{"id":6009,"date":"2021-09-05T16:19:21","date_gmt":"2021-09-05T16:19:21","guid":{"rendered":"https:\/\/www.insentragroup.com\/nz02\/?page_id=6009"},"modified":"2025-07-17T07:19:00","modified_gmt":"2025-07-17T07:19:00","slug":"advanced-threat-protection","status":"publish","type":"page","link":"https:\/\/www.insentragroup.com\/nz\/services\/professional-services\/secure-workplace\/advanced-threat-protection\/","title":{"rendered":"Advanced Threat Protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6009\" class=\"elementor elementor-6009\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3897cc e-flex e-con-boxed e-con e-parent\" data-id=\"e3897cc\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9db2b12 e-con-full e-flex e-con e-child\" data-id=\"9db2b12\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f23e151 elementor-widget elementor-widget-heading\" data-id=\"f23e151\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Threat &amp; Endpoint Protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4595c05 elementor-widget elementor-widget-text-editor\" data-id=\"4595c05\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"cell large-6\"><div class=\"my32\"><div class=\"cell large-6\"><div class=\"my32\"><p>Have you mapped your users\u2019 interaction with your business? Do you know how their behaviours relate to business processes? Can you be sure malicious actors can\u2019t exploit your user base?<\/p><p>Malicious actors typically gain access to your environment by exploiting known \u2018bad\u2019 habits. The key to securing the ways in which your users interact with your business is understanding their behaviours and mapping those to known business processes. We can radically reduce the attack surface by protecting user identities and devices with learnt behaviour.<\/p><p>With Microsoft being named a Gartner Magic Quadrant leader for Endpoint Protection, Insentra can work with you chosen partner to help you take advantage of your investment and reduce risks associated with ransomware or malware.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c98ea0f elementor-widget__width-auto elementor-widget elementor-widget-shortcode\" data-id=\"c98ea0f\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"elementor-button-wrapper\"><a href=\"#formBlock\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\"><span class=\"elementor-button-content-wrapper\"><span class=\"elementor-button-text\">Contact Us<\/span><\/span><\/a><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf15aa8 e-con-full e-flex e-con e-child\" data-id=\"cf15aa8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c861f3 elementor-widget elementor-widget-image\" data-id=\"9c861f3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"750\" height=\"530\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/09\/laptop-discussing-1024x724.png\" class=\"attachment-large size-large wp-image-6014\" alt=\"New Zealand|Advanced Threat Protection\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/09\/laptop-discussing-1024x724.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/09\/laptop-discussing-300x212.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/09\/laptop-discussing-768x543.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/09\/laptop-discussing-1536x1086.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/09\/laptop-discussing-2048x1448.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/09\/laptop-discussing-1568x1109.png 1568w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:70.7%;max-width:3508px\" title=\"laptop-discussing\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-077b12a e-flex e-con-boxed e-con e-parent\" data-id=\"077b12a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b008a25 e-con-full e-flex e-con e-child\" data-id=\"b008a25\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e70891 e-con-full e-flex e-con e-child\" data-id=\"3e70891\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cac2608 elementor-widget elementor-widget-heading\" data-id=\"cac2608\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How We Can Help<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-566bcd4 elementor-widget elementor-widget-text-editor\" data-id=\"566bcd4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Leveraging the Gartner Magic Quadrant leaders for Endpoint Protection, we work with you to provide detailed monitoring of your endpoints and ensure they are protected against malicious actors. This capability is based on intelligence provided through the Microsoft Security Graph, which is continuously updated with new intelligence and machine learning knowledge.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e932b0 e-con-full e-flex e-con e-child\" data-id=\"1e932b0\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb913fe e-flex e-con-boxed e-con e-parent\" data-id=\"bb913fe\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b7b07b e-con-full e-flex e-con e-child\" data-id=\"7b7b07b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f19c89 elementor-widget elementor-widget-heading\" data-id=\"8f19c89\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Advanced Threat Protection services include:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ba2d11 elementor-widget elementor-widget-text-editor\" data-id=\"7ba2d11\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"\"><section class=\"grid-container py48\"><div id=\"services-microsoft-fasttrack-hackers.-attacks.-security.-page-content-panel2\" class=\"marketo-markup grid-x grid-padding-x medium-up-2 align-middle\"><div class=\"cell py16\"><div class=\"mb32\"><ul style=\"box-sizing: inherit; margin-right: 0px; margin-left: 1.25rem; padding: 0px; list-style-position: outside; line-height: 2; font-family: Montserrat, 'Helvetica Neue', Helvetica, Roboto, Arial, sans-serif;\"><li style=\"box-sizing: inherit; margin: 0px; padding: 0px; font-size: inherit;\">Microsoft 365 Advanced Threat Protection<\/li><li style=\"box-sizing: inherit; margin: 0px; padding: 0px; font-size: inherit;\">Azure Advanced Threat Analytics (ATA)<\/li><li style=\"box-sizing: inherit; margin: 0px; padding: 0px; font-size: inherit;\">Microsoft Defender Advanced Threat Protection (MDATP)<\/li><li style=\"box-sizing: inherit; margin: 0px; padding: 0px; font-size: inherit;\">Endpoint Detection and Response (EDR)<\/li><li style=\"box-sizing: inherit; margin: 0px; padding: 0px; font-size: inherit;\">Azure Advanced Threat Protection<\/li><li style=\"box-sizing: inherit; margin: 0px; padding: 0px; font-size: inherit;\">Symantec<\/li><\/ul><\/div><\/div><\/div><\/section><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23153da e-con-full e-flex e-con e-child\" data-id=\"23153da\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ada225e elementor-widget elementor-widget-text-editor\" data-id=\"ada225e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"\"><section class=\"grid-container py48\"><div id=\"services-microsoft-fasttrack-hackers.-attacks.-security.-page-content-panel2\" class=\"marketo-markup grid-x grid-padding-x medium-up-2 align-middle\"><div class=\"cell py16\"><div class=\"mb32\"><ol><li><strong>Reduce the attack surface<br \/><\/strong>We can drastically reduce the attack surface by extending on the secure source of identity and information protection paradigms and leveraging MDATP and learnt behaviours.<\/li><li><strong>Reduce AV and EDR Management overheads<br \/><\/strong>Our security assessment offerings can help assess the current state of your Endpoint Detection and Response capability as well as proactively plan for improvements.<\/li><li><strong>Recognise the investment in your Microsoft 365 subscription<\/strong><br \/>Our architect as a service (MapOne) offering can help leverage your current subscription entitlements to their full potential, as well as manage potential incumbent technology overlaps and associated costs.<\/li><\/ol><\/div><\/div><\/div><\/section><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e192d8 e-flex e-con-boxed e-con e-parent\" data-id=\"4e192d8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9e21a2f e-con-full e-flex e-con e-child\" data-id=\"9e21a2f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-985bea9 elementor-widget elementor-widget-heading\" data-id=\"985bea9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explore more on Advanced Threat Protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-489dfc9 elementor-widget elementor-widget-text-editor\" data-id=\"489dfc9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"P-BodyText\">Deep dive into the benefits of Advanced Threat Protection and what it truly entails<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb1924d elementor-widget elementor-widget-text-editor\" data-id=\"bb1924d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-family: Montserrat, 'Helvetica Neue', Helvetica, Roboto, Arial, sans-serif;\">__<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1234c1c elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-widget elementor-widget-posts\" data-id=\"1234c1c\" data-element_type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;3&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1693 post type-post status-publish format-standard has-post-thumbnail hentry category-secure-workplace entry\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/remote-working-information-protection-and-teams-governance\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2020\/05\/insentra_lee_foster_05202020_featured_v2-300x225.jpg\" class=\"attachment-medium size-medium wp-image-5489\" alt=\"\" style=\"width:100%;height:74.86%;max-width:875px\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2020\/05\/insentra_lee_foster_05202020_featured_v2-300x225.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2020\/05\/insentra_lee_foster_05202020_featured_v2-768x575.jpg 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2020\/05\/insentra_lee_foster_05202020_featured_v2.jpg 875w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/remote-working-information-protection-and-teams-governance\/\">\n\t\t\t\tRemote Working, Information Protection and Teams Governance\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMay 20, 2020\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>The last few months have been an interesting time for all, I am certain we have all experienced several changes as it relates to this<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/remote-working-information-protection-and-teams-governance\/\" aria-label=\"Read more about Remote Working, Information Protection and Teams Governance\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1535 post type-post status-publish format-standard has-post-thumbnail hentry category-secure-workplace entry\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/what-are-app-protection-policies\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/02\/dsc_4375-300x225.jpg\" class=\"attachment-medium size-medium wp-image-1536\" alt=\"\" style=\"width:100%;height:74.86%;max-width:875px\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/02\/dsc_4375-300x225.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/02\/dsc_4375-768x575.jpg 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/02\/dsc_4375.jpg 875w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/what-are-app-protection-policies\/\">\n\t\t\t\tWhat Are App Protection Policies?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMay 30, 2019\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>This article was originally posted on\u00a0Microsoft\u00a0company website. Microsoft Intune app protection policies help protect your company data and prevent data loss. HOW YOU CAN PROTECT<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/what-are-app-protection-policies\/\" aria-label=\"Read more about What Are App Protection Policies?\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-949 post type-post status-publish format-standard has-post-thumbnail hentry category-modern-workplace entry\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/modern-workplace\/insentras-symantec-endpoint-protection-offering\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/02\/dsc_4000-300x225.jpg\" class=\"attachment-medium size-medium wp-image-950\" alt=\"\" style=\"width:100%;height:74.86%;max-width:875px\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/02\/dsc_4000-300x225.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/02\/dsc_4000-768x575.jpg 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2021\/02\/dsc_4000.jpg 875w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/modern-workplace\/insentras-symantec-endpoint-protection-offering\/\">\n\t\t\t\tInsentra\u2019s Symantec Endpoint Protection Offering\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJuly 21, 2017\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Upon completion of a Symantec Endpoint Protection (SEP) health check and\/or SEP14 upgrade readiness assessment, the next step is to perform the upgrade to version<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/modern-workplace\/insentras-symantec-endpoint-protection-offering\/\" aria-label=\"Read more about Insentra\u2019s Symantec Endpoint Protection Offering\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c03ab2d e-flex e-con-boxed e-con e-parent\" data-id=\"c03ab2d\" data-element_type=\"container\" id=\"formBlock\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f590e5b e-con-full e-flex e-con e-child\" data-id=\"f590e5b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ba892b elementor-widget elementor-widget-heading\" data-id=\"7ba892b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Got a question? Need support? You\u2019re in the right place.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da364ca elementor-widget elementor-widget-heading\" data-id=\"da364ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We\u2019re here to help. Fill out your details and we\u2019ll call you to get started.\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-527851e elementor-widget__width-initial elementor-widget elementor-widget-html\" data-id=\"527851e\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js?pre=1\"><\/script>\n<script>\njQuery(function($){\n    var curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\n    hbspt.forms.create({\n        region: \"na1\",\n        portalId: \"20799536\",\n        formId: \"011d2cbe-1483-4545-a9fc-d23ddebe3a2d\",\n        redirectUrl: curr_url + 'thank-you\/',\n        css: \".hs_error_rollup {display:none !important;}\", onFormReady: function($form){\n            $form.find('input[name=\"referral_page\"]').val(curr_url).change();\n            var service_split = curr_url.split('\/');\n            var service_type = service_split[(service_split.length - 2)];\n            $form.find('input[name=\"service_type\"]').val(service_type).change();\n        }\n    });\n});\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Advanced Threat &amp; Endpoint Protection Have you mapped your users\u2019 interaction with your business? Do you know how their behaviours relate to business processes? Can you be sure malicious actors can\u2019t exploit your user base? Malicious actors typically gain access to your environment by exploiting known \u2018bad\u2019 habits. The key to securing the ways in&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/modern-workplace\/insentras-symantec-endpoint-protection-offering\/\">Continue reading <span class=\"screen-reader-text\">Insentra\u2019s Symantec Endpoint Protection Offering<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":3294,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-6009","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages\/6009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/comments?post=6009"}],"version-history":[{"count":27,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages\/6009\/revisions"}],"predecessor-version":[{"id":38223,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages\/6009\/revisions\/38223"}],"up":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages\/3294"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media?parent=6009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}