{"id":1902,"date":"2026-01-16T12:50:24","date_gmt":"2026-01-16T12:50:24","guid":{"rendered":"https:\/\/smartnet.ua\/services\/network-infrastructure-protection\/"},"modified":"2026-01-29T19:25:38","modified_gmt":"2026-01-29T19:25:38","slug":"network-infrastructure-protection","status":"publish","type":"page","link":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/","title":{"rendered":"Network infrastructure protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1902\" class=\"elementor elementor-1902 elementor-1536\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-dce-background-color=\"#F8AB49\" data-dce-background-overlay-color=\"#FFFFFF69\" data-dce-background-image-url=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2026\/01\/bg-abstract_top2.svg\" class=\"elementor-element elementor-element-d1daafc e-flex e-con-boxed e-con e-parent\" data-id=\"d1daafc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div data-dce-text-color=\"#000000\" class=\"elementor-element elementor-element-4f778ad elementor-widget-divider--view-line_text elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"4f778ad\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0194ca e-flex e-con-boxed e-con e-parent\" data-id=\"f0194ca\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e994250 e-con-full e-flex e-con e-child\" data-id=\"e994250\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1a8b9f elementor-hidden-mobile dce_masking-none elementor-widget elementor-widget-image\" data-id=\"e1a8b9f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"407\" height=\"348\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/11.svg\" class=\"attachment-full size-full wp-image-1172\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38a1866 e-con-full e-flex e-con e-child\" data-id=\"38a1866\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0c9ca66 e-con-full e-flex e-con e-child\" data-id=\"0c9ca66\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1cc7cc elementor-widget elementor-widget-menu-anchor\" data-id=\"c1cc7cc\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"network-segmentation-and-micro-segmentation\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4029a73 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget elementor-widget-divider\" data-id=\"4029a73\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tServices\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c0d02a elementor-widget elementor-widget-heading\" data-id=\"2c0d02a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network segmentation and microsegmentation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e734bbb elementor-hidden-desktop elementor-hidden-tablet dce_masking-none elementor-widget elementor-widget-image\" data-id=\"e734bbb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"407\" height=\"348\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/11.svg\" class=\"attachment-full size-full wp-image-1172\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd69cda custom-list elementor-widget elementor-widget-text-editor\" data-id=\"fd69cda\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>A new approach to the most popular information security risk reduction tool: micro- and target segmentation based on different trust levels and high-performance advanced security.<\/p><p>Organizations can intelligently segment network and infrastructure assets regardless of their location, whether on-premises or across multiple clouds. Dynamic and granular access control is established by constantly monitoring trust levels and adapting security policies accordingly. A high-performance, advanced security system isolates critical IT resources, ensuring rapid threat detection and prevention using advanced analytics and automation.  <\/p><p>Intent-based segmentation, based on physical and virtual cutting-edge technologies, provides end-to-end segmentation that extends networks and geographic boundaries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e3274a6 e-con-full e-flex e-con e-child\" data-id=\"e3274a6\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-533f1bc e-con-full e-flex e-con e-child\" data-id=\"533f1bc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3261c4f dce_masking-none elementor-widget elementor-widget-image\" data-id=\"3261c4f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/competencies_2.svg\" class=\"attachment-full size-full wp-image-1114\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0aec4b3 e-con-full e-flex e-con e-child\" data-id=\"0aec4b3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0fedbeb custom-list elementor-widget elementor-widget-text-editor\" data-id=\"0fedbeb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Composition:<\/p><ul><li>Firewalls<\/li><li>IPS<\/li><li>Crypto VPN<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#FF660000\" class=\"elementor-element elementor-element-7ba04b0 elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"7ba04b0\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MTgyMiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Write to us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ffbed8 e-flex e-con-boxed e-con e-parent\" data-id=\"2ffbed8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8d41a25 e-con-full e-flex e-con e-child\" data-id=\"8d41a25\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6d6b31c e-con-full e-flex e-con e-child\" data-id=\"6d6b31c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3fcdb9 elementor-widget elementor-widget-menu-anchor\" data-id=\"d3fcdb9\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"centralized-monitoring-and-management\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba64d0b elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget elementor-widget-divider\" data-id=\"ba64d0b\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tServices\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91a30c8 elementor-widget elementor-widget-heading\" data-id=\"91a30c8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monitoring and centralized management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6989a28 elementor-hidden-desktop elementor-hidden-tablet dce_masking-none elementor-widget elementor-widget-image\" data-id=\"6989a28\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"375\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/10.svg\" class=\"attachment-full size-full wp-image-1170\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99f10ac custom-list elementor-widget elementor-widget-text-editor\" data-id=\"99f10ac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As companies grow, so does the number of network and security devices. This in turn creates challenges in managing a large fleet of devices, collecting information about security events, and conducting analysis. These challenges are primarily related to the lack of resources for security teams to adequately respond to increasingly sophisticated cyber threats.  <\/p><p>The obvious solution to this problem is to centralize the network and security management functions (NOC-SOC). By implementing centralized network management, security, and analytics collection devices within the company. Centralizing management and analytics helps companies optimize and automate security, gain greater awareness of security processes and events, and reduce threat response time.  <\/p><p>Advantages:<\/p><ul><li>Centralized device management. A single console to manage all switches, wireless infrastructure and endpoints <\/li><li>Centralized management of policies and objects. Quickly create and modify policies\/objects <\/li><li>Detailed change tracking and thorough auditing capabilities<\/li><li>Automation \u2013 templates and scripts to automate device provisioning and policy setup using JSON or XML APIs<\/li><li>Granular administration based on devices and roles<\/li><li>Centralized software and security updates for managed devices<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#FF660000\" class=\"elementor-element elementor-element-bb895be elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"bb895be\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MTgyMiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Write to us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2ec976 e-con-full e-flex e-con e-child\" data-id=\"a2ec976\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-062fcd1 elementor-hidden-mobile dce_masking-none elementor-widget elementor-widget-image\" data-id=\"062fcd1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"375\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/10.svg\" class=\"attachment-full size-full wp-image-1170\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f17997 e-flex e-con-boxed e-con e-parent\" data-id=\"5f17997\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a814dae e-con-full e-flex e-con e-child\" data-id=\"a814dae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d79079 elementor-hidden-mobile dce_masking-none elementor-widget elementor-widget-image\" data-id=\"3d79079\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"346\" height=\"340\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/9.svg\" class=\"attachment-full size-full wp-image-1168\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6bc8cc e-con-full e-flex e-con e-child\" data-id=\"f6bc8cc\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-93fa38b e-con-full e-flex e-con e-child\" data-id=\"93fa38b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8815a06 elementor-widget elementor-widget-menu-anchor\" data-id=\"8815a06\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"next-generation-firewall\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06a830c elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget elementor-widget-divider\" data-id=\"06a830c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tServices\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1669530 elementor-widget elementor-widget-heading\" data-id=\"1669530\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Next Generation Firewall (NGFW)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-950c0f0 elementor-hidden-desktop elementor-hidden-tablet dce_masking-none elementor-widget elementor-widget-image\" data-id=\"950c0f0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"346\" height=\"340\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/9.svg\" class=\"attachment-full size-full wp-image-1168\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41c84f8 custom-list elementor-widget elementor-widget-text-editor\" data-id=\"41c84f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Traditional firewalls and point-based security solutions lack the features and capabilities needed today to reliably protect organizations from new, complex threats. It is important to consider that any security breach incident can lead to downtime, lost opportunities, and loss of trust in your business. <\/p><p>We offer next-generation enterprise network protection that supports flexible, scalable deployment anywhere in the network \u2013 from branch offices to headquarters, from data centers to internal segments and cloud deployments. Next-generation firewalls provide automatic security event tracking for cloud applications, IoT devices, and can also be used as a centralized monitoring system. The implementation of this solution works without compromising the performance of the enterprise network.  <\/p><p>Advantages:<\/p><ul><li>High degree of integration of advanced technologies in one device<\/li><li>Monitoring, controlling and prioritizing threats<\/li><li>Detect, recognize and block malware and new threats<\/li><li>Minimizing false positives<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#FF660000\" class=\"elementor-element elementor-element-8fbf5fd elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"8fbf5fd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MTgyMiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Write to us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe56557 e-flex e-con-boxed e-con e-parent\" data-id=\"fe56557\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b6b53b e-con-full e-flex e-con e-child\" data-id=\"7b6b53b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d6dd20a e-con-full e-flex e-con e-child\" data-id=\"d6dd20a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe7f784 elementor-widget elementor-widget-menu-anchor\" data-id=\"fe7f784\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"unified-threat-management\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09df0f4 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget elementor-widget-divider\" data-id=\"09df0f4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tServices\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb4fb4c elementor-widget elementor-widget-heading\" data-id=\"bb4fb4c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unified threat management (UTM)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cce73d elementor-hidden-desktop elementor-hidden-tablet dce_masking-none elementor-widget elementor-widget-image\" data-id=\"5cce73d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"346\" height=\"362\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/7.svg\" class=\"attachment-full size-full wp-image-1164\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d0f6fd custom-list elementor-widget elementor-widget-text-editor\" data-id=\"0d0f6fd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Limited budgets for securing a company\u2019s IT assets are a common problem for companies. Having multiple separate devices, each designed to perform specialized functions such as spam filtering or antivirus protection, doesn\u2019t make the task any easier, increasing the cost and complexity of management. <\/p><p>The development of the Internet of Things and the use of public clouds are blurring the traditional network perimeter and opening up opportunities for hackers to create new hacking strategies. These trends are forcing the use of more complex and expensive comprehensive IT security solutions. <\/p><p>To combat these security issues, we propose implementing Unified Threat Management (UTM) in conjunction with a next-generation NGFW firewall. The goal of such UTM systems is to provide the most complete set of security features and utilities (antivirus, antispam, content filtering, and web filtering) in a single device to maximize the overlap of possible attack vectors and methods, both external and internal. <\/p><p>Advantages:<\/p><ul><li>Protection against viruses, malware and attachments<\/li><li>Preventing information attacks<\/li><li>Improved web filtering<\/li><li>Automatic update<\/li><li>Single management console<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#FF660000\" class=\"elementor-element elementor-element-80c969a elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"80c969a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MTgyMiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Write to us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e154c6d e-con-full e-flex e-con e-child\" data-id=\"e154c6d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed99bf1 elementor-hidden-mobile dce_masking-none elementor-widget elementor-widget-image\" data-id=\"ed99bf1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"346\" height=\"362\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/7.svg\" class=\"attachment-full size-full wp-image-1164\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9b499b e-flex e-con-boxed e-con e-parent\" data-id=\"c9b499b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f538149 e-con-full e-flex e-con e-child\" data-id=\"f538149\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ae7cec elementor-hidden-mobile dce_masking-none elementor-widget elementor-widget-image\" data-id=\"5ae7cec\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"398\" height=\"368\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2023\/10\/8.svg\" class=\"attachment-full size-full wp-image-1336\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-702477b e-con-full e-flex e-con e-child\" data-id=\"702477b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4d8fc6c e-con-full e-flex e-con e-child\" data-id=\"4d8fc6c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8404fdb elementor-widget elementor-widget-menu-anchor\" data-id=\"8404fdb\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"encrypted-traffic-inspection\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1911aa4 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget elementor-widget-divider\" data-id=\"1911aa4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tServices\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9526f1 elementor-widget elementor-widget-heading\" data-id=\"d9526f1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inspection of encrypted traffic<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bdd55d elementor-hidden-desktop elementor-hidden-tablet dce_masking-none elementor-widget elementor-widget-image\" data-id=\"2bdd55d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"398\" height=\"368\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2023\/10\/8.svg\" class=\"attachment-full size-full wp-image-1336\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2c3d00 custom-list elementor-widget elementor-widget-text-editor\" data-id=\"f2c3d00\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The ever-increasing volume of HTTPS traffic creates new threats and opens up new opportunities for the leakage of confidential information. All of these threats can be hidden from the visibility of security devices by being encrypted with the SSL protocol. <\/p><p>Enabling the Deep Data Inspection (DPI) feature allows you to analyze encrypted SSL traffic for threats, which radically increases the security of IT assets.<\/p><p>SSL inspection is typically performed by NGFW\/UTM devices at the perimeter of the network being protected. The inspection is performed according to a set of rules that define the type of SSL traffic being analyzed and its security criteria. The analysis is performed using UTM software components that support the inspection of encrypted traffic, namely: application control, URL filtering, IPS, DLP, antivirus and antibotnet.  <\/p><p>Advantages:<\/p><ul><li>Protection against leakage of confidential information<\/li><li>Detection and control of unwanted connections and malicious code<\/li><li>Detection and control of network activity of unwanted programs<\/li><li>Verification and analysis of encrypted traffic<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#FF660000\" class=\"elementor-element elementor-element-6ea9e96 elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"6ea9e96\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MTgyMiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Write to us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34e0801 e-flex e-con-boxed e-con e-parent\" data-id=\"34e0801\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5addd19 e-con-full e-flex e-con e-child\" data-id=\"5addd19\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a8780d8 e-con-full e-flex e-con e-child\" data-id=\"a8780d8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f464c38 elementor-widget elementor-widget-menu-anchor\" data-id=\"f464c38\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"confidential-information-leakage-prevention\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85fff4e elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget elementor-widget-divider\" data-id=\"85fff4e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tServices\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4fb4bb elementor-widget elementor-widget-heading\" data-id=\"f4fb4bb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protection against leakage of confidential information<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83c863e elementor-hidden-desktop elementor-hidden-tablet dce_masking-none elementor-widget elementor-widget-image\" data-id=\"83c863e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"318\" height=\"349\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2021\/10\/6.svg\" class=\"attachment-full size-full wp-image-1262\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6779e42 custom-list elementor-widget elementor-widget-text-editor\" data-id=\"6779e42\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>For every enterprise, the issue of protecting against the leakage of valuable information, which can occur either as a result of a targeted attack or due to employee negligence, is acute. However, statistics show that more than 80% of incidents related to data theft are caused by internal events, the sources of which are legal users of the company, when most traditional security tools are aimed only at protecting against external threats. <\/p><p>To eliminate the threat of theft of valuable information, you should use a DLP (Data Loss \/ Leakage Prevention) system. These are hardware and software technologies that monitor the most likely leakage channels and identify data by degree of confidentiality. <\/p><p>Advantages:<\/p><ul><li>Monitoring and blocking incoming and outgoing messages from employees<\/li><li>Monitoring and blocking sending files to external media<\/li><li>Monitoring and control of network information storage and web resources<\/li><li>Control of voice and text messages transmitted via SIP protocol<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#FF660000\" class=\"elementor-element elementor-element-05acbbc elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"05acbbc\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MTgyMiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Write to us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7062222 e-con-full e-flex e-con e-child\" data-id=\"7062222\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3162b elementor-hidden-mobile dce_masking-none elementor-widget elementor-widget-image\" data-id=\"2f3162b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"318\" height=\"349\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2021\/10\/6.svg\" class=\"attachment-full size-full wp-image-1262\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ff9be4 e-flex e-con-boxed e-con e-parent\" data-id=\"9ff9be4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bffc6d5 e-con-full e-flex e-con e-child\" data-id=\"bffc6d5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b367512 elementor-hidden-mobile dce_masking-none elementor-widget elementor-widget-image\" data-id=\"b367512\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"346\" height=\"362\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/7.svg\" class=\"attachment-full size-full wp-image-1164\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6b0057 e-con-full e-flex e-con e-child\" data-id=\"b6b0057\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-34c99e6 e-con-full e-flex e-con e-child\" data-id=\"34c99e6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad32df1 elementor-widget elementor-widget-menu-anchor\" data-id=\"ad32df1\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"two-factor-authentication-solution\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f2c979 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget elementor-widget-divider\" data-id=\"4f2c979\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tServices\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93b325d elementor-widget elementor-widget-heading\" data-id=\"93b325d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementing two-factor authentication solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ba12ca elementor-hidden-desktop elementor-hidden-tablet dce_masking-none elementor-widget elementor-widget-image\" data-id=\"8ba12ca\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"358\" height=\"377\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/5.svg\" class=\"attachment-full size-full wp-image-1160\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c05d4c custom-list elementor-widget elementor-widget-text-editor\" data-id=\"7c05d4c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Due to the widespread use of malware and phishing sites that can easily intercept complex passwords, a single-factor password authentication system is not able to provide secure access to corporate resources. For additional protection, it is necessary to use a two-factor authentication solution to verify the identity of users. <\/p><p>We offer modern two-factor authentication systems that eliminate the shortcomings of the classic password system. The first factor of such a system remains the login and password, and the second is a one-time limited-time access code in the form of a smart message, which is randomly generated and cannot be intercepted. This allows you to reliably protect data from attackers.  <\/p><p>Advantages:<\/p><ul><li>Intuitive, centralized authentication and authorization services<\/li><li>Two-factor authentication and token management<\/li><li>Single sign-on (SSO) for web\/cloud and network resources<\/li><li>Managing guest access, BYOD, and certificates<\/li><li>Ease of deployment and licensing<\/li><li>Integration with secure directories<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#FF660000\" class=\"elementor-element elementor-element-06fed3e elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"06fed3e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MTgyMiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Write to us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a1cd9e e-flex e-con-boxed e-con e-parent\" data-id=\"6a1cd9e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d678d54 e-con-full e-flex e-con e-child\" data-id=\"d678d54\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-23b3553 e-con-full e-flex e-con e-child\" data-id=\"23b3553\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9ecc23 elementor-widget elementor-widget-menu-anchor\" data-id=\"d9ecc23\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"local-area-networking-and-remote-access\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da34fe5 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget elementor-widget-divider\" data-id=\"da34fe5\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tServices\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9c02e4 elementor-widget elementor-widget-heading\" data-id=\"d9c02e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Local area network aggregation and remote access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad7b34a elementor-hidden-desktop elementor-hidden-tablet dce_masking-none elementor-widget elementor-widget-image\" data-id=\"ad7b34a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"435\" height=\"406\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/4.svg\" class=\"attachment-full size-full wp-image-1158\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-633b070 custom-list elementor-widget elementor-widget-text-editor\" data-id=\"633b070\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Maintaining a single, transparent security policy and appropriate access control for users, software, and network resources, regardless of their location, in a corporate environment is an important aspect of information security.<\/p><p>We develop solutions for building secure networks of any complexity. We take into account the principles of mutual authentication and confidentiality to ensure the security of data and business processes in unsecured networks. <\/p><p>Advantages:<\/p><ul><li>Various VPNs based on IPsec or SSL<\/li><li>Unified management for efficient control of crypto-VPN, routing, and firewalls<\/li><li>Hardware encryption support<\/li><li>Comprehensive data transfer security: &#8220;application-application&#8221;, &#8220;user-user&#8221;, &#8220;user-machine&#8221;, &#8220;machine-machine&#8221;<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#FF660000\" class=\"elementor-element elementor-element-dd31aa2 elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"dd31aa2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MTgyMiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Write to us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-abd60a2 e-con-full e-flex e-con e-child\" data-id=\"abd60a2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5b7898 elementor-hidden-mobile dce_masking-none elementor-widget elementor-widget-image\" data-id=\"b5b7898\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"435\" height=\"406\" src=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/4.svg\" class=\"attachment-full size-full wp-image-1158\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9af19f2 e-con-full e-flex e-con e-parent\" data-id=\"9af19f2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffcada8 elementor-widget elementor-widget-template\" data-id=\"ffcada8\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"1828\" class=\"elementor elementor-1828 elementor-1513\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div data-dce-background-color=\"#2A2427\" data-dce-background-overlay-color=\"#2A2427\" data-dce-background-image-url=\"https:\/\/smartnet.ua\/wp-content\/uploads\/2026\/01\/bg-abstract_footer.svg\" class=\"elementor-element elementor-element-6a43bdad e-flex e-con-boxed e-con e-parent\" data-id=\"6a43bdad\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;background_motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.1,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-64352af2 e-con-full e-flex e-con e-child\" data-id=\"64352af2\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-text-color=\"#EBEBEB\" class=\"elementor-element elementor-element-6765b42d elementor-widget-divider--view-line_text elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"6765b42d\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tFeedback\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-title-color=\"#FFFFFF\" class=\"elementor-element elementor-element-5edf06ad elementor-widget elementor-widget-heading\" data-id=\"5edf06ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">For more information, contact us.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-611ae120 elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"611ae120\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;dce_confirm_dialog_enabled&quot;:&quot;no&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;,&quot;label_icon_size&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;field_icon_size&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"1828\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"611ae120\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Smartnet\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-33\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-33 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tE-mail address\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"E-mail address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_d7c9682 elementor-col-33\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_d7c9682\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tPhone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_d7c9682]\" id=\"form-field-field_d7c9682\" class=\"elementor-field elementor-size-md  elementor-field-textual\" placeholder=\"Phone\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tYour message\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-md\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" placeholder=\"Your message\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Send<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Services Network segmentation and microsegmentation A new approach to the most popular information security risk reduction tool: micro- and target [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1847,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1902","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network infrastructure protection - Smartnet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network infrastructure protection - Smartnet\" \/>\n<meta property=\"og:description\" content=\"Services Network segmentation and microsegmentation A new approach to the most popular information security risk reduction tool: micro- and target [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Smartnet\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T19:25:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/\",\"url\":\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/\",\"name\":\"Network infrastructure protection - Smartnet\",\"isPartOf\":{\"@id\":\"https:\/\/smartnet.ua\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/11.svg\",\"datePublished\":\"2026-01-16T12:50:24+00:00\",\"dateModified\":\"2026-01-29T19:25:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#primaryimage\",\"url\":\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/11.svg\",\"contentUrl\":\"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/11.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/smartnet.ua\/en\/network-security-solutions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/smartnet.ua\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network infrastructure protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/smartnet.ua\/#website\",\"url\":\"https:\/\/smartnet.ua\/\",\"name\":\"Smartnet\",\"description\":\"\u0420\u0456\u0448\u0435\u043d\u043d\u044f \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438\",\"publisher\":{\"@id\":\"https:\/\/smartnet.ua\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/smartnet.ua\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/smartnet.ua\/#organization\",\"name\":\"Smartnet\",\"url\":\"https:\/\/smartnet.ua\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/smartnet.ua\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/smartnet.ua\/wp-content\/uploads\/2026\/01\/logo.svg\",\"contentUrl\":\"https:\/\/smartnet.ua\/wp-content\/uploads\/2026\/01\/logo.svg\",\"width\":299,\"height\":157,\"caption\":\"Smartnet\"},\"image\":{\"@id\":\"https:\/\/smartnet.ua\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network infrastructure protection - Smartnet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/","og_locale":"en_US","og_type":"article","og_title":"Network infrastructure protection - Smartnet","og_description":"Services Network segmentation and microsegmentation A new approach to the most popular information security risk reduction tool: micro- and target [&hellip;]","og_url":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/","og_site_name":"Smartnet","article_modified_time":"2026-01-29T19:25:38+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/","url":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/","name":"Network infrastructure protection - Smartnet","isPartOf":{"@id":"https:\/\/smartnet.ua\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#primaryimage"},"image":{"@id":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/11.svg","datePublished":"2026-01-16T12:50:24+00:00","dateModified":"2026-01-29T19:25:38+00:00","breadcrumb":{"@id":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#primaryimage","url":"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/11.svg","contentUrl":"https:\/\/smartnet.ua\/wp-content\/uploads\/2019\/12\/11.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/smartnet.ua\/en\/services\/network-infrastructure-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/smartnet.ua\/en\/network-security-solutions\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/smartnet.ua\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Network infrastructure protection"}]},{"@type":"WebSite","@id":"https:\/\/smartnet.ua\/#website","url":"https:\/\/smartnet.ua\/","name":"Smartnet","description":"\u0420\u0456\u0448\u0435\u043d\u043d\u044f \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438","publisher":{"@id":"https:\/\/smartnet.ua\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartnet.ua\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/smartnet.ua\/#organization","name":"Smartnet","url":"https:\/\/smartnet.ua\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartnet.ua\/#\/schema\/logo\/image\/","url":"https:\/\/smartnet.ua\/wp-content\/uploads\/2026\/01\/logo.svg","contentUrl":"https:\/\/smartnet.ua\/wp-content\/uploads\/2026\/01\/logo.svg","width":299,"height":157,"caption":"Smartnet"},"image":{"@id":"https:\/\/smartnet.ua\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/pages\/1902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/comments?post=1902"}],"version-history":[{"count":1,"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/pages\/1902\/revisions"}],"predecessor-version":[{"id":1903,"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/pages\/1902\/revisions\/1903"}],"up":[{"embeddable":true,"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/pages\/1847"}],"wp:attachment":[{"href":"https:\/\/smartnet.ua\/en\/wp-json\/wp\/v2\/media?parent=1902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}