{"id":70519,"date":"2016-03-15T13:58:30","date_gmt":"2016-03-15T13:58:30","guid":{"rendered":"http:\/\/fintech.commercegurus.com\/?page_id=70519"},"modified":"2021-01-13T09:23:16","modified_gmt":"2021-01-13T09:23:16","slug":"security-solutions","status":"publish","type":"page","link":"https:\/\/www.cy-services.com\/technology\/security-solutions\/","title":{"rendered":"Security Solutions"},"content":{"rendered":"<p>[vc_row type=&#8221;container&#8221; css=&#8221;.vc_custom_1462284973588{margin-bottom: 15px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4><a href=\"https:\/\/www.cy-services.com\/technology\/security-solutions\/surveillance\/\">Surveillance<\/a><\/h4>\n<p>Too many companies leave money on the table in their core businesses. More than 80% of executives say they are not even close to achieving full potential in their core business. Our strategy consultants help companies find the untapped growth potential and unrealized cost savings in their core businesses.[\/vc_column_text][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><a href=\"https:\/\/www.cy-services.com\/technology\/security-solutions\/access-control\/\">Access Control<\/a><\/h4>\n<p>Some companies hit a wall in their current business and fail to successfully redefine their core. We help firms find successful platforms, often within their own businesses, along with new customer insights and capabilities, to renew their business model. We develop insights that work for our clients. Our approach and recommendations are highly customized and lead to practical actions.[\/vc_column_text][vc_empty_space height=&#8221;70px&#8221;][vc_column_text]<\/p>\n<h4><a href=\"https:\/\/www.cy-services.com\/technology\/security-solutions\/it-security\/\">IT Security<\/a><\/h4>\n<p>Some companies hit a wall in their current business and fail to successfully redefine their core. We help firms find successful platforms, often within their own businesses, along with new customer insights and capabilities, to renew their business model. We develop insights that work for our clients. Our approach and recommendations are highly customized and lead to practical actions.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;71858&#8243; img_size=&#8221;medium&#8221; onclick=&#8221;custom_link&#8221; link=&#8221;https:\/\/www.cy-services.com\/technology\/security-solutions\/surveillance\/&#8221;][vc_single_image image=&#8221;71859&#8243; img_size=&#8221;medium&#8221; onclick=&#8221;custom_link&#8221; css=&#8221;.vc_custom_1610529500026{margin-top: 6px !important;}&#8221; link=&#8221;https:\/\/www.cy-services.com\/technology\/security-solutions\/access-control\/&#8221;][vc_single_image image=&#8221;71860&#8243; img_size=&#8221;medium&#8221; onclick=&#8221;custom_link&#8221; link=&#8221;https:\/\/www.cy-services.com\/technology\/security-solutions\/it-security\/&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;container&#8221; css=&#8221;.vc_custom_1462284973588{margin-bottom: 15px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text] Surveillance Too many companies leave money on the table in their core businesses. More than 80% of executives say they are not even close to achieving full potential in their core business. Our strategy consultants help companies find the untapped growth potential and unrealized cost savings in their core [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":70798,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Solutions - Cy Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cy-services.com\/technology\/security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Solutions - Cy Services\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;container&#8221; css=&#8221;.vc_custom_1462284973588{margin-bottom: 15px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text] Surveillance Too many companies leave money on the table in their core businesses. More than 80% of executives say they are not even close to achieving full potential in their core business. Our strategy consultants help companies find the untapped growth potential and unrealized cost savings in their core [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cy-services.com\/technology\/security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Cy Services\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-13T09:23:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cy-services.com\/technology\/#website\",\"url\":\"https:\/\/www.cy-services.com\/technology\/\",\"name\":\"Cy Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cy-services.com\/technology\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cy-services.com\/technology\/security-solutions\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cy-services.com\/technology\/security-solutions\/#webpage\",\"url\":\"https:\/\/www.cy-services.com\/technology\/security-solutions\/\",\"name\":\"Security Solutions - Cy Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.cy-services.com\/technology\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cy-services.com\/technology\/security-solutions\/#primaryimage\"},\"datePublished\":\"2016-03-15T13:58:30+00:00\",\"dateModified\":\"2021-01-13T09:23:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cy-services.com\/technology\/security-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cy-services.com\/technology\/security-solutions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cy-services.com\/technology\/security-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cy-services.com\/technology\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Solutions\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Solutions - Cy Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cy-services.com\/technology\/security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Security Solutions - Cy Services","og_description":"[vc_row type=&#8221;container&#8221; css=&#8221;.vc_custom_1462284973588{margin-bottom: 15px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text] Surveillance Too many companies leave money on the table in their core businesses. More than 80% of executives say they are not even close to achieving full potential in their core business. Our strategy consultants help companies find the untapped growth potential and unrealized cost savings in their core [&hellip;]","og_url":"https:\/\/www.cy-services.com\/technology\/security-solutions\/","og_site_name":"Cy Services","article_modified_time":"2021-01-13T09:23:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cy-services.com\/technology\/#website","url":"https:\/\/www.cy-services.com\/technology\/","name":"Cy Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cy-services.com\/technology\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cy-services.com\/technology\/security-solutions\/#primaryimage","inLanguage":"en-US","url":"","contentUrl":""},{"@type":"WebPage","@id":"https:\/\/www.cy-services.com\/technology\/security-solutions\/#webpage","url":"https:\/\/www.cy-services.com\/technology\/security-solutions\/","name":"Security Solutions - Cy Services","isPartOf":{"@id":"https:\/\/www.cy-services.com\/technology\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cy-services.com\/technology\/security-solutions\/#primaryimage"},"datePublished":"2016-03-15T13:58:30+00:00","dateModified":"2021-01-13T09:23:16+00:00","breadcrumb":{"@id":"https:\/\/www.cy-services.com\/technology\/security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cy-services.com\/technology\/security-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cy-services.com\/technology\/security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cy-services.com\/technology\/"},{"@type":"ListItem","position":2,"name":"Security Solutions"}]}]}},"_links":{"self":[{"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/wp\/v2\/pages\/70519"}],"collection":[{"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/wp\/v2\/comments?post=70519"}],"version-history":[{"count":10,"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/wp\/v2\/pages\/70519\/revisions"}],"predecessor-version":[{"id":71869,"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/wp\/v2\/pages\/70519\/revisions\/71869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.cy-services.com\/technology\/wp-json\/wp\/v2\/media?parent=70519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}