{"id":96372,"date":"2024-07-14T01:11:24","date_gmt":"2024-07-13T19:41:24","guid":{"rendered":"https:\/\/www.fortuler.com\/core\/?page_id=96372"},"modified":"2024-07-14T01:20:15","modified_gmt":"2024-07-13T19:50:15","slug":"industrial-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/","title":{"rendered":"Industrial Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"96372\" class=\"elementor elementor-96372\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07d5b00 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07d5b00\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b61fe34\" data-id=\"b61fe34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ebaee1 elementor-widget elementor-widget-image\" data-id=\"3ebaee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"640\" src=\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-1024x1024.png\" class=\"attachment-large size-large wp-image-96374\" alt=\"Industrial Cybersecurity\" srcset=\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-1024x1024.png 1024w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-300x300.png 300w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-150x150.png 150w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-768x768.png 768w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-80x80.png 80w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity.png 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c261f76\" data-id=\"c261f76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b5513d elementor-widget elementor-widget-heading\" data-id=\"2b5513d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Industrial CyberSecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-934fcef elementor-widget elementor-widget-text-editor\" data-id=\"934fcef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Industrial cybersecurity is the protection of industrial control systems (ICS) from unauthorized access, disruption, or destruction. ICS are used to control and monitor physical processes, such as those found in manufacturing plants, power plants, and water treatment facilities.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5d8d5d elementor-widget elementor-widget-eael-creative-button\" data-id=\"b5d8d5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-creative-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-creative-button-wrapper\">\n\n            <a class=\"eael-creative-button eael-creative-button--winona\" href=\"https:\/\/www.fortuler.com\/core\/cyber-security\/kaspersky-cloud\/kaspersky-security-cloud-promo\/\" data-text=\"\u2192 Go\">\n            \t    \n                <div class=\"creative-button-inner\">\n\n                    \n                    <span class=\"cretive-button-text\">Learn more<\/span>\n\n                                    <\/div>\n\t                        <\/a>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e00f07 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e00f07\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9f47418\" data-id=\"9f47418\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6470d1a elementor-widget elementor-widget-heading\" data-id=\"6470d1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Key features<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0f55d6 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a0f55d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Network traffic analysis, detection and response<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Endpoint protection, detection and response<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Audit, risk and vulnerability assessment<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Network visibility<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Development vectors<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fe013b elementor-widget elementor-widget-eael-creative-button\" data-id=\"0fe013b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-creative-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-creative-button-wrapper\">\n\n            <a class=\"eael-creative-button eael-creative-button--default\" href=\"https:\/\/www.fortuler.com\/core\/cyber-security\/kaspersky-cloud\/\" data-text=\"Go!\">\n            \t    \n                <div class=\"creative-button-inner\">\n\n                    \n                    <span class=\"cretive-button-text\">Learn More<\/span>\n\n                                    <\/div>\n\t                        <\/a>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-059ca77\" data-id=\"059ca77\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d82ad86 elementor-widget elementor-widget-spacer\" data-id=\"d82ad86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-346f27b elementor-widget elementor-widget-text-editor\" data-id=\"346f27b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote><p>Find out more about our extensive experience serving over a thousand industrial enterprises worldwide, through industry-specific case studies in the following industries: Power Grid, Plants, and Utilities; Oil, Gas, and Chemicals; Minerals, Metals, and Mining; High-profile Manufacturing; Logistics and Transportation.<\/p><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16bb6d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16bb6d1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a5bc32e\" data-id=\"a5bc32e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8016c82 elementor-widget elementor-widget-text-editor\" data-id=\"8016c82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Industrial cybersecurity is important for several reasons:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Protect critical infrastructure:<\/b><span style=\"font-weight: 400;\"> ICS are essential for the operation of critical infrastructure, such as power grids, water treatment facilities, and manufacturing plants. A cyberattack on an ICS could disrupt or damage critical infrastructure, leading to widespread outages and economic losses.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Protect national security:<\/b><span style=\"font-weight: 400;\"> ICS are also used in military and defense applications. A cyberattack on an ICS could compromise national security by disrupting military operations or critical infrastructure.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Protect intellectual property:<\/b><span style=\"font-weight: 400;\"> ICS often contain valuable intellectual property, such as trade secrets and proprietary processes. A cyberattack could steal this intellectual property, giving competitors an unfair advantage.<\/span><\/li><\/ul><p><b>Protect human safety:<\/b><span style=\"font-weight: 400;\"> ICS are often used to control hazardous processes, such as those found in chemical plants and oil refineries. A cyberattack on an ICS could cause a hazardous process to malfunction, leading to injuries or death.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3744911 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3744911\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fbd0505\" data-id=\"fbd0505\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd61922 elementor-view-stacked elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"dd61922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-connectdevelop\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGet in touch\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIf you'd like to find out how to protect your business from complex cybersecurity attacks, with the most tested, most awarded product on the market, please contact us<br>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1253346\" data-id=\"1253346\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a85e02c elementor-widget elementor-widget-image\" data-id=\"a85e02c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.fortuler.com\/core\/contact\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"640\" src=\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2023\/01\/Strong-Security-1024x1024.png\" class=\"attachment-large size-large wp-image-7026\" alt=\"security -Cyber\" srcset=\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2023\/01\/Strong-Security-1024x1024.png 1024w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2023\/01\/Strong-Security-300x300.png 300w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2023\/01\/Strong-Security-150x150.png 150w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2023\/01\/Strong-Security-768x768.png 768w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2023\/01\/Strong-Security-80x80.png 80w, https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2023\/01\/Strong-Security.png 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Industrial CyberSecurity Industrial cybersecurity is the protection of industrial control systems (ICS) from unauthorized access, disruption, or destruction. ICS are used to control and monitor physical processes, such as those found in manufacturing plants, power plants, and water treatment facilities. Learn more Key features Network traffic analysis, detection and response Endpoint protection, detection and response [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-96372","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industrial Cybersecurity Solutions Partner- Kerala India | Kaspersky<\/title>\n<meta name=\"description\" content=\"Industrial Cybersecurity Solutions Partner Kerala, India, Endpoint protection, detection and response, Asset management, Network visibility\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Cybersecurity Solutions Partner- Kerala India | Kaspersky\" \/>\n<meta property=\"og:description\" content=\"Industrial Cybersecurity Solutions Partner Kerala, India, Endpoint protection, detection and response, Asset management, Network visibility\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortuler Business Solutions\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FortulerBusiness\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-13T19:50:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-1024x1024.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@fortuler\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/\",\"url\":\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/\",\"name\":\"Industrial Cybersecurity Solutions Partner- Kerala India | Kaspersky\",\"isPartOf\":{\"@id\":\"https:\/\/www.fortuler.com\/core\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-1024x1024.png\",\"datePublished\":\"2024-07-13T19:41:24+00:00\",\"dateModified\":\"2024-07-13T19:50:15+00:00\",\"description\":\"Industrial Cybersecurity Solutions Partner Kerala, India, Endpoint protection, detection and response, Asset management, Network visibility\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity.png\",\"width\":1200,\"height\":1200,\"caption\":\"Industrial Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fortuler.com\/core\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fortuler.com\/core\/#website\",\"url\":\"https:\/\/www.fortuler.com\/core\/\",\"name\":\"Fortuler - Cloud Solutions | Consulting | IT Services | Digital Transformation\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.fortuler.com\/core\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fortuler.com\/core\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fortuler.com\/core\/#organization\",\"name\":\"Fortuler Business Solutions Private Limited\",\"url\":\"https:\/\/www.fortuler.com\/core\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fortuler.com\/core\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2022\/04\/Fortuler-Business-Solutions-Pvt.-Ltd-India15.png\",\"contentUrl\":\"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2022\/04\/Fortuler-Business-Solutions-Pvt.-Ltd-India15.png\",\"width\":70,\"height\":70,\"caption\":\"Fortuler Business Solutions Private Limited\"},\"image\":{\"@id\":\"https:\/\/www.fortuler.com\/core\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/FortulerBusiness\",\"https:\/\/x.com\/fortuler\",\"https:\/\/www.instagram.com\/fortuler\/\",\"https:\/\/www.linkedin.com\/company\/fortulerbusiness\",\"https:\/\/www.youtube.com\/channel\/UCl38O_sD0cj_4fUSY_jALEQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial Cybersecurity Solutions Partner- Kerala India | Kaspersky","description":"Industrial Cybersecurity Solutions Partner Kerala, India, Endpoint protection, detection and response, Asset management, Network visibility","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Industrial Cybersecurity Solutions Partner- Kerala India | Kaspersky","og_description":"Industrial Cybersecurity Solutions Partner Kerala, India, Endpoint protection, detection and response, Asset management, Network visibility","og_url":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/","og_site_name":"Fortuler Business Solutions\u00ae","article_publisher":"https:\/\/www.facebook.com\/FortulerBusiness","article_modified_time":"2024-07-13T19:50:15+00:00","og_image":[{"url":"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-1024x1024.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@fortuler","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/","url":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/","name":"Industrial Cybersecurity Solutions Partner- Kerala India | Kaspersky","isPartOf":{"@id":"https:\/\/www.fortuler.com\/core\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity-1024x1024.png","datePublished":"2024-07-13T19:41:24+00:00","dateModified":"2024-07-13T19:50:15+00:00","description":"Industrial Cybersecurity Solutions Partner Kerala, India, Endpoint protection, detection and response, Asset management, Network visibility","breadcrumb":{"@id":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#primaryimage","url":"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity.png","contentUrl":"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2024\/07\/Industrial-Cybersecurity.png","width":1200,"height":1200,"caption":"Industrial Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.fortuler.com\/core\/industrial-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fortuler.com\/core\/"},{"@type":"ListItem","position":2,"name":"Industrial Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.fortuler.com\/core\/#website","url":"https:\/\/www.fortuler.com\/core\/","name":"Fortuler - Cloud Solutions | Consulting | IT Services | Digital Transformation","description":"","publisher":{"@id":"https:\/\/www.fortuler.com\/core\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fortuler.com\/core\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fortuler.com\/core\/#organization","name":"Fortuler Business Solutions Private Limited","url":"https:\/\/www.fortuler.com\/core\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fortuler.com\/core\/#\/schema\/logo\/image\/","url":"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2022\/04\/Fortuler-Business-Solutions-Pvt.-Ltd-India15.png","contentUrl":"https:\/\/www.fortuler.com\/core\/wp-content\/uploads\/2022\/04\/Fortuler-Business-Solutions-Pvt.-Ltd-India15.png","width":70,"height":70,"caption":"Fortuler Business Solutions Private Limited"},"image":{"@id":"https:\/\/www.fortuler.com\/core\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FortulerBusiness","https:\/\/x.com\/fortuler","https:\/\/www.instagram.com\/fortuler\/","https:\/\/www.linkedin.com\/company\/fortulerbusiness","https:\/\/www.youtube.com\/channel\/UCl38O_sD0cj_4fUSY_jALEQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.fortuler.com\/core\/wp-json\/wp\/v2\/pages\/96372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fortuler.com\/core\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fortuler.com\/core\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fortuler.com\/core\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fortuler.com\/core\/wp-json\/wp\/v2\/comments?post=96372"}],"version-history":[{"count":13,"href":"https:\/\/www.fortuler.com\/core\/wp-json\/wp\/v2\/pages\/96372\/revisions"}],"predecessor-version":[{"id":96389,"href":"https:\/\/www.fortuler.com\/core\/wp-json\/wp\/v2\/pages\/96372\/revisions\/96389"}],"wp:attachment":[{"href":"https:\/\/www.fortuler.com\/core\/wp-json\/wp\/v2\/media?parent=96372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}