{"id":6,"date":"2020-10-03T14:17:22","date_gmt":"2020-10-03T14:17:22","guid":{"rendered":"https:\/\/cybertlabs.com\/?page_id=6"},"modified":"2025-08-21T18:49:45","modified_gmt":"2025-08-21T18:49:45","slug":"homepage","status":"publish","type":"page","link":"https:\/\/cybertlabs.com\/","title":{"rendered":"Cybersecurity (Welcome Page)"},"content":{"rendered":"<div class=\"et_pb_section_4 et_pb_section et_section_regular\">\n<div class=\"et_pb_row_8 et_pb_row et_pb_gutters3\">\n<div class=\"et_pb_column_19 et_pb_column et_pb_column_3_5 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_text_15 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h1>Ignite Change In Your Cyber Mission<\/h1><\/div><\/div>\n\n<div class=\"et_pb_text_16 et_pb_text et_pb_bg_layout_dark et_pb_text_align_left et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p data-pm-slice=\"1 1 []\">CybertLabs provides cybersecurity services focused on compliance excellence, including managed security, penetration testing, and cloud protection. Based in Dallas, TX, we help clients nationwide meet standards like NIST 800-53 and FedRAMP.<\/p><\/div><\/div>\n\n<div class=\"et_pb_module et_pb_button_module_wrapper et_pb_button_1_wrapper\"><a class=\"et_pb_button_1 et_pb_button et_pb_bg_layout_light et_animated\" href=\"https:\/\/cybertlabs.com\/contact-us\/\" target=\"\" data-icon=\"$\" data-icon-tablet=\"\" data-icon-phone=\"\" rel=\"\">Secure Your Organization Today<\/a><\/div>\n<\/div>\n\n<div class=\"et_pb_column_20 et_pb_column et_pb_column_2_5 et-last-child et_pb_column_empty et_pb_css_mix_blend_mode_passthrough\"><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_5 et_pb_section et_section_regular\">\n<div class=\"et_pb_row_9 et_pb_row et_pb_equal_columns et_flex_row\">\n<div class=\"et_pb_column_21 et_pb_column et_flex_column et_flex_column_12_24 et_flex_column_12_24_tablet et_flex_column_24_24_phone et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_text_17 et_pb_text et_pb_bg_layout_dark et_pb_text_align_left et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h2>Our Security Mindset\u00a0<\/h2><\/div><\/div>\n\n<div class=\"et_pb_text_18 et_pb_text et_pb_bg_layout_dark et_pb_text_align_left et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p data-pm-slice=\"1 1 []\">Cybersecurity must evolve in lock steps with organization&#8217;s technology and business processes. It has to be an integral and conscious part of the organization&#8217;s IT ecosystem. Our team rejects the security stereotype that speed and usability must be sacrificed for security. We believe security can be a mission enabler, a market differentiator, and an agent of trust for your brand.<\/p>\n<p>Our team brings this mindset to challenge the status quo, inspire new horizons, and accelerate your organization&#8217;s cyber mission with integrity and common sense.<\/p><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_22 et_pb_column et-last-child et_flex_column et_flex_column_8_24 et_flex_column_12_24_tablet et_flex_column_24_24_phone et_pb_column_empty et_pb_css_mix_blend_mode_passthrough\"><\/div>\n<\/div>\n\n<div class=\"et_pb_row_10 et_pb_row et_pb_gutters3\">\n<div class=\"et_pb_column_23 et_pb_column et_pb_column_4_4 et-last-child et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_text_19 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h2>Built on Compliance. Powered by Security.<\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>Compliance-First Cybersecurity\u00a0 +\u00a0 Cloud &amp; Endpoint Protection\u00a0 +\u00a0 Penetration Testing Services<\/strong><\/p><\/div><\/div>\n\n<div class=\"et_pb_divider_6 et_pb_divider et_pb_space et_pb_divider_position_center et_animated et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n\n<div class=\"et_pb_text_20 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p data-pm-slice=\"1 1 []\">At CybertLabs, cybersecurity compliance is the foundation of everything we do. Our team blends regulatory expertise with deep technical skill to provide services that go beyond checklists. Whether we\u2019re managing your day-to-day security operations, conducting advanced penetration testing, or deploying endpoint protection tools across your network, our approach is proactive, scalable, and built for modern digital threats.<\/p><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_6 et_pb_section et_section_regular\">\n<div class=\"et_pb_row_11 et_pb_row et_pb_equal_columns et_pb_gutters2\">\n<div class=\"et_pb_column_24 et_pb_column et_pb_column_1_3 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_text_21 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h2>Compliance-First Cybersecurity<\/h2><\/div><\/div>\n\n<div class=\"et_pb_divider_7 et_pb_divider et_pb_space et_pb_divider_position_center et_animated et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n\n<div class=\"et_pb_text_22 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p data-pm-slice=\"1 1 []\">We specialize in compliance frameworks like NIST 800-53, CMMC, and FedRAMP to help organizations reduce risk, pass audits, and meet federal security mandates. Our experts embed security at every stage of your system lifecycle.<\/p><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_25 et_pb_column et_pb_column_1_3 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_text_23 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h2>Cloud &amp; Endpoint Protection<\/h2><\/div><\/div>\n\n<div class=\"et_pb_divider_8 et_pb_divider et_pb_space et_pb_divider_position_center et_animated et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n\n<div class=\"et_pb_text_24 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p>CybertLabs helps organizations detect, prioritize, and remediate vulnerabilities across cloud and on-prem environments. Our continuous monitoring solutions integrate with compliance frameworks to ensure real-time visibility and ongoing risk reduction.<\/p><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_26 et_pb_column et_pb_column_1_3 et-last-child et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_text_25 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h2>Penetration Testing Services<\/h2><\/div><\/div>\n\n<div class=\"et_pb_divider_9 et_pb_divider et_pb_space et_pb_divider_position_center et_animated et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n\n<div class=\"et_pb_text_26 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p>Our ethical hackers simulate real-world attacks to expose vulnerabilities before threat actors do\u2014delivering detailed reports that drive measurable security improvements.<\/p><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_7 et_pb_section et_section_regular\">\n<div class=\"et_pb_row_12 et_pb_row et_pb_gutters3\">\n<div class=\"et_pb_column_27 et_pb_column et_pb_column_4_4 et-last-child et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_text_27 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h2>Build Something Great Together<\/h2><\/div><\/div>\n\n<div class=\"et_pb_divider_10 et_pb_divider et_pb_space et_pb_divider_position_center et_animated et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_13 et_pb_row et_pb_row_4col et_pb_equal_columns et_pb_gutters2\">\n<div class=\"et_pb_column_28 et_pb_column et_pb_column_1_4 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_blurb_4 et_pb_blurb et_pb_bg_layout_light et_pb_text_align_left et_pb_blurb_position_top et_clickable et_pb_module\"><div class=\"et_pb_blurb_content\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap et_pb_only_image_mode_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/is-the-future-of-marketing-automated.jpg\" alt=\"Cybersecurity team working together in a modern digital workspace\" width=\"657\" height=\"404\" srcset=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/is-the-future-of-marketing-automated.jpg 657w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/is-the-future-of-marketing-automated-480x295.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 657px, 100vw\" class=\"et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-387\" \/><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">RMF Automation<\/h4><div class=\"et_pb_blurb_description\"><p data-pm-slice=\"1 1 []\">Empower risk management programs with data, automation, and subject matter expertise. We are looking for:<\/p>\n<ul>\n<li>Splunk Engineer<\/li>\n<li>Qmulos Engineer<\/li>\n<li>Security Assessor<\/li>\n<\/ul>\n<p>&nbsp;<\/p><\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_29 et_pb_column et_pb_column_1_4 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_blurb_5 et_pb_blurb et_pb_bg_layout_light et_pb_text_align_left et_pb_blurb_position_top et_clickable et_pb_module\"><div class=\"et_pb_blurb_content\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap et_pb_only_image_mode_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/324vfdds.jpg\" alt=\"IT professionals collaborating in an open office environment\" width=\"1390\" height=\"823\" srcset=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/324vfdds.jpg 1390w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/324vfdds-1280x758.jpg 1280w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/324vfdds-980x580.jpg 980w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/324vfdds-480x284.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1390px, 100vw\" class=\"et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-361\" \/><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">DevSecOps<\/h4><div class=\"et_pb_blurb_description\"><p data-pm-slice=\"1 1 []\">Enable development teams with security automation tools, frameworks, and playbooks. We are looking for:<\/p>\n<ul>\n<li>Cloud Security Engineer<\/li>\n<li>Secure Code Analyst<\/li>\n<li>Secure CI\/CD Engineer<\/li>\n<li>\n<p>Secure Code Reviewer\u00a0<\/p>\n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/cybertlabs.com\/career-page\"><\/a><\/p><\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_30 et_pb_column et_pb_column_1_4 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_blurb_6 et_pb_blurb et_pb_bg_layout_light et_pb_text_align_left et_pb_blurb_position_top et_clickable et_pb_module\"><div class=\"et_pb_blurb_content\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap et_pb_only_image_mode_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/2324vfdds.jpg\" alt=\"Diverse team engagedin cybersecurity planning and risk analysis.\" width=\"1390\" height=\"823\" srcset=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/2324vfdds.jpg 1390w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/2324vfdds-1280x758.jpg 1280w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/2324vfdds-980x580.jpg 980w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/2324vfdds-480x284.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1390px, 100vw\" class=\"et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-363\" \/><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Cyber Transformation<\/h4><div class=\"et_pb_blurb_description\"><p data-pm-slice=\"1 1 []\">Transform cyber programs to combat security threats while enabling new digital experiences. We are looking for:<\/p>\n<ul>\n<li>IoT Engineer<\/li>\n<li>Network Security Engineer<\/li>\n<li>Technical PM<\/li>\n<\/ul>\n<p><a href=\"https:\/\/cybertlabs.com\/career-page\"><\/a><\/p><\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_31 et_pb_column et_pb_column_1_4 et-last-child et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_blurb_7 et_pb_blurb et_pb_bg_layout_light et_pb_text_align_left et_pb_blurb_position_top et_clickable et_pb_module\"><div class=\"et_pb_blurb_content\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap et_pb_only_image_mode_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1324vfdds.jpg\" alt=\"Diverse team engaged in cybersecurity planning and risk analysis.\" width=\"1390\" height=\"823\" srcset=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1324vfdds.jpg 1390w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1324vfdds-1280x758.jpg 1280w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1324vfdds-980x580.jpg 980w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1324vfdds-480x284.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1390px, 100vw\" class=\"et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-362\" \/><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Zero Trust &#038; PKI<\/h4><div class=\"et_pb_blurb_description\"><p data-pm-slice=\"1 1 []\">Connect everything with everyone without compromising security, safety, or privacy. We are looking for:<\/p>\n<ul>\n<li data-pm-slice=\"1 1 []\">Cyber Strategist<\/li>\n<li>Cybersecurity Architect<\/li>\n<li>Technical PM<\/li>\n<\/ul>\n<p>&nbsp;<\/p><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_14 et_pb_row et_pb_gutters3\">\n<div class=\"et_pb_column_32 et_pb_column et_pb_column_4_4 et-last-child et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_text_28 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h2 style=\"text-align: center;\">Partners<\/h2><\/div><\/div>\n\n<div class=\"et_pb_divider_11 et_pb_divider et_pb_space et_pb_divider_position_center et_animated et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n\n<div class=\"et_pb_text_29 et_pb_text et_pb_bg_layout_dark et_pb_text_align_center et_animated et_pb_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p>We work with the industry&#8217;s most advanced cybersecurity and technology vendors with the common objective to ignite change in your organization&#8217;s cyber mission.<\/p><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_15 et_pb_row et_pb_row_5col et_pb_gutters3\">\n<div class=\"et_pb_column_33 et_pb_column et_pb_column_1_5 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_image_5 et_pb_image et_pb_module\"><span class=\"et_pb_image_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2021\/10\/booz_allen_deliv_tag_black_red485_line.jpeg\" alt=\"Booz Allen Hamilton logo with tagline delivering results that endure\" title=\"booz_allen_deliv_tag_black_red485_line\" width=\"720\" height=\"182\" srcset=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2021\/10\/booz_allen_deliv_tag_black_red485_line.jpeg 720w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2021\/10\/booz_allen_deliv_tag_black_red485_line-480x121.jpeg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 720px, 100vw\" class=\"wp-image-562\" \/><\/span><\/div>\n<\/div>\n\n<div class=\"et_pb_column_34 et_pb_column et_pb_column_1_5 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_image_6 et_pb_image et_pb_module\"><span class=\"et_pb_image_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2021\/10\/elasticsearch.png\" alt=\"Elastic logo representing data search and observability platform\" title=\"elasticsearch\" width=\"384\" height=\"131\" srcset=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2021\/10\/elasticsearch.png 384w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2021\/10\/elasticsearch-300x102.png 300w\" sizes=\"(max-width: 384px) 100vw, 384px\" class=\"wp-image-560\" \/><\/span><\/div>\n<\/div>\n\n<div class=\"et_pb_column_35 et_pb_column et_pb_column_1_5 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_image_7 et_pb_image et_pb_module\"><span class=\"et_pb_image_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1200px-Microsoft_Azure_Logo.svg.png\" alt=\"Microsoft Azure logo indicating cloud computing services\" title=\"1200px-Microsoft_Azure_Logo.svg\" width=\"1200\" height=\"347\" srcset=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1200px-Microsoft_Azure_Logo.svg.png 1200w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1200px-Microsoft_Azure_Logo.svg-980x283.png 980w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1200px-Microsoft_Azure_Logo.svg-480x139.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw\" class=\"wp-image-413\" \/><\/span><\/div>\n<\/div>\n\n<div class=\"et_pb_column_36 et_pb_column et_pb_column_1_5 et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_image_8 et_pb_image et_pb_module\"><span class=\"et_pb_image_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1024px-Amazon_Web_Services_Logo.svg.png\" alt=\"Amazon Web Services (AWS) logo symbolizing cloud infrastructure solutions\" title=\"1024px-Amazon_Web_Services_Logo.svg\" width=\"1024\" height=\"613\" srcset=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1024px-Amazon_Web_Services_Logo.svg.png 1024w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1024px-Amazon_Web_Services_Logo.svg-980x587.png 980w, https:\/\/cybertlabs.com\/wp-content\/uploads\/2020\/10\/1024px-Amazon_Web_Services_Logo.svg-480x287.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" class=\"wp-image-410\" \/><\/span><\/div>\n<\/div>\n\n<div class=\"et_pb_column_37 et_pb_column et_pb_column_1_5 et-last-child et_pb_css_mix_blend_mode_passthrough\">\n<div class=\"et_pb_image_9 et_pb_image et_pb_module\"><span class=\"et_pb_image_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybertlabs.com\/wp-content\/uploads\/2023\/03\/SailPoint-logo.svg\" alt=\"SailPoint logo for identity governance and access management\" title=\"SailPoint-logo\" width=\"160\" height=\"64\" sizes=\"(min-width: 0px) and (max-width: 0px) 0px, (min-width: 1px) 160px, 100vw\" class=\"wp-image-579\" \/><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-6","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cybertlabs.com\/wp-json\/wp\/v2\/pages\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybertlabs.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybertlabs.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybertlabs.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybertlabs.com\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":140,"href":"https:\/\/cybertlabs.com\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":1046,"href":"https:\/\/cybertlabs.com\/wp-json\/wp\/v2\/pages\/6\/revisions\/1046"}],"wp:attachment":[{"href":"https:\/\/cybertlabs.com\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}