{"id":330,"date":"2023-03-16T19:40:10","date_gmt":"2023-03-16T19:40:10","guid":{"rendered":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/?page_id=330"},"modified":"2023-04-10T05:50:20","modified_gmt":"2023-04-10T05:50:20","slug":"vulnerability-scanning-remediation","status":"publish","type":"page","link":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/","title":{"rendered":"Vulnerability Scanning &#038; Remediation"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;15078&#8243; parallax_speed_bg=&#8221;1.1&#8243; css=&#8221;.vc_custom_1680993902423{background-position: 0 0;background-repeat: no-repeat !important;}&#8221; el_id=&#8221;Main Header&#8221;][vc_column][vc_empty_space height=&#8221;5rem&#8221;][vc_row_inner el_class=&#8221;container mx-auto md-spacer&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1680220613741{padding-top: 1rem !important;padding-right: 3rem !important;padding-bottom: 1rem !important;padding-left: 3rem !important;background-color: rgba(0,0,0,0.4) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_empty_space height=&#8221;2rem&#8221;][vc_custom_heading text=&#8221;Vulnerability Scanning &amp; Remediation&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;5rem&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; el_class=&#8221;container mx-auto md-spacer&#8221; el_id=&#8221;Intro&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][vc_row_inner el_id=&#8221;Intro Statement&#8221; el_class=&#8221;container mx-auto&#8221;][vc_column_inner][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\">Vulnerability scanning and remediation are critical components of a comprehensive cybersecurity strategy.<\/h3>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;2rem&#8221;][vc_separator color=&#8221;custom&#8221; style=&#8221;shadow&#8221; border_width=&#8221;3&#8243; accent_color=&#8221;#1296d3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; el_class=&#8221;container mx-auto md-spacer&#8221; el_id=&#8221;Content Header&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][vc_row_inner el_id=&#8221;Header Paragraph style&#8221; el_class=&#8221;container mx-auto&#8221;][vc_column_inner][vc_column_text]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>Vulnerability scanning involves the identification and analysis of potential vulnerabilities in an organization\u2019s IT infrastructure, including networks, servers, and applications. This process is typically performed using automated tools that scan for known vulnerabilities and generate reports that highlight any potential weaknesses. Remediation involves taking steps to address the identified vulnerabilities, such as patching software, reconfiguring systems, modifying code in custom built applications, or implementing additional security controls. By utilizing NDM\u2019s vulnerability scanning and remediation services, organizations can proactively identify and mitigate potential security threats, reduce the risk of a data breach or cyber-attack, and ensure compliance with relevant regulations and industry standards. This can help safeguard the organization\u2019s reputation, financial assets, and intellectual property, and improve overall cybersecurity posture. Body: NDM\u2019s Vulnerability Remediation Service offers several benefits to organizations, including:<\/p>\n<\/div>\n<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_sky\"><\/div>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;2rem&#8221;][vc_separator color=&#8221;custom&#8221; style=&#8221;shadow&#8221; border_width=&#8221;3&#8243; accent_color=&#8221;#1296d3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; el_class=&#8221;container mx-auto md-spacer&#8221; el_id=&#8221;Content Header&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][vc_row_inner el_id=&#8221;Header Statement Style&#8221; el_class=&#8221;container mx-auto&#8221;][vc_column_inner][vc_custom_heading text=&#8221;NDM\u2019s Vulnerability Remediation Service offers several benefits to organizations, including:&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; el_class=&#8221;container mx-auto md-spacer&#8221; el_id=&#8221;Info List&#8221;][vc_column css_animation=&#8221;fadeInUp&#8221;][vc_row_inner el_class=&#8221;container mx-auto&#8221; el_id=&#8221;Info List Accordion&#8221;][vc_column_inner][accordion_father active=&#8221;0&#8243; event=&#8221;mouseover&#8221; titlemargin=&#8221;&#8221; iconsize=&#8221;17&#8243; activetabbg=&#8221;#454545&#8243; activetabclr=&#8221;#1296d3&#8243; icon=&#8221;fas fa-angle-down&#8221; activeicon=&#8221;fas fa-angle-right&#8221; caption_url=&#8221;&#8221;][accordion_son borderwidth=&#8221;0px 1px 1px 1px&#8221; borderwidth2=&#8221;1px 1px 1px 1px&#8221; title=&#8221;Increased security:&#8221; bgclr=&#8221;#1296d3&#8243; clr=&#8221;#ffffff&#8221; borderclr2=&#8221;#454545&#8243; borderclr=&#8221;#454545&#8243; bodybg=&#8221;rgba(69,69,69,0.05)&#8221;]By identifying and remediating vulnerabilities, organizations can reduce the risk of a data breach or cyber-attack. This can help safeguard sensitive data, intellectual property, and financial assets. 2. Compliance: Many regulatory requirements and industry standards mandate that organizations maintain a secure IT infrastructure. Vulnerability remediation services can help organizations ensure compliance with these requirements and avoid costly fines and legal action.[\/accordion_son][accordion_son borderwidth=&#8221;0px 1px 1px 1px&#8221; borderwidth2=&#8221;1px 1px 1px 1px&#8221; title=&#8221;Reduced downtime:&#8221; bgclr=&#8221;#1296d3&#8243; clr=&#8221;#ffffff&#8221; borderclr2=&#8221;#454545&#8243; borderclr=&#8221;#454545&#8243; bodybg=&#8221;rgba(69,69,69,0.05)&#8221;]Vulnerability remediation can help reduce the risk of downtime caused by cyber-attacks, system failures, or other security incidents. This can help organizations maintain business continuity and minimize financial losses.[\/accordion_son][accordion_son borderwidth=&#8221;0px 1px 1px 1px&#8221; borderwidth2=&#8221;1px 1px 1px 1px&#8221; title=&#8221;Improved efficiency:&#8221; bgclr=&#8221;#1296d3&#8243; clr=&#8221;#ffffff&#8221; borderclr2=&#8221;#454545&#8243; borderclr=&#8221;#454545&#8243; bodybg=&#8221;rgba(69,69,69,0.05)&#8221;]Vulnerability remediation services can help organizations streamline their security operations by automating vulnerability scans, prioritizing remediation efforts, and providing clear reporting and metrics.[\/accordion_son][accordion_son borderwidth=&#8221;0px 1px 1px 1px&#8221; borderwidth2=&#8221;1px 1px 1px 1px&#8221; title=&#8221;Expertise:&#8221; bgclr=&#8221;#1296d3&#8243; clr=&#8221;#ffffff&#8221; borderclr2=&#8221;#454545&#8243; borderclr=&#8221;#454545&#8243; bodybg=&#8221;rgba(69,69,69,0.05)&#8221;]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>Vulnerability remediation services are typically provided by experienced cybersecurity professionals who are well-versed in the latest security threats and best practices. By engaging these services, organizations can leverage this expertise to improve their overall security posture and reduce the risk of cyber-attacks. Overall, a vulnerability remediation service by NDM can help organizations proactively address potential security threats, maintain compliance with regulatory requirements and industry standards, and improve their overall cybersecurity posture.<\/p>\n<\/div>\n<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_sky\"><\/div>\n<p>[\/accordion_son][\/accordion_father][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;2rem&#8221;][vc_separator color=&#8221;custom&#8221; style=&#8221;shadow&#8221; border_width=&#8221;3&#8243; accent_color=&#8221;#1296d3&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; el_class=&#8221;container mx-auto md-spacer&#8221; el_id=&#8221;Contact Section&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][vc_row_inner el_id=&#8221;Contact Us Statement&#8221;][vc_column_inner][vc_column_text]<\/p>\n<p style=\"text-align: center;\">If you would like more information on this service, contact us today!<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;2rem&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column css_animation=&#8221;flipInY&#8221;][vc_row_inner el_id=&#8221;Contact Button&#8221; el_class=&#8221;container mx-auto&#8221;][vc_column_inner][mvc_advanced_button align=&#8221;center&#8221; btn_animation=&#8221;button&#8211;winona&#8221; btn_text=&#8221;Contact Us!&#8221; btn_text2=&#8221;Let&#8217;s Talk!&#8221; btn_shadow=&#8221;shadow&#8221; use_theme_fonts=&#8221;yes&#8221; btn_icon=&#8221;far fa-envelope&#8221; btn_clr=&#8221;#ffffff&#8221; btn_bg=&#8221;#1296d3&#8243; btn_hvrclr=&#8221;#1296d3&#8243; btn_hvrbg=&#8221;#ffffff&#8221; btn_radius=&#8221;3&#8243; btn_url=&#8221;url:https%3A%2F%2Fwww.ccreativellc.com%2Fclients%2Fndmtechstg%2Fabout%2Fcontact-us%2F|title:Contact%20Us&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column][vc_row_inner el_id=&#8221;Divider&#8221; el_class=&#8221;container mx-auto&#8221;][vc_column_inner][vc_empty_space height=&#8221;2rem&#8221;][vc_separator color=&#8221;custom&#8221; style=&#8221;shadow&#8221; border_width=&#8221;3&#8243; accent_color=&#8221;#1296d3&#8243;][vc_empty_space height=&#8221;3rem&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_id=&#8221;END OF PASTE CONTENT&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] [\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;15078&#8243; parallax_speed_bg=&#8221;1.1&#8243; css=&#8221;.vc_custom_1680993902423{background-position: 0 0;background-repeat: no-repeat !important;}&#8221; el_id=&#8221;Main Header&#8221;][vc_column][vc_empty_space height=&#8221;5rem&#8221;][vc_row_inner el_class=&#8221;container mx-auto md-spacer&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1680220613741{padding-top: 1rem !important;padding-right: 3rem !important;padding-bottom: 1rem !important;padding-left: 3rem !important;background-color: rgba(0,0,0,0.4) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_empty_space height=&#8221;2rem&#8221;][vc_custom_heading text=&#8221;Vulnerability Scanning &amp; Remediation&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;5rem&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; el_class=&#8221;container mx-auto md-spacer&#8221; el_id=&#8221;Intro&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][vc_row_inner el_id=&#8221;Intro Statement&#8221; el_class=&#8221;container mx-auto&#8221;][vc_column_inner][vc_column_text] Vulnerability scanning and remediation [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":310,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Scanning &amp; Remediation - NDM<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Scanning &amp; Remediation - NDM\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text] [\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;15078&#8243; parallax_speed_bg=&#8221;1.1&#8243; css=&#8221;.vc_custom_1680993902423{background-position: 0 0;background-repeat: no-repeat !important;}&#8221; el_id=&#8221;Main Header&#8221;][vc_column][vc_empty_space height=&#8221;5rem&#8221;][vc_row_inner el_class=&#8221;container mx-auto md-spacer&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1680220613741{padding-top: 1rem !important;padding-right: 3rem !important;padding-bottom: 1rem !important;padding-left: 3rem !important;background-color: rgba(0,0,0,0.4) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_empty_space height=&#8221;2rem&#8221;][vc_custom_heading text=&#8221;Vulnerability Scanning &amp; Remediation&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;5rem&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; el_class=&#8221;container mx-auto md-spacer&#8221; el_id=&#8221;Intro&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][vc_row_inner el_id=&#8221;Intro Statement&#8221; el_class=&#8221;container mx-auto&#8221;][vc_column_inner][vc_column_text] Vulnerability scanning and remediation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/\" \/>\n<meta property=\"og:site_name\" content=\"NDM\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-10T05:50:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/\",\"url\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/\",\"name\":\"Vulnerability Scanning & Remediation - NDM\",\"isPartOf\":{\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#website\"},\"datePublished\":\"2023-03-16T19:40:10+00:00\",\"dateModified\":\"2023-04-10T05:50:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security\",\"item\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Vulnerability Scanning &#038; Remediation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#website\",\"url\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/\",\"name\":\"NDM\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Scanning & Remediation - NDM","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Vulnerability Scanning & Remediation - NDM","og_description":"[vc_row][vc_column][vc_column_text] [\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;15078&#8243; parallax_speed_bg=&#8221;1.1&#8243; css=&#8221;.vc_custom_1680993902423{background-position: 0 0;background-repeat: no-repeat !important;}&#8221; el_id=&#8221;Main Header&#8221;][vc_column][vc_empty_space height=&#8221;5rem&#8221;][vc_row_inner el_class=&#8221;container mx-auto md-spacer&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1680220613741{padding-top: 1rem !important;padding-right: 3rem !important;padding-bottom: 1rem !important;padding-left: 3rem !important;background-color: rgba(0,0,0,0.4) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_empty_space height=&#8221;2rem&#8221;][vc_custom_heading text=&#8221;Vulnerability Scanning &amp; Remediation&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;5rem&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; el_class=&#8221;container mx-auto md-spacer&#8221; el_id=&#8221;Intro&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][vc_row_inner el_id=&#8221;Intro Statement&#8221; el_class=&#8221;container mx-auto&#8221;][vc_column_inner][vc_column_text] Vulnerability scanning and remediation [&hellip;]","og_url":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/","og_site_name":"NDM","article_modified_time":"2023-04-10T05:50:20+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/","url":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/","name":"Vulnerability Scanning & Remediation - NDM","isPartOf":{"@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#website"},"datePublished":"2023-03-16T19:40:10+00:00","dateModified":"2023-04-10T05:50:20+00:00","breadcrumb":{"@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/vulnerability-scanning-remediation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/"},{"@type":"ListItem","position":3,"name":"Cyber Security","item":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/services\/cyber-security\/"},{"@type":"ListItem","position":4,"name":"Vulnerability Scanning &#038; Remediation"}]},{"@type":"WebSite","@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#website","url":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/","name":"NDM","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/pages\/330"}],"collection":[{"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":7,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/pages\/330\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/pages\/330\/revisions\/453"}],"up":[{"embeddable":true,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/pages\/310"}],"wp:attachment":[{"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/media?parent=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}