{"id":202,"date":"2016-06-26T19:58:13","date_gmt":"2016-06-26T19:58:13","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?page_id=202"},"modified":"2023-04-28T01:48:59","modified_gmt":"2023-04-28T01:48:59","slug":"managed-services","status":"publish","type":"page","link":"https:\/\/itegriti.com\/kw022024\/managed-services\/","title":{"rendered":"Managed Services"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-bottom:-40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\">\t\t\t\t\t<div class=\"fusion-slider-container fusion-slider-sc-managed-services fusion-slider-11 full-width-slider\" style=\"height:300px; max-width:100%;\" data-id=\"11\" data-full_height=\"\">\n\t\t\t\t\t\t<style type=\"text\/css\">.fusion-slider-11 .flex-direction-nav a {width:63px;height:63px;line-height:63px;font-size:25px;}<\/style>\t\t\t\t\t\t<div class=\"fusion-slider-loading\">Loading...<\/div>\n\t\t\t\t\t\t<div class=\"tfs-slider flexslider main-flex full-width-slider\" data-slider_width=\"100%\" data-slider_height=\"300px\" data-full_screen=\"0\" data-parallax=\"0\" data-nav_arrows=\"0\" data-nav_box_width=\"63px\" data-nav_box_height=\"63px\" data-nav_arrow_size=\"25px\" data-pagination_circles=\"0\" data-autoplay=\"0\" data-loop=\"0\" data-animation=\"fade\" data-slideshow_speed=\"7000\" data-animation_speed=\"600\" data-typo_sensitivity=\"1\" data-typo_factor=\"1.5\" style=\"max-width:100%;\">\n\t\t\t\t\t\t\t<ul class=\"slides\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li data-mute=\"yes\" data-loop=\"yes\" data-autoplay=\"yes\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"slide-content-container slide-content-left\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide-content\" style=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"heading \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-title-sc-wrapper\" style=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#fff;--awb-margin-bottom:0px;--awb-sep-color:#fff;--awb-font-size:50px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:50;line-height:1.2;\">Managed Services<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"caption \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-title-sc-wrapper\" style=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#fff;--awb-margin-bottom:0px;--awb-sep-color:#fff;--awb-font-size:34px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:34;line-height:1.2;\">Providing assistance and expert oversight with leveraged resources<\/h3><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"background background-image lazyload\" style=\"background-image:inherit;max-width:100%;height:300px;filter: progid:DXImageTransform.Microsoft.AlphaImageLoader(src='https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti_managed_services_hdr.jpg', sizingMethod='scale');\" data-imgwidth=\"1950\" data-bg-image=\"url(https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/04\/itegriti_managed_services_hdr.jpg)\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#f4f4f4;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-large button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type fusion-has-button-gradient\" style=\"--button_accent_color:#002868;--button_border_color:#ffaa22;--button_accent_hover_color:#002868;--button_border_hover_color:#ffaa22;--button_border_width-top:1px;--button_border_width-right:1px;--button_border_width-bottom:1px;--button_border_width-left:1px;--button-border-radius-top-left:3px;--button-border-radius-top-right:3px;--button-border-radius-bottom-right:3px;--button-border-radius-bottom-left:3px;--button_gradient_top_color:#ffed64;--button_gradient_bottom_color:#ffaa22;--button_gradient_top_color_hover:#ffaa22;--button_gradient_bottom_color_hover:#ffed64;--button_margin-top:10px;--button_margin-bottom:10px;\" target=\"_self\" href=\"\/contact\/\"><span class=\"fusion-button-text\">CONTACT US<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #000000;\">Effective cybersecurity and compliance programs rely on key functional support from security and compliance managers having specific roles and experience. These professionals are in high-demand and not all organizations are staffed to meet these needs, while others divide and distribute tasks across many resources. This approach most often creates environments where management has no access to timely and accurate information on the effectiveness of their cybersecurity or compliance programs.<\/span><\/p>\n<p><span style=\"color: #000000;\">By establishing a key set of necessary tasks and developing a model where organizations can select services to meet their specific need and budget, ITEGRITI can provide ongoing compliance and cybersecurity advisory through our Virtual support models:  CISO Advisory Services, vCompliance Team, and Workforce Support. Our fractional resource models are very cost effective.<\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><h3 style=\"text-align: center;\"><span style=\"color: #002868;\">How We Help Clients<\/span><\/h3>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-animated\" style=\"--awb-bg-size:cover;width:30.6666%; margin-right: 4%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\"><h4 class=\"p1\" style=\"text-align: center;\"><span style=\"color: #002868;\"><strong><span class=\"s1\">CISO Advisory Services<\/span><\/strong><\/span><\/h4>\n<\/div><ul style=\"--awb-iconcolor:#002868;--awb-line-height:23.8px;--awb-icon-width:23.8px;--awb-icon-height:23.8px;--awb-icon-margin:9.8px;--awb-content-margin:33.6px;--awb-circlecolor:rgba(255,255,255,0);--awb-circle-yes-font-size:12.32px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Strategic planning, governance, and oversight<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Align security initiatives with business risks and objectives<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Technology advisory and steering committee \u2013 cybersecurity<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Impact analysis and planning \u2013 cybersecurity<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Technology and program reviews for M&amp;A support<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>External, independent IT audits (ITGC, etc.)<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-one-third fusion-animated\" style=\"--awb-bg-size:cover;width:30.6666%; margin-right: 4%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-4\"><h4 class=\"p1\" style=\"text-align: center;\">vCompliance Team<\/h4>\n<\/div><ul style=\"--awb-iconcolor:#002868;--awb-line-height:23.8px;--awb-icon-width:23.8px;--awb-icon-height:23.8px;--awb-icon-margin:9.8px;--awb-content-margin:33.6px;--awb-circlecolor:rgba(255,255,255,0);--awb-circle-yes-font-size:12.32px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Technology advisory and steering committee \u2013 compliance<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>External, independent compliance audits<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Impact analysis and planning \u2013 compliance<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Compliance resource generation (risk and control mappings, updates to regulations, etc.)<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Vulnerability assessment<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Third-party vendor assessments<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last fusion-animated\" style=\"--awb-bg-size:cover;width:30.6666%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-5\"><h4 class=\"p1\" style=\"text-align: center;\"><span style=\"color: #002868;\"><strong><span class=\"s1\">Workforce Support<\/span><\/strong><\/span><\/h4>\n<\/div><ul style=\"--awb-iconcolor:#002868;--awb-line-height:23.8px;--awb-icon-width:23.8px;--awb-icon-height:23.8px;--awb-icon-margin:9.8px;--awb-content-margin:33.6px;--awb-circlecolor:rgba(255,255,255,0);--awb-circle-yes-font-size:12.32px;\" class=\"fusion-checklist fusion-checklist-3 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Perform background checks, personnel risk assessments (PRAs)<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Provide end-user training<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Manage and report user training<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Develop cyber security awareness materials<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullseye fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Cybersecurity candidate screening, development, and pre-employment evaluation<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:1px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-color:#002868;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-position:right center;--awb-bg-size:cover;--awb-border-color:#e8e8e8;--awb-border-style:solid;--awb-margin-bottom:-20px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-6\"><h2>RELATED ARTICLES<\/h2>\n<\/div><div class=\"fusion-blog-shortcode fusion-blog-shortcode-1 fusion-blog-archive fusion-blog-layout-grid-wrapper fusion-blog-infinite fusion-blog-layout-center\"><style type=\"text\/css\">.fusion-blog-shortcode-1 .fusion-blog-layout-grid .fusion-post-grid{padding:15px;}.fusion-blog-shortcode-1 .fusion-posts-container{margin-left: -15px !important; margin-right:-15px !important;}<\/style><div class=\"fusion-posts-container fusion-posts-container-infinite fusion-posts-container-load-more fusion-blog-layout-grid fusion-blog-layout-grid-3 isotope fusion-blog-equal-heights\" data-pages=\"20\" data-grid-col-space=\"30\" style=\"margin: -15px -15px 0;min-height:500px;\"><article id=\"blog-1-post-4893\" class=\"fusion-post-grid post-4893 post type-post status-publish format-standard has-post-thumbnail hentry category-managed-services tag-cybersecurity tag-energy-sector tag-finance-sector tag-healthcare-sector tag-water-sector\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,1);border:1px solid rgba(141,183,225,0.3);border-bottom-width:3px;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(141,183,225,0.3);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/itegriti.com\/kw022024\/2024\/managed-services\/navigating-shadow-it-ot-challenges-in-critical-infrastructure\/\" aria-label=\"Navigating Shadow IT\/OT Challenges in Critical Infrastructure\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/177.png\" class=\"attachment-full size-full wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/177-200x113.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/177-400x225.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/177-600x338.png 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/177.png 800w\" data-sizes=\"(min-width: 2200px) 100vw, (min-width: 824px) 370px, (min-width: 732px) 555px, (min-width: 640px) 732px,\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/450;\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 25px 20px 25px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/itegriti.com\/kw022024\/2024\/managed-services\/navigating-shadow-it-ot-challenges-in-critical-infrastructure\/\">Navigating Shadow IT\/OT Challenges in Critical Infrastructure<\/a><\/h2><p class=\"fusion-single-line-meta\"><span class=\"updated\" style=\"display:none;\">2024-01-24T16:13:37+00:00<\/span>By <span class=\"vcard\"><span class=\"fn\"><a href=\"https:\/\/itegriti.com\/kw022024\/author\/stefanie-shank\/\" title=\"Posts by Stefanie Shank\" rel=\"author\">Stefanie Shank<\/a><\/span><\/span><span class=\"fusion-inline-sep\">|<\/span><a href=\"https:\/\/itegriti.com\/kw022024\/category\/managed-services\/\" rel=\"category tag\">Managed Services<\/a><span class=\"fusion-inline-sep\">|<\/span><\/p><div class=\"fusion-content-sep sep-none\"><\/div><\/div><div class=\"fusion-meta-info\"><div class=\"fusion-aligncenter\"><a class=\"fusion-read-more\" href=\"https:\/\/itegriti.com\/kw022024\/2024\/managed-services\/navigating-shadow-it-ot-challenges-in-critical-infrastructure\/\" aria-label=\"More on Navigating Shadow IT\/OT Challenges in Critical Infrastructure\">Read More<\/a><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4889\" class=\"fusion-post-grid post-4889 post type-post status-publish format-standard has-post-thumbnail hentry category-managed-services tag-cybersecurity tag-energy-sector tag-finance-sector tag-healthcare-sector tag-water-sector\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,1);border:1px solid rgba(141,183,225,0.3);border-bottom-width:3px;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(141,183,225,0.3);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/itegriti.com\/kw022024\/2024\/managed-services\/scaling-cybersecurity-building-an-extended-cyber-team\/\" aria-label=\"Scaling Cybersecurity: Building an Extended Cyber Team\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/174.png\" class=\"attachment-full size-full wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/174-200x113.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/174-400x225.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/174-600x338.png 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2024\/01\/174.png 800w\" data-sizes=\"(min-width: 2200px) 100vw, (min-width: 824px) 370px, (min-width: 732px) 555px, (min-width: 640px) 732px,\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/450;\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 25px 20px 25px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/itegriti.com\/kw022024\/2024\/managed-services\/scaling-cybersecurity-building-an-extended-cyber-team\/\">Scaling Cybersecurity: Building an Extended Cyber Team<\/a><\/h2><p class=\"fusion-single-line-meta\"><span class=\"updated\" style=\"display:none;\">2024-01-16T15:16:01+00:00<\/span>By <span class=\"vcard\"><span class=\"fn\"><a href=\"https:\/\/itegriti.com\/kw022024\/author\/pj-bradley\/\" title=\"Posts by PJ Bradley\" rel=\"author\">PJ Bradley<\/a><\/span><\/span><span class=\"fusion-inline-sep\">|<\/span><a href=\"https:\/\/itegriti.com\/kw022024\/category\/managed-services\/\" rel=\"category tag\">Managed Services<\/a><span class=\"fusion-inline-sep\">|<\/span><\/p><div class=\"fusion-content-sep sep-none\"><\/div><\/div><div class=\"fusion-meta-info\"><div class=\"fusion-aligncenter\"><a class=\"fusion-read-more\" href=\"https:\/\/itegriti.com\/kw022024\/2024\/managed-services\/scaling-cybersecurity-building-an-extended-cyber-team\/\" aria-label=\"More on Scaling Cybersecurity: Building an Extended Cyber Team\">Read More<\/a><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<article id=\"blog-1-post-4878\" class=\"fusion-post-grid post-4878 post type-post status-publish format-standard has-post-thumbnail hentry category-managed-services tag-cybersecurity tag-energy-sector tag-finance-sector tag-healthcare-sector tag-water-sector\">\n<div class=\"fusion-post-wrapper\" style=\"background-color:rgba(255,255,255,1);border:1px solid rgba(141,183,225,0.3);border-bottom-width:3px;\">\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"border-color:rgba(141,183,225,0.3);\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\" aria-label=\"Attack Surface Management in Critical Infrastructure\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png\" class=\"attachment-full size-full wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173-200x113.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173-400x225.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173-600x338.png 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png 800w\" data-sizes=\"(min-width: 2200px) 100vw, (min-width: 824px) 370px, (min-width: 732px) 555px, (min-width: 640px) 732px,\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/450;\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content-wrapper\" style=\"padding:10px 25px 20px 25px;\"><div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\">Attack Surface Management in Critical Infrastructure<\/a><\/h2><p class=\"fusion-single-line-meta\"><span class=\"updated\" style=\"display:none;\">2023-12-11T11:41:56+00:00<\/span>By <span class=\"vcard\"><span class=\"fn\"><a href=\"https:\/\/itegriti.com\/kw022024\/author\/pj-bradley\/\" title=\"Posts by PJ Bradley\" rel=\"author\">PJ Bradley<\/a><\/span><\/span><span class=\"fusion-inline-sep\">|<\/span><a href=\"https:\/\/itegriti.com\/kw022024\/category\/managed-services\/\" rel=\"category tag\">Managed Services<\/a><span class=\"fusion-inline-sep\">|<\/span><\/p><div class=\"fusion-content-sep sep-none\"><\/div><\/div><div class=\"fusion-meta-info\"><div class=\"fusion-aligncenter\"><a class=\"fusion-read-more\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\" aria-label=\"More on Attack Surface Management in Critical Infrastructure\">Read More<\/a><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div>\n<\/article>\n<div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-infinite-scroll-trigger\"><\/div><div class=\"pagination infinite-scroll clearfix\" style=\"display:none;\"><span class=\"current\">1<\/span><a href=\"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/202\/page\/2\/\" class=\"inactive\">2<\/a><a class=\"pagination-next\" rel=\"next\" href=\"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/202\/page\/2\/\"><span class=\"page-text\">Next<\/span><span class=\"page-next\"><\/span><\/a><\/div><div class=\"fusion-clearfix\"><\/div><button class=\"fusion-load-more-button fusion-blog-button fusion-clearfix\">Load More Posts<\/button><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"categories":[],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managed Services - kw022024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-28T01:48:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/managed-services\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/managed-services\/\",\"name\":\"Managed Services - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"datePublished\":\"2016-06-26T19:58:13+00:00\",\"dateModified\":\"2023-04-28T01:48:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/managed-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/managed-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/managed-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managed Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Managed Services - kw022024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/managed-services\/","og_locale":"en_US","og_type":"article","og_title":"Managed Services","og_url":"https:\/\/itegriti.com\/kw022024\/managed-services\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_modified_time":"2023-04-28T01:48:59+00:00","twitter_card":"summary_large_image","twitter_site":"@itegriti","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/managed-services\/","url":"https:\/\/itegriti.com\/kw022024\/managed-services\/","name":"Managed Services - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"datePublished":"2016-06-26T19:58:13+00:00","dateModified":"2023-04-28T01:48:59+00:00","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/managed-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/managed-services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/managed-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Managed Services"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/202"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":25,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/202\/revisions"}],"predecessor-version":[{"id":4067,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/pages\/202\/revisions\/4067"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}