{"id":2008,"date":"2023-03-14T03:49:13","date_gmt":"2023-03-14T03:49:13","guid":{"rendered":"https:\/\/www.new.try2ascend.com\/wp\/?page_id=2008"},"modified":"2023-08-10T20:08:08","modified_gmt":"2023-08-10T20:08:08","slug":"enterprise","status":"publish","type":"page","link":"https:\/\/try2ascend.com\/cyberware\/enterprise\/","title":{"rendered":"Enterprise Clients"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2008\" class=\"elementor elementor-2008\">\n\t\t\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-02c9407 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"02c9407\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b98be6f\" data-id=\"b98be6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-591ce9c elementor-widget elementor-widget-security-area\" data-id=\"591ce9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"security-area.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n                    <div class=\"cybersecurity-area pt-100 pb-100\">\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                                                    <div class=\"col-lg-6\">\r\n                                <div class=\"cybersecurity-content text-left\">\r\n                                    <h2>Cybersecurity For Enterprise Business<\/h2>\r\n\r\n                                    <p>Data breaches are on the rise, and\u00a0<a href=\"https:\/\/www.ibm.com\/security\/data-breach\">according to IBM<\/a>, the average cost of a data breach rose to $4,240,000 in 2021. Not only is your company\u2019s data at stake, but security vulnerabilities affect your business partnerships too. The supply chain is only as secure as its weakest link, and by 2025, it\u2019s expected that 60% of organizations will use cybersecurity risk as a primary determinant of who to work with.<\/p><p>Cyberware AI can deliver to growing businesses the same sophisticated tools, capabilities, and technical expertise normally reserved for the U.S. Government and larger corporations with high-end security teams. Our virtual Security-Program-as-a-Service (SPaaS) approach enables each client to scale their cybersecurity posture and service as their revenues grow. We can provide a range of strategic and advisory services to help you build out or upgrade your security program, and educate you and your team on best practices for keeping your business safe. Contact Cyberware AI about safeguarding your company\u2019s future today.<\/p>\r\n                                    <div class=\"row\">\r\n                                                                                <div class=\"col-lg-6 col-sm-6\">\r\n                                            <ul class=\"cybersecurity-item\">\r\n                                                                                                        <li>\r\n                                                            <i class=\"fa fa-check\"><\/i>\r\n                                                                                                                    <\/li>\r\n                                                                                                    <\/ul>\r\n                                        <\/div>\r\n\r\n                                        <div class=\"col-lg-6 col-sm-6\">\r\n                                            <ul>\r\n                                                                                            <\/ul>\r\n                                        <\/div>\r\n                                    <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"col-lg-6 pr-0\">\r\n                                <div class=\"cybersecurity-img\" style=\"background-image: url(https:\/\/cyberware.ai\/wp-content\/uploads\/2023\/03\/standard-quality-control-collage-concept-scaled.jpg )\"><\/div>\r\n                            <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                            <\/div>\r\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-faf4473 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"faf4473\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72da74c\" data-id=\"72da74c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f739bd elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"0f739bd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8dea66f\" data-id=\"8dea66f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e310879 elementor-widget elementor-widget-image\" data-id=\"e310879\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"770\" height=\"1993\" src=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Enterprise.jpg\" class=\"attachment-full size-full wp-image-2266\" alt=\"\" srcset=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Enterprise.jpg 770w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Enterprise-116x300.jpg 116w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Enterprise-396x1024.jpg 396w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Enterprise-768x1988.jpg 768w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Enterprise-593x1536.jpg 593w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Enterprise-530x1372.jpg 530w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity For Enterprise Business Data breaches are on the rise, and\u00a0according to IBM, the average cost of a data breach rose to $4,240,000 in 2021. Not only is your company\u2019s data at stake, but security vulnerabilities affect your business partnerships too. The supply chain is only as secure as its weakest link, and by 2025, <\/p>\n","protected":false},"author":1,"featured_media":2270,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2008","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages\/2008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/comments?post=2008"}],"version-history":[{"count":0,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages\/2008\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media\/2270"}],"wp:attachment":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media?parent=2008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}