{"id":3762,"date":"2021-11-04T11:19:45","date_gmt":"2021-11-04T03:19:45","guid":{"rendered":"https:\/\/www.udshk.com\/?page_id=3762"},"modified":"2024-07-24T10:14:21","modified_gmt":"2024-07-24T02:14:21","slug":"solution-our-service-team","status":"publish","type":"page","link":"https:\/\/www.udshk.com\/?page_id=3762","title":{"rendered":"Solution &#8211; Our Service Team"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3762\" class=\"elementor elementor-3762\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7c35f6 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"d7c35f6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b62b1e1\" data-id=\"b62b1e1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b1b297 elementor-widget elementor-widget-heading\" data-id=\"4b1b297\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a602713 elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"a602713\" data-element_type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div id=\"eael-advance-tabs-a602713\" class=\"eael-advance-tabs eael-tabs-horizontal\" data-tabid=\"a602713\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"eael-tab-inline-icon\">\n                                            <li id=\"consulting\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                        \n                                                            <span class=\"eael-tab-title title-after-icon\">Consulting<\/span>\n                            \n                                                    <\/li>\n                                            <li id=\"implementation\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                        \n                                                            <span class=\"eael-tab-title title-after-icon\">Implementation<\/span>\n                            \n                                                    <\/li>\n                                            <li id=\"security-assessment-services\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                        \n                                                            <span class=\"eael-tab-title title-after-icon\">Security Assessment Services<\/span>\n                            \n                                                    <\/li>\n                                    <\/ul>\n            <\/div>\n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"consulting-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"consulting-tab\">\n\t\t\t\t        \t\t\t\t\t        <p>We understand IT security is a key to your business success. Our IT security consulting service is design to help you to minimize and mitigate the potential risk and vulnerability to your business and ensure your business operation is in a protected environment. Our security consulting services include:<\/p><ul><li>IT security requirement survey<\/li><li>Architect the enterprise IT security infrastructure<\/li><li>Feasibility study of IT security implementation<\/li><li>Renew and update the security policy and guideline<\/li><li>Provide security awareness education and training<\/li><\/ul>\t\t\t\t                            <\/div>\n\t\t        \n                    <div id=\"implementation-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"implementation-tab\">\n\t\t\t\t        \t\t\t\t\t        <p>Our system design and implementation services provide proven methodologies and best practices that accelerate the time to value of your project investment. Our project implementation services deliver on schedule, outstanding design, implementation, and integration services\u2014in every engagement, in every location.<\/p><p>In addition to system implementation, we also provide profession training service to help customer to adopt the new technology and system rapidly.<\/p><p>A key benefit of working with UDS implementation team is the proven project management skill that is used along with skilled consultants to reduce risk and manage projects to on-time delivery within budget.<\/p><p>We provide 8x5, 7x24 onsite or remote support.<\/p>\t\t\t\t                            <\/div>\n\t\t        \n                    <div id=\"security-assessment-services-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"security-assessment-services-tab\">\n\t\t\t\t        \t\t\t\t\t        <div class=\"x_elementToProof\">We offer Security assessment services to enable your business to constantly meet the industry security best practices and your IT assets are well protected. Our audit and assessment services include:<\/div><ol start=\"1\" data-listchain=\"__List_Chain_3\"><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5320\">IT system infrastructure review<\/a><\/div><\/li><li><div class=\"x_elementToProof\">Internal\/external security assessment test including <a href=\"https:\/\/www.udshk.com\/?page_id=5288\">vulnerability assessmen<\/a>t, <a href=\"https:\/\/www.udshk.com\/?page_id=5294\">penetration testing<\/a>, <a href=\"https:\/\/www.udshk.com\/?page_id=5299\">load testing<\/a>, and <a href=\"https:\/\/www.udshk.com\/?page_id=5310\">stress testing<\/a>.<\/div><\/li><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5312\">DDoS Attack simulation testing<\/a><\/div><\/li><li><div class=\"x_elementToProof\">Review<a href=\"https:\/\/www.udshk.com\/?page_id=5344\"> security policies<\/a> and guidelines<\/div><\/li><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5346\">Source code Scanning<\/a><\/div><\/li><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5348\">Mobile App penetration testing<\/a>.<\/div><\/li><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5350\">Review the security policy setting in various devices\u00a0and systems such as Windows servers, Unix servers, firewalls, VPNs, Anti-Virus systems, etc.<\/a><\/div><\/li><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5314\">Security Awareness Training<\/a><\/div><\/li><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5316\">Phishing simulations<\/a><\/div><\/li><li><div class=\"x_elementToProof\">Help customer develop their <a href=\"https:\/\/www.udshk.com\/?page_id=5352\">Business Continuity Plan<\/a><\/div><\/li><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5354\">Security Risk Assessment Audit<\/a><\/div><\/li><li><div class=\"x_elementToProof\"><a href=\"https:\/\/www.udshk.com\/?page_id=5318\">Privacy Impact Analysis<\/a><\/div><\/li><\/ol>\t\t\t\t                            <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Our Services Consulting Implementation Security Assessment Services We understand IT security is a key to your business success. Our IT security consulting service is design to help you to minimize and mitigate the potential risk and vulnerability to your business and ensure your business operation is in a protected environment. Our security consulting services include: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3762","page","type-page","status-publish","hentry","entry","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"_links":{"self":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3762"}],"version-history":[{"count":73,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3762\/revisions"}],"predecessor-version":[{"id":5373,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3762\/revisions\/5373"}],"wp:attachment":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}