GRC customers. [\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1690203614995{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1688109026899{padding-bottom: 50px !important;}&#8221;] 500+ certified cloud professionals [\/vc_column_text][vc_column_text] 150+ dedicated, highly skilled resources [\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"author":1,"featured_media":20844,"parent":20442,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-20659","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enterprise Security Managed Services | Sify Technologies<\/title>\n<meta name=\"description\" content=\"Get enhanced Managed Security Services from Sify to safeguard your business from cyber threats, manage security risks and protect your IP and assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enterprise Security Managed Services | Sify Technologies\" \/>\n<meta property=\"og:description\" content=\"Get enhanced Managed Security Services from Sify to safeguard your business from cyber threats, manage security risks and protect your IP and assets.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Sify Technologies\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-06T08:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Managed-security-services-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"524\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/\",\"url\":\"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/\",\"name\":\"Enterprise Security Managed Services | Sify Technologies\",\"isPartOf\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#website\"},\"datePublished\":\"2023-06-30T07:43:01+00:00\",\"dateModified\":\"2023-09-06T08:15:36+00:00\",\"description\":\"Get enhanced Managed Security Services from Sify to safeguard your business from cyber threats, manage security risks and protect your IP and assets.\",\"breadcrumb\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/www.sifytechnologies.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managed Services\",\"item\":\"http:\/\/www.sifytechnologies.com\/us\/managed-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed Security Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#website\",\"url\":\"http:\/\/www.sifytechnologies.com\/us\/\",\"name\":\"Sify Technologies\",\"description\":\"Keeping you ahead\",\"publisher\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.sifytechnologies.com\/us\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#organization\",\"name\":\"Sify Technologies\",\"url\":\"http:\/\/www.sifytechnologies.com\/us\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/04\/Sifylogo.png\",\"contentUrl\":\"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/04\/Sifylogo.png\",\"width\":156,\"height\":89,\"caption\":\"Sify Technologies\"},\"image\":{\"@id\":\"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enterprise Security Managed Services | Sify Technologies","description":"Get enhanced Managed Security Services from Sify to safeguard your business from cyber threats, manage security risks and protect your IP and assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/","og_locale":"en_US","og_type":"article","og_title":"Enterprise Security Managed Services | Sify Technologies","og_description":"Get enhanced Managed Security Services from Sify to safeguard your business from cyber threats, manage security risks and protect your IP and assets.","og_url":"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/","og_site_name":"Sify Technologies","article_modified_time":"2023-09-06T08:15:36+00:00","og_image":[{"width":1920,"height":524,"url":"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/07\/Managed-security-services-banner.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/","url":"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/","name":"Enterprise Security Managed Services | Sify Technologies","isPartOf":{"@id":"http:\/\/www.sifytechnologies.com\/us\/#website"},"datePublished":"2023-06-30T07:43:01+00:00","dateModified":"2023-09-06T08:15:36+00:00","description":"Get enhanced Managed Security Services from Sify to safeguard your business from cyber threats, manage security risks and protect your IP and assets.","breadcrumb":{"@id":"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.sifytechnologies.com\/us\/managed-services\/managed-security-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.sifytechnologies.com\/us\/"},{"@type":"ListItem","position":2,"name":"Managed Services","item":"http:\/\/www.sifytechnologies.com\/us\/managed-services\/"},{"@type":"ListItem","position":3,"name":"Managed Security Services"}]},{"@type":"WebSite","@id":"http:\/\/www.sifytechnologies.com\/us\/#website","url":"http:\/\/www.sifytechnologies.com\/us\/","name":"Sify Technologies","description":"Keeping you ahead","publisher":{"@id":"http:\/\/www.sifytechnologies.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.sifytechnologies.com\/us\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/www.sifytechnologies.com\/us\/#organization","name":"Sify Technologies","url":"http:\/\/www.sifytechnologies.com\/us\/","sameAs":[],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/logo\/image\/","url":"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/04\/Sifylogo.png","contentUrl":"http:\/\/www.sifytechnologies.com\/us\/wp-content\/uploads\/2023\/04\/Sifylogo.png","width":156,"height":89,"caption":"Sify Technologies"},"image":{"@id":"http:\/\/www.sifytechnologies.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/pages\/20659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/comments?post=20659"}],"version-history":[{"count":27,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/pages\/20659\/revisions"}],"predecessor-version":[{"id":21323,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/pages\/20659\/revisions\/21323"}],"up":[{"embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/pages\/20442"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/media\/20844"}],"wp:attachment":[{"href":"http:\/\/www.sifytechnologies.com\/us\/wp-json\/wp\/v2\/media?parent=20659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}