{"id":13,"date":"2024-01-29T09:04:03","date_gmt":"2024-01-29T09:04:03","guid":{"rendered":"https:\/\/nexacybersecurity.com\/?page_id=13"},"modified":"2024-03-20T20:47:49","modified_gmt":"2024-03-20T20:47:49","slug":"about","status":"publish","type":"page","link":"https:\/\/nexacybersecurity.com\/index.php\/about\/","title":{"rendered":"About"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13\" class=\"elementor elementor-13\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1440b8cb elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"1440b8cb\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-727a5ba\" data-id=\"727a5ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-59cba8d4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"59cba8d4\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-508672b3\" data-id=\"508672b3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ef0d088 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2ef0d088\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Over view<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-610d7cbf elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"610d7cbf\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">We provide innovative solutions for your security needs.\n<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f6951fe elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f6951fe\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-56ce6845 elementor-invisible\" data-id=\"56ce6845\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61a484f elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"61a484f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Security <span><span>Analytics <\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Nexa is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats and behavioral anomalies.<br \/>\nAs cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. That is why our light-weight agent provides the necessary monitoring and response capabilities, while our server component provides the security intelligence and performs data analysis.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8331aaf elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"8331aaf\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4933c3ec\" data-id=\"4933c3ec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71603ad2 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"71603ad2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2200\" height=\"1467\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19243570_metal_device_mockup_3-copy123_optimized.jpg\" class=\"attachment-full size-full wp-image-475\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19243570_metal_device_mockup_3-copy123_optimized.jpg 2200w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19243570_metal_device_mockup_3-copy123_optimized-300x200.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19243570_metal_device_mockup_3-copy123_optimized-1024x683.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19243570_metal_device_mockup_3-copy123_optimized-768x512.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19243570_metal_device_mockup_3-copy123_optimized-1536x1024.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19243570_metal_device_mockup_3-copy123_optimized-2048x1366.jpg 2048w\" sizes=\"(max-width: 2200px) 100vw, 2200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5824dd3 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5824dd3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5f74e55\" data-id=\"5f74e55\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c50010 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"5c50010\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2200\" height=\"1754\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/2573826_1610-copyddd_optimized.png\" class=\"attachment-full size-full wp-image-483\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/2573826_1610-copyddd_optimized.png 2200w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/2573826_1610-copyddd_optimized-300x239.png 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/2573826_1610-copyddd_optimized-1024x816.png 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/2573826_1610-copyddd_optimized-768x612.png 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/2573826_1610-copyddd_optimized-1536x1225.png 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/2573826_1610-copyddd_optimized-2048x1633.png 2048w\" sizes=\"(max-width: 2200px) 100vw, 2200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7445bda elementor-invisible\" data-id=\"7445bda\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7296a2b elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"7296a2b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Cloud <span><span>Security <\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<div class=\"elementor-element elementor-element-6699e4a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Nexa helps monitoring cloud infrastructure at an API level, using integration modules that are able to pull security data from well known cloud providers, such as Amazon AWS, Azure or Google Cloud. In addition, Nexa provides rules to assess the configuration of your cloud environment, easily spotting weaknesses.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-19c2aa5 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>In addition, Nexa light-weight and multi-platform agents are commonly used to monitor cloud environments at the instance level.<\/p>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8042430 elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"8042430\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fdb0d15 elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fdb0d15\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fb41c17 elementor-invisible\" data-id=\"fb41c17\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc6fd34 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"cc6fd34\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Intrusion <span><span>Detection <\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Nexa agents scan the monitored systems looking for malware, rootkits and suspicious anomalies. They can detect hidden files, cloaked processes or unregistered network listeners, as well as inconsistencies in system call responses.<br \/>\nIn addition to agent capabilities, the server component uses a signature-based approach to intrusion detection, using its regular expression engine to analyze collected log data and look for indicators of compromise.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a9109c elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"5a9109c\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-cabfe99\" data-id=\"cabfe99\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1512c42 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"1512c42\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2200\" height=\"1452\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19332275_6091293-copy_optimized-1.jpg\" class=\"attachment-full size-full wp-image-488\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19332275_6091293-copy_optimized-1.jpg 2200w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19332275_6091293-copy_optimized-1-300x198.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19332275_6091293-copy_optimized-1-1024x676.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19332275_6091293-copy_optimized-1-768x507.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19332275_6091293-copy_optimized-1-1536x1014.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/19332275_6091293-copy_optimized-1-2048x1352.jpg 2048w\" sizes=\"(max-width: 2200px) 100vw, 2200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-588e462 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"588e462\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2114185\" data-id=\"2114185\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4790a87 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"4790a87\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2113\" height=\"1297\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1634713_p305jq1-copyssss_optimized.jpg\" class=\"attachment-full size-full wp-image-492\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1634713_p305jq1-copyssss_optimized.jpg 2113w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1634713_p305jq1-copyssss_optimized-300x184.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1634713_p305jq1-copyssss_optimized-1024x629.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1634713_p305jq1-copyssss_optimized-768x471.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1634713_p305jq1-copyssss_optimized-1536x943.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1634713_p305jq1-copyssss_optimized-2048x1257.jpg 2048w\" sizes=\"(max-width: 2113px) 100vw, 2113px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-36f1f8a elementor-invisible\" data-id=\"36f1f8a\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4fefbd elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"a4fefbd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Log Data <span><span>Analysis<\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Nexa agents read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage.<br \/>\nThe Nexa rules help make you aware of application or system errors, misconfigurations, attempted and\/or successful malicious activities, policy violations and a variety of other security and operational issues.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a64d4ff elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"a64d4ff\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8a94cb4 elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8a94cb4\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-807777e elementor-invisible\" data-id=\"807777e\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c1fb27 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"4c1fb27\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">File Integrity <span><span>Monitoring<\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Nexa monitors the file system, identifying changes in content, permissions, ownership, and attributes of files that you need to keep an eye on. In addition, it natively identifies users and applications used to create or modify files.<br \/>\nFile integrity monitoring capabilities can be used in combination with threat intelligence to identify threats or compromised hosts. In addition, several regulatory compliance standards, such as PCI DSS, require it.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85797d5 elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"85797d5\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-511849a\" data-id=\"511849a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80d71c3 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"80d71c3\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1344\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127240_ap_001_monitor_mockup_a-copy_optimized.jpg\" class=\"attachment-full size-full wp-image-496\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127240_ap_001_monitor_mockup_a-copy_optimized.jpg 1920w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127240_ap_001_monitor_mockup_a-copy_optimized-300x210.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127240_ap_001_monitor_mockup_a-copy_optimized-1024x717.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127240_ap_001_monitor_mockup_a-copy_optimized-768x538.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/29127240_ap_001_monitor_mockup_a-copy_optimized-1536x1075.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e9473c1 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e9473c1\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9c3596f\" data-id=\"9c3596f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5035c04 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"5035c04\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2500\" height=\"2000\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/842271_o33qw51-copyaaa_optimized.jpg\" class=\"attachment-full size-full wp-image-503\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/842271_o33qw51-copyaaa_optimized.jpg 2500w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/842271_o33qw51-copyaaa_optimized-300x240.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/842271_o33qw51-copyaaa_optimized-1024x819.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/842271_o33qw51-copyaaa_optimized-768x614.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/842271_o33qw51-copyaaa_optimized-1536x1229.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/842271_o33qw51-copyaaa_optimized-2048x1638.jpg 2048w\" sizes=\"(max-width: 2500px) 100vw, 2500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1f94cfa elementor-invisible\" data-id=\"1f94cfa\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cfd089 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"3cfd089\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Vulnerability <span><span>Detection <\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<div class=\"elementor-element elementor-element-1593f9b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">Nexa agents pull software inventory data and send this information to the server, where it is correlated with continuously updated CVE (Common Vulnerabilities and Exposure) databases, in order to identify well-known vulnerable software.<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-92620a3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">Automated vulnerability assessment helps you find the weak spots in your critical assets and take corrective action before attackers exploit them to sabotage your business or steal confidential data.<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1d5031 elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"e1d5031\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a7b772 elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a7b772\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f0a81c5 elementor-invisible\" data-id=\"f0a81c5\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f9c5bcf elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"f9c5bcf\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Configuration <span><span>Assessment <\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Nexa monitors system and application configuration settings to ensure they are compliant with your security policies, standards and\/or hardening guides. Agents perform periodic scans to detect applications that are known to be vulnerable, unpatched, or insecurely configured.<br \/>\nAdditionally, configuration checks can be customized, tailoring them to properly align with your organization. Alerts include recommendations for better configuration, references and mapping with regulatory compliance.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-debc424 elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"debc424\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ddd3870\" data-id=\"ddd3870\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c101e0 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"7c101e0\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2200\" height=\"1634\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1195565_ot13191-copy_optimized-1.jpg\" class=\"attachment-full size-full wp-image-508\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1195565_ot13191-copy_optimized-1.jpg 2200w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1195565_ot13191-copy_optimized-1-300x223.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1195565_ot13191-copy_optimized-1-1024x761.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1195565_ot13191-copy_optimized-1-768x570.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1195565_ot13191-copy_optimized-1-1536x1141.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1195565_ot13191-copy_optimized-1-2048x1521.jpg 2048w\" sizes=\"(max-width: 2200px) 100vw, 2200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-103ee4c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"103ee4c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-28a60c5\" data-id=\"28a60c5\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-973f335 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"973f335\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2500\" height=\"1408\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/14825571_44rd_3-copy_optimized.jpg\" class=\"attachment-full size-full wp-image-512\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/14825571_44rd_3-copy_optimized.jpg 2500w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/14825571_44rd_3-copy_optimized-300x169.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/14825571_44rd_3-copy_optimized-1024x577.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/14825571_44rd_3-copy_optimized-768x433.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/14825571_44rd_3-copy_optimized-1536x865.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/14825571_44rd_3-copy_optimized-2048x1153.jpg 2048w\" sizes=\"(max-width: 2500px) 100vw, 2500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-95359c5 elementor-invisible\" data-id=\"95359c5\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2306cb elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"c2306cb\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Incident <span><span>Response <\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<div class=\"elementor-element elementor-element-a44e01d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">Nexa provides out-of-the-box active responses to perform various countermeasures to address active threats, such as blocking access to a system from the threat source when certain criteria are met.<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-71e992c elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">In addition, Nexa can be used to remotely run commands or system queries, identifying indicators of compromise (IOCs) and helping perform other live forensics or incident response tasks.<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ce2e73 elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"9ce2e73\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7918bd elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d7918bd\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-edb4dc4 elementor-invisible\" data-id=\"edb4dc4\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-289d120 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"289d120\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Regulatory <span><span>Compliance<\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Nexa provides some of the necessary security controls to become compliant with industry standards and regulations. These features, combined with its scalability and multi-platform support help organizations meet technical compliance requirements.<br \/>\nNexa is widely used by payment processing companies and financial institutions to meet PCI DSS (Payment Card Industry Data Security Standard) requirements. Its web user interface provides reports and dashboards that can help with this and other regulations such as GDPR, NIST 800-53, GPG13, TSC SOC2, and HIPAA.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-502b5cf elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"502b5cf\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b2cb545\" data-id=\"b2cb545\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f418c7e elementor-invisible elementor-widget elementor-widget-image\" data-id=\"f418c7e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2500\" height=\"1686\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/31065520_ap_b_007_minimalist_desktop_computer_mockup-copysdsd_optimized.jpg\" class=\"attachment-full size-full wp-image-516\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/31065520_ap_b_007_minimalist_desktop_computer_mockup-copysdsd_optimized.jpg 2500w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/31065520_ap_b_007_minimalist_desktop_computer_mockup-copysdsd_optimized-300x202.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/31065520_ap_b_007_minimalist_desktop_computer_mockup-copysdsd_optimized-1024x691.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/31065520_ap_b_007_minimalist_desktop_computer_mockup-copysdsd_optimized-768x518.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/31065520_ap_b_007_minimalist_desktop_computer_mockup-copysdsd_optimized-1536x1036.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/31065520_ap_b_007_minimalist_desktop_computer_mockup-copysdsd_optimized-2048x1381.jpg 2048w\" sizes=\"(max-width: 2500px) 100vw, 2500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b907ae1 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b907ae1\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9d031eb\" data-id=\"9d031eb\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb1e61b elementor-invisible elementor-widget elementor-widget-image\" data-id=\"fb1e61b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2500\" height=\"1500\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1153561_or7v1x1-copyss_optimized.jpg\" class=\"attachment-full size-full wp-image-520\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1153561_or7v1x1-copyss_optimized.jpg 2500w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1153561_or7v1x1-copyss_optimized-300x180.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1153561_or7v1x1-copyss_optimized-1024x614.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1153561_or7v1x1-copyss_optimized-768x461.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1153561_or7v1x1-copyss_optimized-1536x922.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/1153561_or7v1x1-copyss_optimized-2048x1229.jpg 2048w\" sizes=\"(max-width: 2500px) 100vw, 2500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0e1d80d elementor-invisible\" data-id=\"0e1d80d\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e91e19e elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"e91e19e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Containers <span><span>Security<\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Nexa provides security visibility into your Docker hosts and containers, monitoring their behavior and detecting threats, vulnerabilities and anomalies. The Wazuh agent has native integration with the Docker engine allowing users to monitor images, volumes, network settings, and running containers.<\/p>\n<p>Nexa continuously collects and analyzes detailed runtime information. For example, alerting for containers running in privileged mode, vulnerable applications, a shell running in a container, changes to persistent volumes or images, and other possible threats.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51ab657 elementor-align-right elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"51ab657\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Over view We provide innovative solutions for your security needs. Security Analytics Nexa is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats and behavioral anomalies. As cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. That is why our [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":121,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":1171,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions\/1171"}],"wp:attachment":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}