diff --git a/content/consulting/security.mdx b/content/consulting/security.mdx index 615182d91f..fc66c1889d 100644 --- a/content/consulting/security.mdx +++ b/content/consulting/security.mdx @@ -3,9 +3,7 @@ type: consulting description: null seo: title: IT Security Consulting | SSW - description: >- - Expert security consulting for identity solutions, secure code, and network - infrastructure to prevent data breaches and enhance user experience. + description: 'Expert security consulting for identity solutions, secure code, and network infrastructure to prevent data breaches and enhance user experience.' canonical: 'https://www.ssw.com.au/consulting/security' images: - url: /images/consulting/open-graph/security.jpg @@ -13,12 +11,8 @@ seo: height: 629 alt: SSW Security Consulting - Enterprise Software Development booking: - title: >- - Want to avoid embarrassing or expensive - data breaches? - subTitle: >- - Secure your applications, cloud, or network infrastructure by implementing - the best identity solution + title: Want to avoid embarrassing or expensive data breaches? + subTitle: 'Secure your applications, cloud, or network infrastructure by implementing the best identity solution' videoBackground: /images/videos/MVC_background.mp4 solution: project: security @@ -36,23 +30,22 @@ benefits: description: "\U0001F511 IdentityServer, Auth0, and Microsoft Entra ID provide top-tier authentication and authorization services. They offer OAuth 2.0, OpenID Connect, SSO, and customizable user experiences.\n" - image: /images/benefits/clear-graphics.png title: CODE AUDITS - description: > - We can review your code and audit it against the OWASP top 10. We can - also offer aggressive **red team** reviews where we actively attempt to - find security flaws in your code. NOTE This is distinct from penetration - testing, which we offer via a partner. + description: | + We can review your code and audit it against the OWASP top 10. We can also offer aggressive **red team** reviews where we actively attempt to find security flaws in your code. NOTE This is distinct from penetration testing, which we offer via a partner. - image: /images/benefits/speedup_db.png title: CLOUD SECURITY REVIEW - description: > - We can review your cloud architecture to ensure that your design and - components are best suited to the needs of your business while also - providing the best security. + description: | + We can review your cloud architecture to ensure that your design and components are best suited to the needs of your business while also providing the best security. - image: /images/benefits/implementation.png title: NETWORK AND INFRASTRUCTURE REVIEWS - description: > - We can audit your network and systems architecture to ensure you are - aligned with best practices and that common vulnerabilities are - protected. + description: | + We can audit your network and systems architecture to ensure you are aligned with best practices and that common vulnerabilities are protected. + - image: /images/benefits/security.png + title: PASSWORD MANAGERS + description: | + We can help you securely generate, store and manage strong unique passwords following best practices with Enterprise grade password managers like [Keeper](https://www.keepersecurity.com/). + linkName: Learn more + linkURL: 'https://www.ssw.com.au/rules/password-manager/' rule: - name: SSW Rules to Better Security url: 'https://www.ssw.com.au/rules/rules-to-better-security/'