{"id":59463,"date":"2021-10-08T16:15:20","date_gmt":"2021-10-08T09:15:20","guid":{"rendered":"https:\/\/www.a-host.co.th\/?page_id=59463"},"modified":"2023-10-11T13:44:22","modified_gmt":"2023-10-11T06:44:22","slug":"security-management-service","status":"publish","type":"page","link":"https:\/\/www.a-host.co.th\/en\/security-management-service\/","title":{"rendered":"Security Management Service"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css=&#8221;.vc_custom_1635952124436{padding-top: 80px !important;padding-bottom: 30px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column]<div id=\"ultimate-heading-632169d67e8f2e3e2\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-632169d67e8f2e3e2 uvc-4297 accent-border-color uvc-heading-default-font-sizes\" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-632169d67e8f2e3e2 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"font-weight:bold;margin-bottom:10px;\">Security Management Service<\/h2><\/div><div class=\"uvc-heading-spacer line_only\" style=\"margin-top:5px;margin-bottom:20px;height:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:;width:70px;\"><\/span><\/div><\/div>[vc_row_inner css=&#8221;.vc_custom_1632742276416{padding-top: 30px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1509566445127{padding-bottom: 50px !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][vc_column_text css_animation=&#8221;fadeIn&#8221;]Data is vital to conducting business in any company, if any data is damaged, lost, stolen, edited by a criminal party, or otherwise compromised in any other manner, the organization will no doubt take considerable damage. Still many companies cannot determine if their data is sufficiently protected.<\/p>\n<p>A-HOST is home to many experts in IT Security that are open for consultation, advice, design, and implementation of every organization that requests a security upgrade that matches their business and budget by keeping the standard of security for ISO 27001 data in compliance with the 2019 PDPA private data ownership enactment.<\/p>\n<p>&nbsp;<\/p>\n<h4>IT Security Consulting Service<\/h4>\n<p>This service provides consultation, advice, design, and implementation of every organization that requests a security upgrade that matches their technology and budget. It also includes designing a work program that includes security standards and Risk Management.<\/p>\n<p>&nbsp;<\/p>\n<h4>PDPA Compliance Consulting Service<\/h4>\n<p>This service provides consultation, advice, design, and implementation for maintaining data security in compliance with the 2019 PDPA private data ownership enactment.<\/p>\n<p>A-HOST teamed up with legislative bodies that can provide advice with legal and IT systems, starting with Situation Assessment, Gap Analysis, Process Design, and Implementation.[\/vc_column_text][vc_empty_space height=&#8221;25px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1509566455479{padding-bottom: 50px !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-ae09f80cb862b0d80d5a1ea820d80009.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-ae09f80cb862b0d80d5a1ea820d80009.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-ae09f80cb862b0d80d5a1ea820d80009 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-ae09f80cb862b0d80d5a1ea820d80009 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-ae09f80cb862b0d80d5a1ea820d80009 alignnone fadeIn animate-element  vc_custom_1636960891032 enable-bg-rollover dt-icon-bg-off\"  data-pretty-share=\"facebook,twitter,pinterest,linkedin\"><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"\"><img fetchpriority=\"high\" decoding=\"async\" class=\"preload-me lazy-load aspect\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20800%20400&#39;%2F%3E\" data-src=\"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/security-3-800x400.jpg\" data-srcset=\"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/security-3-800x400.jpg 800w, https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/security-3-1200x600.jpg 1200w\" loading=\"eager\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"800\" height=\"400\"  data-dt-location=\"https:\/\/www.a-host.co.th\/en\/security-management-service\/security-3\/\" style=\"--ratio: 800 \/ 400;\" alt=\"\" \/><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1686152389279{padding-top: 70px !important;padding-bottom: 70px !important;background-image: url(https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/11\/Banner-7.jpg?id=58098) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;]<div id=\"ultimate-heading-397869d67e8f2f1e7\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-397869d67e8f2f1e7 uvc-5428 accent-border-color uvc-heading-default-font-sizes\" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-397869d67e8f2f1e7 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"font-weight:bold;color:#ffffff;margin-bottom:10px;\">Security Products<\/h2><\/div><div class=\"uvc-heading-spacer line_only\" style=\"margin-top:5px;margin-bottom:20px;height:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:;width:70px;\"><\/span><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-397869d67e8f2f1e7 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#ffffff;margin-bottom:30px;\">\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e1c\u0e25\u0e34\u0e15\u0e20\u0e31\u0e13\u0e11\u0e4c\u0e23\u0e31\u0e01\u0e29\u0e32\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e17\u0e35\u0e48\u0e1e\u0e23\u0e49\u0e2d\u0e21\u0e43\u0e2b\u0e49\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e44\u0e14\u0e49\u0e21\u0e31\u0e48\u0e19\u0e43\u0e08\u0e01\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e04\u0e27\u0e32\u0e21\u0e19\u0e48\u0e32\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e16\u0e37\u0e2d\u0e43\u0e2b\u0e49\u0e41\u0e01\u0e48\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25 \u0e17\u0e33\u0e43\u0e2b\u0e49\u0e23\u0e30\u0e1a\u0e1a IT \u0e02\u0e2d\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e21\u0e35\u0e1b\u0e23\u0e30\u0e2a\u0e34\u0e17\u0e18\u0e34\u0e20\u0e32\u0e1e\u0e21\u0e32\u0e01\u0e22\u0e34\u0e48\u0e07\u0e02\u0e36\u0e49\u0e19<\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; bg_type=&#8221;bg_color&#8221; css=&#8221;.vc_custom_1635954347533{padding-top: 30px !important;padding-bottom: 50px !important;}&#8221; bg_color_value=&#8221;rgba(0,0,0,0.05)&#8221;][vc_column][vc_row_inner equal_height=&#8221;yes&#8221; gap=&#8221;15&#8243;][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1635954154251{padding-top: 20px !important;background-color: #ffffff !important;}&#8221;]<div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-5799\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \" data-animation=\"fadeIn\" data-animation-delay=\"03\" style=\"font-size:64px;display:inline-block;\">\n\t<i class=\"icomoon-numbers-32x32-number11\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-5799 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">ORACLE ADVANCE SECURITY (TDE, REDACTION)<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-5799 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">The protection of data from outside access, whether that be credit card information, salary information. This can serve as a worthwhile help for complete data protection for any organization.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component -->[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1635954357050{padding-top: 20px !important;background-color: #ffffff !important;}&#8221;]<div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-1033\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \" data-animation=\"fadeIn\" data-animation-delay=\"03\" style=\"font-size:64px;display:inline-block;\">\n\t<i class=\"icomoon-numbers-32x32-number12\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-1033 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">DATA MASKING<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-1033 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">Process that helps companies protect data efficiently by hiding some parts of data, masking the true extent of data like credit cards, and maintaining the same structure.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component -->[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1635954366018{padding-top: 20px !important;background-color: #ffffff !important;}&#8221;]<div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-9803\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \" data-animation=\"fadeIn\" data-animation-delay=\"03\" style=\"font-size:64px;display:inline-block;\">\n\t<i class=\"icomoon-numbers-32x32-number13\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-9803 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">DB VAULT<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-9803 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">Increases safety by distributing responsibilities and compartmentalizing to ensure totality of data and privacy of personal data.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component -->[\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; gap=&#8221;15&#8243; css=&#8221;.vc_custom_1635954445179{margin-top: 10px !important;}&#8221;][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1635954373450{padding-top: 20px !important;background-color: #ffffff !important;}&#8221;]<div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-3649\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \" data-animation=\"fadeIn\" data-animation-delay=\"03\" style=\"font-size:64px;display:inline-block;\">\n\t<i class=\"icomoon-numbers-32x32-number14\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-3649 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">SIEM<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-3649 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">Data Security system Storage and Assessment that pushes the level of caution. Data goes through usage checks,data type assessments, and is watched for abnormal incidents with IBM&#8217;s QRadar software.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component -->[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1635954382337{padding-top: 20px !important;background-color: #ffffff !important;}&#8221;]<div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-1576\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \" data-animation=\"fadeIn\" data-animation-delay=\"03\" style=\"font-size:64px;display:inline-block;\">\n\t<i class=\"icomoon-numbers-32x32-number15\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-1576 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">ENDPOINT<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-1576 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">Management of all clients simplifies management of company computers and servers with centralized all-encompassing control and capabilities. From investigating and fixing systems from long-distance, installed program monitoring, and security coefficient calculation in accordance with set policies, exclusively with IBM BigFix.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component -->[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1635954396442{padding-top: 20px !important;background-color: #ffffff !important;}&#8221;]<div class=\"aio-icon-component    style_1\"><div id=\"Info-box-wrap-4238\" class=\"aio-icon-box default-icon\" style=\"\"  ><div class=\"aio-icon-default\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \" data-animation=\"fadeIn\" data-animation-delay=\"03\" style=\"font-size:64px;display:inline-block;\">\n\t<i class=\"icomoon-numbers-32x32-number16\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"aio-icon-header\" ><h3 class=\"aio-icon-title ult-responsive\"  data-ultimate-target='#Info-box-wrap-4238 .aio-icon-title'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">MOBILE SECURITY<\/h3><\/div> <!-- header --><div class=\"aio-icon-description ult-responsive\"  data-ultimate-target='#Info-box-wrap-4238 .aio-icon-description'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"\">Managing security for mobile devices encourages using personal and work devices in tandem. In addition to setting policies for centrally controlling usage flexibly, and variably to suit the needs of the organization. We also monitor control data and device commands in real-time.<\/div> <!-- description --><\/div> <!-- aio-icon-box --><\/div> <!-- aio-icon-component -->[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1686154112957{padding-top: 50px !important;padding-bottom: 50px !important;background-image: url(https:\/\/a-host.co.th\/wp-content\/uploads\/2021\/10\/bg-36.jpg?id=58041) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_column][\/vc_column][\/vc_column][vc_row_inner equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1573059390880{padding-top: 50px !important;padding-right: 25px !important;padding-bottom: 0px !important;padding-left: 25px !important;background-color: #ffffff !important;}&#8221; el_class=&#8221;reverse-row-on-mobile&#8221;][vc_column_inner width=&#8221;7\/12&#8243; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243; css=&#8221;.vc_custom_1573059444822{margin-top: 0px !important;margin-right: 25px !important;margin-bottom: 50px !important;margin-left: 25px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;]<div id=\"ultimate-heading-400969d67e8f2f75b\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-400969d67e8f2f75b uvc-1543 accent-border-color uvc-heading-default-font-sizes\" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-400969d67e8f2f75b h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"font-weight:bold;margin-bottom:15px;\">Free First Consultation<\/h2><\/div><div class=\"uvc-heading-spacer line_only\" style=\"margin-bottom:35px;height:4px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:4px;border-color:;width:200px;\"><\/span><\/div><\/div><div id=\"ultimate-heading-997669d67e8f2f7bd\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-997669d67e8f2f7bd uvc-388  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-997669d67e8f2f7bd .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;margin-bottom:30px;\">A-HOST is honor to provide advice and Managed Services. Contact us for more information at tel. 02-298-0625-32 ext.4509 or E-mail <a href=\"mailto:channelmarketing@a-host.co.th\" target=\"_blank\" rel=\"noopener\">channelmarketing@a-host.co.th<\/a><\/div><\/div><form class=\"dt-contact-form dt-form\" method=\"post\"><input type=\"hidden\" name=\"widget_id\" value=\"presscore-contact-form-widget--1\" \/><input type=\"hidden\" name=\"send_message\" value=\"\" \/><input type=\"hidden\" name=\"security_token\" value=\"5e77abd57656612811a4\"\/><div class=\"form-fields\"><span class=\"form-name\"><label class=\"assistive-text\">Name *<\/label><input type=\"text\" class=\"validate[required]\" placeholder=\"Name *\" name=\"name\" value=\"\" aria-required=\"true\">\n<\/span><span class=\"form-mail\"><label class=\"assistive-text\">E-mail *<\/label><input type=\"text\" class=\"validate[required,custom[email]]\" placeholder=\"E-mail *\" name=\"email\" value=\"\" aria-required=\"true\">\n<\/span><span class=\"form-telephone\"><label class=\"assistive-text\">Telephone *<\/label><input type=\"text\" class=\"validate[required,custom[phone]]\" placeholder=\"Telephone *\" name=\"telephone\" value=\"\" aria-required=\"true\">\n<\/span><span class=\"form-company\"><label class=\"assistive-text\">Company *<\/label><input type=\"text\" class=\"validate[required]\" placeholder=\"Company *\" name=\"company\" value=\"\" aria-required=\"true\">\n<\/span><\/div><span class=\"form-message\"><label class=\"assistive-text\">Message *<\/label><textarea class=\"validate[required]\" placeholder=\"Message *\" name=\"message\" rows=\"3\" aria-required=\"true\"><\/textarea>\n<\/span><div class=\"the7-g-captcha\"><\/div><p><a href=\"#\" class=\"dt-btn dt-btn-m dt-btn-submit\" rel=\"nofollow\"><span>I want free consultation!<\/span><\/a><input class=\"assistive-text\" type=\"submit\" value=\"submit\"><\/p><\/form>\n[\/vc_column_inner][vc_column_inner width=&#8221;5\/12&#8243; css=&#8221;.vc_custom_1638849368554{margin-right: 25px !important;margin-bottom: 50px !important;margin-left: 25px !important;padding-top: 150px !important;padding-bottom: 150px !important;background-image: url(https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/free-first-consult-1.jpg?id=57853) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1635952124436{padding-top: 80px !important;padding-bottom: 30px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1632742276416{padding-top: 30px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1509566445127{padding-bottom: 50px !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][vc_column_text css_animation=&#8221;fadeIn&#8221;]Data is vital to conducting business in any company, if any data is damaged, lost, stolen, edited by a criminal party, or otherwise compromised in any other manner, the organization will no doubt take considerable damage. Still many companies&hellip;<\/p>\n","protected":false},"author":2,"featured_media":59222,"parent":0,"menu_order":30,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-59463","page","type-page","status-publish","has-post-thumbnail","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Management Service - A-HOST<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.a-host.co.th\/en\/security-management-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Management Service - A-HOST\" \/>\n<meta property=\"og:description\" content=\"[vc_row css=&#8221;.vc_custom_1635952124436{padding-top: 80px !important;padding-bottom: 30px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1632742276416{padding-top: 30px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1509566445127{padding-bottom: 50px !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][vc_column_text css_animation=&#8221;fadeIn&#8221;]Data is vital to conducting business in any company, if any data is damaged, lost, stolen, edited by a criminal party, or otherwise compromised in any other manner, the organization will no doubt take considerable damage. Still many companies&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.a-host.co.th\/en\/security-management-service\/\" \/>\n<meta property=\"og:site_name\" content=\"A-HOST\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-11T06:44:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/security-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/security-management-service\\\/\",\"url\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/security-management-service\\\/\",\"name\":\"Security Management Service - A-HOST\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/security-management-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/security-management-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.a-host.co.th\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/security-3.jpg\",\"datePublished\":\"2021-10-08T09:15:20+00:00\",\"dateModified\":\"2023-10-11T06:44:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/security-management-service\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/security-management-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/security-management-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.a-host.co.th\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/security-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.a-host.co.th\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/security-3.jpg\",\"width\":1200,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/security-management-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Management Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/\",\"name\":\"A-HOST\",\"description\":\"A-HOST (\u0e40\u0e2d-\u0e42\u0e2e\u0e2a\u0e15\u0e4c) \u0e40\u0e1b\u0e47\u0e19\u0e1c\u0e39\u0e49\u0e43\u0e2b\u0e49\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e14\u0e49\u0e32\u0e19\u0e44\u0e2d\u0e17\u0e35 \u0e41\u0e25\u0e30\u0e40\u0e1b\u0e47\u0e19\u0e1e\u0e32\u0e23\u0e4c\u0e17\u0e40\u0e19\u0e2d\u0e23\u0e4c \u0e08\u0e31\u0e14\u0e08\u0e33\u0e2b\u0e19\u0e48\u0e32\u0e22\u0e0b\u0e2d\u0e1f\u0e17\u0e4c\u0e41\u0e27\u0e23\u0e4c\u0e0a\u0e31\u0e49\u0e19\u0e19\u0e33\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/#organization\",\"name\":\"A-HOST\",\"url\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.a-host.co.th\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/a-host-logo-152.jpg\",\"contentUrl\":\"https:\\\/\\\/www.a-host.co.th\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/a-host-logo-152.jpg\",\"width\":152,\"height\":152,\"caption\":\"A-HOST\"},\"image\":{\"@id\":\"https:\\\/\\\/www.a-host.co.th\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Management Service - A-HOST","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.a-host.co.th\/en\/security-management-service\/","og_locale":"en_US","og_type":"article","og_title":"Security Management Service - A-HOST","og_description":"[vc_row css=&#8221;.vc_custom_1635952124436{padding-top: 80px !important;padding-bottom: 30px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1632742276416{padding-top: 30px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1509566445127{padding-bottom: 50px !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6&#8243;][vc_column_text css_animation=&#8221;fadeIn&#8221;]Data is vital to conducting business in any company, if any data is damaged, lost, stolen, edited by a criminal party, or otherwise compromised in any other manner, the organization will no doubt take considerable damage. Still many companies&hellip;","og_url":"https:\/\/www.a-host.co.th\/en\/security-management-service\/","og_site_name":"A-HOST","article_modified_time":"2023-10-11T06:44:22+00:00","og_image":[{"width":1200,"height":750,"url":"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/security-3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.a-host.co.th\/en\/security-management-service\/","url":"https:\/\/www.a-host.co.th\/en\/security-management-service\/","name":"Security Management Service - A-HOST","isPartOf":{"@id":"https:\/\/www.a-host.co.th\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.a-host.co.th\/en\/security-management-service\/#primaryimage"},"image":{"@id":"https:\/\/www.a-host.co.th\/en\/security-management-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/security-3.jpg","datePublished":"2021-10-08T09:15:20+00:00","dateModified":"2023-10-11T06:44:22+00:00","breadcrumb":{"@id":"https:\/\/www.a-host.co.th\/en\/security-management-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.a-host.co.th\/en\/security-management-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.a-host.co.th\/en\/security-management-service\/#primaryimage","url":"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/security-3.jpg","contentUrl":"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/10\/security-3.jpg","width":1200,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/www.a-host.co.th\/en\/security-management-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.a-host.co.th\/en\/"},{"@type":"ListItem","position":2,"name":"Security Management Service"}]},{"@type":"WebSite","@id":"https:\/\/www.a-host.co.th\/en\/#website","url":"https:\/\/www.a-host.co.th\/en\/","name":"A-HOST","description":"A-HOST (\u0e40\u0e2d-\u0e42\u0e2e\u0e2a\u0e15\u0e4c) \u0e40\u0e1b\u0e47\u0e19\u0e1c\u0e39\u0e49\u0e43\u0e2b\u0e49\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e14\u0e49\u0e32\u0e19\u0e44\u0e2d\u0e17\u0e35 \u0e41\u0e25\u0e30\u0e40\u0e1b\u0e47\u0e19\u0e1e\u0e32\u0e23\u0e4c\u0e17\u0e40\u0e19\u0e2d\u0e23\u0e4c \u0e08\u0e31\u0e14\u0e08\u0e33\u0e2b\u0e19\u0e48\u0e32\u0e22\u0e0b\u0e2d\u0e1f\u0e17\u0e4c\u0e41\u0e27\u0e23\u0e4c\u0e0a\u0e31\u0e49\u0e19\u0e19\u0e33","publisher":{"@id":"https:\/\/www.a-host.co.th\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.a-host.co.th\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.a-host.co.th\/en\/#organization","name":"A-HOST","url":"https:\/\/www.a-host.co.th\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.a-host.co.th\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/11\/a-host-logo-152.jpg","contentUrl":"https:\/\/www.a-host.co.th\/wp-content\/uploads\/2021\/11\/a-host-logo-152.jpg","width":152,"height":152,"caption":"A-HOST"},"image":{"@id":"https:\/\/www.a-host.co.th\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/pages\/59463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/comments?post=59463"}],"version-history":[{"count":3,"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/pages\/59463\/revisions"}],"predecessor-version":[{"id":59559,"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/pages\/59463\/revisions\/59559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/media\/59222"}],"wp:attachment":[{"href":"https:\/\/www.a-host.co.th\/en\/wp-json\/wp\/v2\/media?parent=59463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}